February 22, 2018 By Pierluigi Paganini 2 min read


Cloud computing, mobile devices and the Internet of Things (IoT) are dramatically enlarging the attack surface of modern organizations. This makes it more difficult than ever before for IT and security leaders to secure their corporate infrastructure.

Often, IT policies can’t keep pace with the rapidly increasing number of devices within an organization. Employees use these devices regardless of policies, increasing the risk of exposure for corporate data and infrastructure. A unified endpoint management (UEM) solution can help enterprises secure and control the entire IT environment and all of its endpoints, including smartphones, tablets, laptops and desktops, plus their users, apps, content and data.

Centralizing Device Management and Boosting Productivity With UEM

Using a UEM solution, administrators can centralize the management of complex, widely distributed IT infrastructures. Every aspect of corporate architecture can be easily managed, from the hardware inventory to patch and update management for Apple macOS and Microsoft Windows laptops. Lack of control can be the root cause of almost any security breach, so it is essential to comprehensively monitor IT components and data flaws.

Beyond the devices themselves, modern organizations must also improve end-user productivity. In doing so, they must try to reduce the overall cost of IT management while ensuring data security. A UEM solution both simplifies the management of devices and improves the security of heterogeneous IT environments. It is a better alternative to the disparate point solutions organizations often deploy, which increase costs, spread resources thin and decrease organizational efficiency.

From a cybersecurity perspective, protecting the IT infrastructure is still the most time-consuming and complex activity. A modern UEM solution includes fully integrated support to enforce security and compliance. Using containment technology, IT can protect device data, reduce the risk of data leakage, and keep software current with patching and update capabilities. Organizations can also make the app deployment process more user-friendly and secure using an intuitive unified app catalog with native-like configurations.

New privacy regulations will have a significant impact on the way companies use, share and store data, both internally and externally. As organizations look to rapidly and continuously assess their compliance posture, UEM solutions can help them track data flaws, even in a heterologous environment. With built-in identity and access management (IAM) functionality, UEM solutions can limit enterprise app and resource access to employees who need it to perform their jobs. An efficient UEM must also implement logging, auditing and reporting functionalities, which are essential for compliance.

Augmenting Human Intelligence With a Cognitive UEM Solution

The cognitive approach to UEM represents a natural evolution. According to a Forrester study commissioned by IBM, more than 80 percent of organizations will leverage artificial intelligence or cognitive computing to analyze endpoints by 2020.

“As organizations work toward a more integrated and device-agnostic approach, implementation of UEM will increase,” the report stated. “While just 15 percent have this centralized management approach in place today, 54 percent will have deployed UEM solutions by 2020.”

This augmented intelligence for UEM delivers enhanced data security, maximizes user productivity and increases operational efficiency. The implementation of cognitive technology enables organizations to analyze what has happened in their infrastructure, predict its evolution and adopt necessary correctives.

Sign up for a 30-day free trial of IBM MaaS360 with Watson

More from Artificial Intelligence

Could a threat actor socially engineer ChatGPT?

3 min read - As the one-year anniversary of ChatGPT approaches, cybersecurity analysts are still exploring their options. One primary goal is to understand how generative AI can help solve security problems while also looking out for ways threat actors can use the technology. There is some thought that AI, specifically large language models (LLMs), will be the equalizer that cybersecurity teams have been looking for: the learning curve is similar for analysts and threat actors, and because generative AI relies on the data…

AI vs. human deceit: Unravelling the new age of phishing tactics

7 min read - Attackers seem to innovate nearly as fast as technology develops. Day by day, both technology and threats surge forward. Now, as we enter the AI era, machines not only mimic human behavior but also permeate nearly every facet of our lives. Yet, despite the mounting anxiety about AI’s implications, the full extent of its potential misuse by attackers is largely unknown. To better understand how attackers can capitalize on generative AI, we conducted a research project that sheds light on…

C-suite weighs in on generative AI and security

3 min read - Generative AI (GenAI) is poised to deliver significant benefits to enterprises and their ability to readily respond to and effectively defend against cyber threats. But AI that is not itself secured may introduce a whole new set of threats to businesses. Today IBM’s Institute for Business Value published “The CEO's guide to generative AI: Cybersecurity," part of a larger series providing guidance for senior leaders planning to adopt generative AI models and tools. The materials highlight key considerations for CEOs…

Does your security program suffer from piecemeal detection and response?

4 min read - Piecemeal Detection and Response (PDR) can manifest in various ways. The most common symptoms of PDR include: Multiple security information and event management (SIEM) tools (e.g., one on-premise and one in the cloud) Spending too much time or energy on integrating detection systems An underperforming security orchestration, automation and response (SOAR) system Only capable of taking automated responses on the endpoint Anomaly detection in silos (e.g., network separate from identity) If any of these symptoms resonate with your organization, it's…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today