Ruggedized devices, single-purpose mobiles and the Internet of Things (IoT) have already entered into the fabric of many enterprise business and operations models. These endpoints are critical in industries such as retail, manufacturing, logistics and medical, and in any role involving physical movement and computing activity — i.e., non-desk jobs.

The decisions that IT and security leaders have traditionally made around ruggedized and IoT endpoints have typically centered on design, long battery life and overall ease of use. Increasingly, businesses are focusing more on IoT device management, security and compliance of these endpoints, as well as an overall strategy for these devices.

Why the sudden change? One reason is that many enterprises are approaching a tipping point in their ruggedized and single-purpose device deployments and their life cycles. Aging legacy devices — based on Windows CE (embedded Windows), proprietary operating systems (OSs) and even PalmOS — have many organizations rethinking ruggedized and IoT endpoints in the context of modern OSs, such as iOS and Android. These devices provide lower per-unit prices and are more customizable and flexible from a hardware and form factor standpoint. Organizations are also thinking of how these devices will fit into modern endpoint management and analytics frameworks.

Download the IDC report

Why Ruggedized and IoT Device Management Is Essential in the Modern Enterprise

Unified endpoint management (UEM) is a broad technology category that generally applies to the management of smartphones, tablets and laptops — both bring-your-own-device (BYOD) and corporate liable — with a focus on managing email, calendar, and other corporate applications and data. UEM also controls, provisions and manages ruggedized mobile devices and, increasingly, nontraditional, network-connected endpoints, or IoT devices, in the workplace. UEM for ruggedized and IoT use cases focuses on managing one or a few specialty apps, as opposed to calendar, contacts and email.

However, data security, device management and configuration, and especially location are critical features in ruggedized and IoT deployments. Some of the most sensitive, critical data in a business traverses these types of endpoints — think of mobile devices for shipping manifests in logistics, tablets for medical data and information input, or credit card numbers in mobile point-of-sale (POS) and retail use cases. The ability to track physical locations and guarantee security settings, configurations and safeguards on such devices is essential for IT teams. Just as critical is the ability to configure endpoints and deliver OS updates over the air (OTA), thereby eliminating the need for a device to leave the premises for maintenance and reducing the impact to business.

Beyond ruggedized and single-purpose mobile OS deployments, many enterprises are scrambling to manage diverse IoT endpoints in workplaces as more traditionally unconnected endpoints, such as conference room displays and building systems, connect to corporate networks. Employee workspaces are increasingly surrounded by connected devices. Tablets and touch screens are replacing clipboards and paper-based processes in many instances. Interfaces to equipment and machinery in specific industries (e.g., magnetic resonance imaging (MRI) machines, manufacturing and agricultural equipment) and general-purpose devices such as printers are connecting to networks with mobile-oriented OSs and user interfaces (UIs) layered on top. These workspace IoT environments promise increased productivity and richer interactions with meeting spaces.

Beyond simple configuration and monitoring of such devices, enrolling these endpoints in a management framework also allows businesses to collect and analyze data on how connected endpoints are used, which can be put in the context of overall business operations and efficiency.

How IBM’s MaaS360 With Watson Platform Is Leading the Industry

IDC recently published a MarketScape (competitive vendor analysis report) on enterprise mobility management (EMM) platforms specific to the use cases of ruggedized and IoT device management. Among the key criteria IDC used to evaluate EMM software vendors for these deployments was the breadth of OSs supported (while the industry moves toward Android and modern OS devices, there is still a large legacy-installed base that must be supported during upgrades, or for organizations intent on extending the life on fleets of older deployed devices).

Additionally, IoT endpoints and connected office devices typically run nontraditional endpoint OSs, such as Linux, QNX and other embedded RTOS software, requiring more specialized management and security functions.

IBM’s MaaS360 with Watson UEM platform was named a Leader in the “IDC MarketScape: Enterprise Mobility Management Software for Ruggedized and IoT Deployments” report. Contributing to IBM’s positioning as a leader was MaaS360’s support for a broad range of endpoint device types — from mobile OSs (Android, iOS) to desktops (ruggedized Windows PCs and laptops are still critical to many industries). Additionally, MaaS360 can manage specialized OSs, such as Linux/Raspberry Pi, Android Things and watchOS — all of which are used in emerging workspace IoT endpoints in the enterprise.

Along with legacy devices, MaaS360 offers support for emerging IoT endpoints, such as Microsoft’s HoloLens platform for business (augmented reality headset hardware and software). Another differentiating capability for IBM was its tie-ins with the company’s larger Watson IoT platform — where MaaS360 UEM deployments feed endpoint device data to Watson IoT for analytics.

To read more about the role MaaS360 plays in ruggedized and IoT device management and IBM’s solutions in this market, download the IDC MarketScape report.

Download the full IDC report

More from Endpoint

Patch Tuesday -> Exploit Wednesday: Pwning Windows Ancillary Function Driver for WinSock (afd.sys) in 24 Hours

‘Patch Tuesday, Exploit Wednesday’ is an old hacker adage that refers to the weaponization of vulnerabilities the day after monthly security patches become publicly available. As security improves and exploit mitigations become more sophisticated, the amount of research and development required to craft a weaponized exploit has increased. This is especially relevant for memory corruption vulnerabilities.Figure 1 — Exploitation timelineHowever, with the addition of new features (and memory-unsafe C code) in the Windows 11 kernel, ripe new attack surfaces can…

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space

View Part 1, Introduction to New Space, and Part 2, Cybersecurity Threats in New Space, in this series. As we see in the previous article of this series discussing the cybersecurity threats in the New Space, space technology is advancing at an unprecedented rate — with new technologies being launched into orbit at an increasingly rapid pace. The need to ensure the security and safety of these technologies has never been more pressing. So, let’s discover a range of measures…

Backdoor Deployment and Ransomware: Top Threats Identified in X-Force Threat Intelligence Index 2023

Deployment of backdoors was the number one action on objective taken by threat actors last year, according to the 2023 IBM Security X-Force Threat Intelligence Index — a comprehensive analysis of our research data collected throughout the year. Backdoor access is now among the hottest commodities on the dark web and can sell for thousands of dollars, compared to credit card data — which can go for as low as $10. On the dark web — a veritable eBay for…