What did information technology (IT) and security leaders do when they needed a simple, effective means to manage and secure their mobile devices — and provide secure access to enterprise data? They devised and implemented mobile device management (MDM) and enterprise mobility management (EMM) solutions.

But modern IT teams are responsible for accommodating a vast range of endpoints and enterprise use cases. They now need a platform that offers total visibility and control over their entire endpoint and mobile environment.

Fortunately, a unified endpoint management (UEM) solution delivers on the promise of bringing it all together under one management console: smartphones, tablets, laptops, desktops, wearables and the Internet of Things (IoT).

Watch the on-demand webinar: Announcing IBM MaaS360 with Watson — Business Dashboards for Apps & Cognitive Policy Recommendation Engine

UEM: Spot Your App Gap

With UEM’s all-encompassing support considered, it might seem to cover all the bases on the surface. However, there are two significant gaps that, if ignored, can hold organizations back from capturing its true benefits: inadequate visibility into the app deployment life cycle and lack of insight into real-world security policy recommendations.

It remains a challenge to discern which enterprise apps are being used and whether they are delivering a return on investment (ROI). For example, IT teams would love the answers to these common questions:

  • Which apps do mobile workers find useful?
  • How many individuals open the apps?
  • How long are apps being used?
  • Is an app update causing crashes?

With this sizable knowledge gap, IT teams are forgoing making informed decisions. They may be investing in all the apps equally — but, in actuality, one app may need more investment and resources while another may need to be decommissioned. These are the types of decisions that can be made when the right data is available to IT teams.

Configuration Confidence Goes a Long Way

Policy management is yet another fundamental component of a UEM solution where adequate guidance is lacking, and a large gap exists. If your IT team is like most, it relies heavily on internal collaboration to decide what goes into its security policy configurations.

There may be templates at your disposal, but they may be step-by-step, one-size-fits-all guides that aren’t geared toward your organization and its individual needs. There’s no clear-cut way to know what your peers are doing — or whether there are better methods and approaches you should be following.

Ideally, your UEM would give you an easy way to understand how to configure common policies, including:

  • Best practices you should consider when creating a passcode policy
  • How others in your industry have configured their secure corporate container
  • Various restrictions that a company of your size and within your region should enforce

Imagine a way to configure your policies with guidance that is dynamically presented every step of the way, catered to your organization and the size of your deployment. Whether you’re new to the game — or have been managing policies for years — a little confidence in your configurations goes a long way.

Overcoming UEM App and Policy Gaps

As both examples demonstrate, UEM does not offer a clear indication of whether your configurations are netting a positive impact — nor does it show whether they’re in alignment with best practices.

Luckily, innovation in the UEM market is helping to narrow the gaping gaps that exist in UEM. IBM MaaS360 with Watson, for example, has announced the availability of two new features that take these challenges head-on: Business Dashboards for Apps and Policy Recommendation Engine.

Graphs for Your Apps

With Business Dashboards for Apps, IBM MaaS360 UEM administrators gain robust app intelligence and reporting capabilities, which helps them understand the full assortment of enterprise apps deployed and a means to determine which ones need attention and prioritization.

Enterprise app analytics available via the MaaS360 UEM portal.

The dashboards are organized to help you get a full understanding of your enterprise app deployments across several key categories, including:

  • Installs: By platform, manufacturer and ownership
  • Usage: Installs, popularity and session length
  • Performance: Crashes, network requests and data usage
  • Trends: Six-month trends across usage and performance data

You can also apply filters across data sets to identify gaps and subscribe to reports that allow you to analyze data across specific apps or collections of apps.

Get It, Don’t Guess It

The Policy Recommendation Engine eliminates the guessing game that IT teams normally play when configuring their security policies with real-time cognitive templates based on industry, region and deployment size. As policies are being configured, recommendations will be dynamically displayed that clearly indicate how current inputs match up to peers. If administrators choose to apply the recommendations, they can do so with the simple click of a button.

Example of a Cognitive Recommendation displayed during MaaS360 passcode policy configuration process.

Watch the on-demand IBM Security webinar, “Announcing IBM MaaS360 with Watson: Business Dashboards for Apps & Cognitive Policy Recommendation Engine,” to see IBM MaaS360 experts demonstrate each of these new features. Experience a better way to manage your endpoints and mobile devices, and gain a better understanding about your app deployments, which could help you take an informed approach to policy management.

More from Endpoint

Combining EPP and EDR tools can boost your endpoint security

6 min read - Endpoint protection platform (EPP) and endpoint detection and response (EDR) tools are two security products commonly used to protect endpoint systems from threats. EPP is a comprehensive security solution that provides a range of features to detect and prevent threats to endpoint devices. At the same time, EDR is specifically designed to monitor, detect and respond to endpoint threats in real-time. EPP and EDR have some similarities, as they both aim to protect endpoints from threats, but they also have…

The needs of a modernized SOC for hybrid cloud

5 min read - Cybersecurity has made a lot of progress over the last ten years. Improved standards (e.g., MITRE), threat intelligence, processes and technology have significantly helped improve visibility, automate information gathering (SOAR) and many manual tasks. Additionally, new analytics (UEBA/SIEM) and endpoint (EDR) technologies can detect and often stop entire classes of threats. Now we are seeing the emergence of technologies such as attack surface management (ASM), which are starting to help organisations get more proactive and focus their efforts for maximum…

X-Force identifies vulnerability in IoT platform

4 min read - The last decade has seen an explosion of IoT devices across a multitude of industries. With that rise has come the need for centralized systems to perform data collection and device management, commonly called IoT Platforms. One such platform, ThingsBoard, was the recent subject of research by IBM Security X-Force. While there has been a lot of discussion around the security of IoT devices themselves, there is far less conversation around the security of the platforms these devices connect with.…

X-Force prevents zero day from going anywhere

8 min read - This blog was made possible through contributions from Fred Chidsey and Joseph Lozowski. The 2023 X-Force Threat Intelligence Index shows that vulnerability discovery has rapidly increased year-over-year and according to X-Force’s cumulative vulnerability and exploit database, only 3% of vulnerabilities are associated with a zero day. X-Force often observes zero-day exploitation on Internet-facing systems as a vector for initial access however, X-Force has also observed zero-day attacks leveraged by attackers to accomplish their goals and objectives after initial access was…