We live in interesting times. With everyone being so well-connected, it’s hard to believe they’re not actually attached at the hip to their smartphones to stay up to date in their personal and work lives. With so many different possible mechanisms to keep in touch, modern workers expect immediate, intuitive access to all applications, content and websites — both internal and external — without being encumbered by some heavy-handed management facility. On the flip side, enterprises still need to protect their intellectual property and the proprietary information that’s used to move their business forward.

Watch the on-demand mobile strategy webinar with Forrester analyst Chris Sherman

For businesses to deliver their future business transformation goals with endpoint and mobile, the support model needs to be simple and responsive — not only for the IT management staff, but also for the end user. As an additional requirement, it must be cost effective and scalable. And, by the way, you need a way to account for all devices, whether they are smartphones, tablets, laptops, desktops, wearables or Internet of Things (IoT) products via what is known as unified endpoint management (UEM).

A New Era of Mobile Device Management

Since the dawn of the mobile enterprise, organizations have aspired to gain visibility and actionable intelligence into all devices from single pane of glass. When smartphones and tablets — such as the iPhone, iPad and cutting-edge Androids — hit the market, consumers became accustomed to a new user experience (UX), driving enterprises to provide ubiquitous enterprise resource access to their employees. This was initially looked as a productivity boost, but the management approach was varied and disparate.

Apple and Google provided a set of application program interfaces (APIs) for management that somewhat simplified IT, but what about the PCs and laptops? These devices also needed to be managed, but that was accomplished with a completely different system (e.g., a client management tool) — one which was mostly delivered on-premises.

Enterprises accepted and embraced the mobile device management (MDM) API policy management functions and were confident in their protection capabilities. They also embraced the idea that the management system did not have to be on-premises: Enterprises could become more cost effective by managing the devices in the cloud via software-as-a-service (SaaS).

However, laptops and PCs were still the outlier when it came to API management. Yes, there was an API available for Macs, but these constituted a small percentage of overall devices in the enterprise.

There was a singular event that allowed UEM to turn the corner: Microsoft provided an API function resembling MDM for lightweight management of Windows 10 devices in July 2015. This opened the door for consistent management abilities across all device form factors, including smartphones, PCs, wearables and IoT.

The convergence that began in July 2015 was the crux for what is today considered UEM: One window, method and system that is cost effective and scalable for all devices that modern workers need to be productive in their daily work and personal lives. This management approach is the way of the future. According to “Mobile Vision 2020,” a commissioned study conducted by Forrester Consulting on behalf of IBM, “54 percent [of organizations] will have deployed UEM solutions by 2020.”

To accommodate this convergence, UEM solutions have emulated the functions that end users became accustomed to on their smartphones and tablets, giving rise to a new modern UX that is universally applicable and device agnostic. As UEM continues to cast a wider net, supporting more advanced device form factors, a device will remain a device. Visibility and actionable intelligence will remain key to security, and accommodating the modern UX will remain a priority of device management.

Apps and Content: All for One Approach, and One Approach for All

This device-agnostic approach to UEM is already making its way to the enterprise. Unified application catalogs, for example, give company administrators the ability to create a corporate library of apps for all devices and payload types. From the end user’s perspective, they can essentially control their own destiny; no matter what type of device they’re using, they have a way to install whatever application they need to address any use case at any time. As for the applications they cannot do without, administrators can silently push and install required apps so employees have all necessary programs.

Beyond application delivery, content must be easy to create, edit, save, access and share just as easily on a smartphone as on a hybrid laptop. Data must also remain protected, using everything from containerization to ensuring that the latest patches are applied across the most commonly used platforms, such as Windows 7, Windows 10 and macOS.

Device-agnostic management approaches such as these will only become more common in organizations over time. “Forty-two percent predict they will be moving to a device agnostic approach — up from 26 percent today,” Forrester stated.

People, Identity and the Five W’s of UEM

We’ve just established that UEM gives enterprise IT a unified approach for pushing apps and content to any device, all while ensuring the associated data remains secure. What else should it be able to accomplish?

A UEM needs to secure access to enterprise apps, locking down access to confidential content to the right party or parties. But that doesn’t mean the process should be impossible: Users of all device types should be able to authenticate, gain authorization and receive single sign-on (SSO) access to eliminate the need to enter credentials multiple times in one span of activity.

Because all devices form factors are enrolled, managed and secured from a single platform, UEM affords the user-based context that is typically absent but needed for businesses to ensure employees are accessing the right information at the right time.

Using that valuable context, here are the five W’s of UEM that will be critical for enterprises looking to strike a balance between productivity and security across endpoints. Each W builds on the next:

  1. Who: defining the identity of the person behind the device;
  2. What: determining the type of device are they using;
  3. When: deciding the policy that should be put in place;
  4. Where: finding the location of this person and device; and
  1. Which: confirming the apps and level of enterprise access they should have.

If you’re one of the brave few who will try to accomplish the final, most integral step of using multiple tools, you’ll quickly see why UEM is the futuristic way for businesses looking to get the most from their endpoints, end users and everything in between. If not for efficiency’s sake, you can also reduce your total cost of ownership (TCO) by consolidating your endpoint management to one solution. By 2020, “81 percent of organizations will be making reducing TCO a high or top priority,” Forrester claimed.

What’s Next for Business Transformation?

For organizations looking to achieve digital business transformation, UEM is just the first step. The growing number of endpoints and their associated data requires a newer, smarter approach to empower your organization be more efficient, enable your employees to be more productive and keep your corporate data secure.

In Part II of this series, we will venture into further into the evermore relevant grounds of IoT, outlining the management approaches your organization should consider today and what to expect for the future. Part III will delve into the final component of the UEM hierarchy of needs, which will be critical in achieving your business transformation.

In the meantime, watch the on-demand webinar, “Forrester Forecasts 2020: Is Your Mobile Strategy Aligned?” in which Wes Gyure, IBM MaaS360 portfolio offering manager, joins guest Chris Sherman, senior analyst at Forrester, for an in-depth overview of the “Mobile Vision 2020” thought leadership paper. Wes and Chris outline key findings from the study and provide strategy and investment recommendations for those planning their digital transformation over the next decade.

Watch the on-demand mobile strategy webinar

More from Endpoint

Unified endpoint management for purpose-based devices

4 min read - As purpose-built devices become increasingly common, the challenges associated with their unique management and security needs are becoming clear. What are purpose-built devices? Most fall under the category of rugged IoT devices typically used outside of an office environment and which often run on a different operating system than typical office devices. Examples include ruggedized tablets and smartphones, handheld scanners and kiosks. Many different industries are utilizing purpose-built devices, including travel and transportation, retail, warehouse and distribution, manufacturing (including automotive)…

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Endpoint security in the cloud: What you need to know

9 min read - Cloud security is a buzzword in the world of technology these days — but not without good reason. Endpoint security is now one of the major concerns for businesses across the world. With ever-increasing incidents of data thefts and security breaches, it has become essential for companies to use efficient endpoint security for all their endpoints to prevent any loss of data. Security breaches can lead to billions of dollars worth of loss, not to mention the negative press in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today