Magic Quadrant for Enterprise Mobility Management Suites

Size: px
Start display at page:

Download "Magic Quadrant for Enterprise Mobility Management Suites"

Transcription

1 Magic Quadrant for Enterprise Mobility Management Suites 8 June 2015 ID:G Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, John Girard, Bryan Taylor VIEW SUMMARY Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End user computing leaders must consider short term and long term objectives amid rapid market changes. Market Definition/Description This document was revised on 9 June The document you are viewing is the corrected version. For more information, see the Corrections page on gartner.com. Enterprise mobility management (EMM) suites help organizations integrate mobile devices into their security frameworks and systems and information technology life cycles. Organizations use EMM tools to perform the following functions for their users: Provisioning: EMM suites configure devices and applications for enterprise use. Auditing, tracking and reporting: These products audit mobile devices and applications to track compliance with enterprise policies. They also maintain inventory for cost and asset management purposes and are capable of tracking usage of services and apps. Defense of enterprise data: EMM suites apply technologies to encrypt data, control data flow and remotely revoke user access to mobile applications and information in the event the user or device becomes untrusted (for example, through device loss, unauthorized reconfiguration or employee termination). Support: EMM suites help IT departments troubleshoot mobile device problems through inventory, analytics and invoking remote actions. There are four core EMM technical categories that help IT organizations perform these services. There are some overlapping capabilities between the categories. Organizations may use some or all of these features, depending on their requirements: 1. Mobile device management (MDM): MDM is a platform life cycle management technology that provides inventory, OS configuration management, mobile app provisioning and deprovisioning, remote wipe, and remote viewing/control for troubleshooting. MDM profiles, installed on the device, facilitate these functions. 2. Mobile application management (MAM): MAM applies management and policy control functionality to individual applications, which are then delivered via enterprise app stores and managed locally on devices via the EMM console. This capability is necessary when the OS does not provide adequate management or security capability or when organizations elect not to install an MDM agent on the device. MAM can also provide analytics capabilities to help administrators and application owners understand usage patterns. MAM and MDM functions may also be used complementarily. There are two basic forms of MAM: Preconfigured applications: EMM vendors provide proprietary mobile apps or integrate with particular third party apps to provide enhanced levels of manageability. These most commonly include productivity and collaboration applications, such as a secure personal information manager (PIM) for , calendaring and contact management, as well as a secure browser provided by the EMM provider or a third party. Application extensions: These apply policies to applications through the use of a software development kit (SDK) or by wrapping. 3. Mobile identity: EMM tools help ensure only trusted devices and users access enterprise applications. Mobile identity capabilities may utilize one or more use of the following technologies: user and device certificates, app code signing, authentication, and single sign on. EMM tools are increasingly using contextual information (such as location and time) to help inform access decisions. 4. Mobile content management (MCM): MCM enables users to access content from their mobile devices. The MCM function within EMM suites has four fundamental roles: A client side app that enables a user to store content securely on a mobile device. The EMM can enforce policies such as authentication, file sharing and copy/paste restriction. Content comes from sources such as attachments in , files accessed from a backend repository, or files accessed from a cloud repository. Content access: This is a connection to a back end repository where users can pull content to their devices. Content push: These capabilities involve push based file distribution, replacement and deletion. File level protection: EMM tools are not full blown data loss prevention (DLP) or information rights management (IRM) products, but they may apply file level protections in certain mobile contexts, and they may integrate into larger frameworks. EVALUATION CRITERIA DEFINITIONS Ability to Execute Product/Service: Core goods and services offered by the vendor for the defined market. This includes current product/service capabilities, quality, feature sets, skills and so on, whether offered natively or through OEM agreements/partnerships as defined in the market definition and detailed in the subcriteria. Overall Viability: Viability includes an assessment of the overall organization's financial health, the financial and practical success of the business unit, and the likelihood that the individual business unit will continue investing in the product, will continue offering the product and will advance the state of the art within the organization's portfolio of products. Sales Execution/Pricing: The vendor's capabilities in all presales activities and the structure that supports them. This includes deal management, pricing and negotiation, presales support, and the overall effectiveness of the sales channel. Market Responsiveness/Record: Ability to respond, change direction, be flexible and achieve competitive success as opportunities develop, competitors act, customer needs evolve and market dynamics change. This criterion also considers the vendor's history of responsiveness. Marketing Execution: The clarity, quality, creativity and efficacy of programs designed to deliver the organization's message to influence the market, promote the brand and business, increase awareness of the products, and establish a positive identification with the product/brand and organization in the minds of buyers. This "mind share" can be driven by a combination of publicity, promotional initiatives, thought leadership, word of mouth and sales activities. Customer Experience: Relationships, products and services/programs that enable clients to be successful with the products evaluated. Specifically, this includes the ways customers receive technical support or account support. This can also include ancillary tools, customer support programs (and the quality thereof), availability of user groups, service level agreements and so on. Operations: The ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Completeness of Vision Market Understanding: Ability of the vendor to understand buyers' wants and needs and to translate those into products and services. Vendors that show the highest degree of vision listen to and understand buyers' wants and needs, and can shape or enhance those with their added vision. Marketing Strategy: A clear, differentiated set of messages consistently communicated throughout the organization and externalized through the website, advertising, customer programs and positioning statements. Sales Strategy: The strategy for selling products that uses the appropriate network of direct and indirect sales, marketing, service, and communication affiliates that extend the scope and depth of market reach, skills, expertise, technologies, services and the customer base. Offering (Product) Strategy: The vendor's approach to product development and delivery that emphasizes differentiation, functionality, methodology and feature sets as they map to current and future requirements. Business Model: The soundness and logic of the vendor's underlying business proposition. Vertical/Industry Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of individual market segments, including vertical markets. 2HF4VDW&ct=150608&st=sb 1/10

2 Magic Quadrant Figure 1. Magic Quadrant for Enterprise Mobility Management Suites Innovation: Direct, related, complementary and synergistic layouts of resources, expertise or capital for investment, consolidation, defensive or preemptive purposes. Geographic Strategy: The vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the "home" or native geography, either directly or through partners, channels and subsidiaries as appropriate for that geography and market. Source: Gartner (June 2015) Vendor and AirWatch by VMware Since AirWatch's acquisition by VMware in February 2014, AirWatch has become part of the End User Computing business unit, but has largely operated as an independent entity. This is starting to change, as AirWatch is becoming integrated with various VMware technologies, most notably VMware's identity and access management and software defined networking products. AirWatch's offering has comprehensive EMM functionality and as a result, appears most frequently in Gartner clients' EMM vendor shortlists. Previously, AirWatch was a closed system with limited support for third party independent software vendor (ISV) mobile applications. However, this has changed under VMware with a large expansion of applications that now directly integrate with the product. Gartner hears of periodic code quality issues with the AirWatch product, which likely come as a result of attempting to provide a broad set of capabilities quickly. AirWatch is a good fit for organizations that require a comprehensive EMM feature set on a broad range of platforms. AirWatch has proven large scale deployments across most vertical markets. The administrative console is one of the easiest to use with embedded training videos, links and a wizard like approach to help new administrators become productive quickly. AirWatch continues to push innovation with zero day support of new operating systems and expansion into management of Internet of Things devices. Customers report that the Inbox application lacks maturity, causing customers to use thirdparty PIM products. AirWatch is working to improve the capabilities of the Inbox product. On premises infrastructure components are based on Windows, SQL Server and Linux (not appliance based), adding administrative overhead compared with other on premises products. Product stability continues to be an issue with AirWatch. Gartner clients have reported several recent issues on both the console side and the agent side. BlackBerry BlackBerry released BlackBerry Enterprise Service 12 (BES12) in November BES12 provides improved non BlackBerry OS support, and it consolidates the management of BlackBerry devices, which previously required separate versions of BlackBerry Enterprise Service, depending on the type of device. BlackBerry's strategy is to use BlackBerry Enterprise Service as the management platform for additional software products including split billing, identity and access management, its Internet of Things platform, and (most recently) its acquisition of WatchDox. WatchDox offers an enterprise file synchronization and sharing (EFSS) product with enhanced security and content collaboration features. BES12 is a more complete EMM product than prior versions, and it should meet many organizations' requirements for cross platform management. Our research has found that uptake of BES12 to manage large numbers of non BlackBerry devices is still low. BES12 is a good fit for organizations that plan to support BlackBerry devices for the foreseeable future and are satisfied with a capable EMM product for non BlackBerry 2HF4VDW&ct=150608&st=sb 2/10

3 devices. BlackBerry Enterprise Service's MDM support for BlackBerry devices is the strongest in the market, including the ability to audit and log SMS messages. The BES12 console is very well designed, and it provides good navigation and administration. The console's "filter grid" and "quick filters" make it easy to find users and devices, based on many attributes. BlackBerry support continues to get very positive feedback from customers. Citrix Customers cited usability problems with the Secure Work Space for BES12, particularly on Android. BlackBerry Enterprise Service MDM capabilities on non BlackBerry devices have improved; the product still lags competitors in terms of completeness supporting new MDM features, such as Apple Device Enrollment Program (DEP) and certificate management. BES12 does not currently support Windows 8.1 or Mac OS X. In January 2015, Citrix released version 10 of its XenMobile product, which takes significant steps in simplifying the product's architecture and unifies the MDM and MAM console. In addition, XenMobile 10 added a self service portal for users and support for Android for Work. ShareFile, Citrix's MCM product, is a full featured EFSS product that is included in XenMobile Enterprise and remains among the best in the market. Citrix is a good fit for organizations that are looking to deliver a secure workspace comprising Windows, Web and mobile applications, as well as organizations that use ancillary technologies, such as XenApp, XenDesktop and NetScaler. Citrix gets high marks for user experience. WorxMail (Citrix's secure PIM product) added a weekly calendar view, zip file support and other new features with the XenMobile 10 release. Citrix ShareFile remains one of the strongest MCM products among EMM vendors. Citrix provides an integrated user experience between virtual Windows applications and native mobile applications. Globo Though the product has sold reasonably well, Gartner was still unable to find many reference customers with very large current deployments (over 10,000 devices). XenMobile 10 console is separate from those of NetScaler and ShareFile. While NetScaler and ShareFile do not require a great deal of day to day administration, XenMobile administration is less streamlined, as well as a more demanding project, for organizations that do not already use NetScaler. Citrix released an upgrade tool to simplify the move from XenMobile 9 to XenMobile 10 in April However, the tool supports only MDM instances. Citrix has announced that it will release tools to migrate MAM and MDM plus MAM instances later in Globo offers EMM through its GO!Enterprise Workspace suite, which includes its EMM solution, a mobile application development platform (MADP) tool, and a secure container for content and applications. Globo is unique in its offering of a full MADP component within its product suite for which no additional license beyond the GO!Enterprise suite is required; however, additional licensing of the secure container offering is required for any apps built on the MADP that an organization wishes to distribute, secure and manage. In June 2014, Globo announced the acquisition of Sourcebits to strengthen Globo's mobile application development capabilities. Additionally, Globo completed third party National Institute of Standards and Technology (NIST) validation of its use of Federal Information Processing Standard data protections in its EMM solution in October Globo is a good fit for organizations seeking an application centric EMM that offers a low barrier to entry into the MADP space. Globo remains one of three vendors in this analysis with a strong tie in of mobile app development capabilities that go beyond an SDK or app wrapper offering. Administrators can create a comprehensive secure workspace, without the need for a configuration profile, including PIM, browsing, chat, camera, file access, and apps built using the Globo MADP. The ability to make use of app instrumentation through its MADP module provides Globo customers a potentially rich trove of app usage and performance data. Globo's presence is much more prominent in European markets than in U.S. markets, and the vendor does not enjoy the name recognition or customer base of many leaders outside of Europe. Therefore, identifying relevant reference customers when buying may prove challenging. The GO!Enterprise suite lacks some core components present in competitive offerings, such as remote view and control of apps or devices, as applicable, by platform and the ability to create dynamic policy groups based on device status, such as roaming state. GO!Enterprise has weak certificate management. It lacks certificate support for mobile applications. It also lacks its own certification authority and supports few third party certification authorities. Good Technology Good Technology released Good Work, the successor to the Good for Enterprise PIM client, in Good Work is built on the Good Dynamics Secure Mobility Platform, inheriting the security and functional capabilities of that platform, such as single sign on, multifactor authentication, workflows and presence. The transition from the legacy Good for Enterprise and AppCentral products to the current Good Work and Good Dynamics products has caused confusion among customers, as the current products do not yet contain all of the capabilities of the legacy products. In October 2014, Good acquired Macheen, a cloud 2HF4VDW&ct=150608&st=sb 3/10

4 application service provider specializing in device connectivity. Good has brought Macheen services into the Good Dynamics to add split data billing capabilities. Good Technology EMM is a good fit for organizations with stringent security requirements, those in regulated industries, or those with aggressive mobile app development plans that can benefit from the broad range of capabilities of the Good Dynamics SDK. Good's PIM functionality is the most advanced among the EMM vendors, including capabilities such as mail push notifications on ios/android/windows, presence, advanced search and contact history. Good's service management capabilities are among the best in class, with powerful reporting tools to facilitate remote support. The Good Dynamics platform has evolved from a security focus to a general purpose collection of libraries that organizations developing their own apps will find attractive. Split billing capabilities for data (implemented via Good Dynamics) are differentiating for bring your own device (BYOD) environments looking to implement this capability today. IBM The Good Work platform is new and has numerous end user functional limitations on Android, ios and Windows Phone. Good's current grouping mechanism is primarily through user groups. It does not provide a good way of creating groups based on device properties. Good lags the competition in many MDM functions on ios, Android and Windows Phone. IBM rebranded MaaS360 to "MobileFirst Protect" in 2015 to align EMM with the IBM MobileFirst strategy. MobileFirst Protect EMM manages the three popular mobile OSs: ios, Android and Windows Phone in addition to workstation systems based on Windows 7/8 and Mac OS X. MobileFirst Protect is part of the "Secure and Manage" practice, which represents the second of four practice areas in the MobileFirst portfolio, the others being "Build" tools for developing and testing mobile apps, "Engage" tools for analyzing and optimizing mobile customer experiences, and "Transform" tools to help build mobile business models. MobileFirst Protect is a good fit for organizations looking for an easy to deploy EMM product and for those interested in the broader IBM MobileFirst strategy. IBM's mature shared processing multitenant architecture is the best in class cloud among ranked EMM vendors. It allows easy separation of access for users, as well as separation of duties and scope for different levels of administrators and help desks. Reference customers consistently praise MobileFirst Protect for ease of deployment. Installations can be readily personalized to meet a company's needs, and extensive self help is available for individual users. MobileFirst Protect provides a robust and extensive device monitoring and tracking system, which includes features that can be used for selective notifications based on geography. Several of IBM's clients have begun to use it as a basic emergency or mass notification service (EMNS). User feedback indicates that it is the original Fiberlink team that drives satisfaction with MobileFirst Protect. Interference has been minimal since the acquisition, but clients do note a slight drop in service. The uptake of MAM (app wrapping and securing apps using an SDK) with MobileFirst Protect is low, based on our research. It trails other products in some areas, particularly because of its lack of mobile app certificates (currently in development), its lack of SAML support, and its limited app analytics capabilities. We continue to get feedback from customers about console and administration issues. For example, records of retired devices remain in the system for a period of time, and there are sometimes issues in synchronizing data between the mobile gateway and the MobileFirst Protect console. Landesk Landesk is a longtime leader in client management with its Landesk Management Suite. The company's acquisition of Wavelink in 2012 resulted in the creation of two EMM products, Mobility Manager and Avalanche. Mobility Manager is the company's general purpose EMM suite, while Avalanche carries forward Wavelink's focus on purpose built and ruggedized devices (in addition to consumer grade devices like smartphones and standard tablets). In addition to selling these products as stand alone offerings, the company sells bundled offerings that include Mobility Manager tightly integrated into its adjacent client management, service desk and endpoint protection. Through its acquisition of LetMobile, Landesk also offers secure PIM and Web apps that allow these apps to be used without any local data on the device. Landesk is a good fit for ruggedized device management and unified endpoint management. Landesk has one of the strongest offerings for converged endpoint management, with tight integration between Landesk Management Suite and Mobility Manager. Mobility Manager is one of the few products in the market to offer integrated EMM and service desk. LetMobile's unique architecture allows for delivery of while keeping all data in the data center and off the device, an approach that appeals to some organizations for enabling highly secure access for BYOD users, boards of directors or business partners. MDM policy support still lags leading EMM products for both ios and Android devices. MCM remains basic and is limited to content push and storage on the device. Mobility Manager does not provide access to back end content stores or file share and sync. Gartner did not find customers using the MAM or MCM capabilities of Mobility Manager. References were using only the MDM module. 2HF4VDW&ct=150608&st=sb 4/10

5 Microsoft Microsoft's EMM product is the Enterprise Mobility Suite (EMS), which includes Microsoft Intune, Azure Active Directory Premium and Azure Rights Management. Microsoft Intune provides the core EMM capabilities of MDM and MAM. Intune's strengths are its support of Office 365 and integration of System Center Configuration Manager (ConfigMgr). Microsoft also recently developed a secure PIM capability based on the Outlook mobile app for ios and Android. This will rival secure PIM offerings available from other EMM vendors. While the end user functionality of the Outlook mobile app looks compelling, it was not generally available at the time of this report. The EMS represents a comprehensive mobility security and management vision, and it positions Microsoft well for the future in this market. Currently, Intune adoption is low, and the product is still maturing. Organizations that should consider Intune are those that want to extend the Office 365 services to mobile devices and ConfigMgr customers that value client management and EMM integration over best of breed EMM functionality. Intune has unique technical capabilities to manage the Office Mobile apps on ios and Android devices, including "conditional access," app level authentication and copy/paste control. The Intune license includes entitlement to ConfigMgr, allowing organizations to manage PCs and mobile devices through the same license and console. The combination of Azure Active Directory Premium, Azure Rights Management and Intune addresses some useful mobile scenarios, for example, changing an Active Directory password from a mobile device. Intune has two modes: "standalone" and "hybrid" with ConfigMgr. The "hybrid" mode creates dependencies between Intune and ConfigMgr. Advanced administrative functionality requires Intune to be connected to ConfigMgr. However, new Intune functionality is not immediately available when Intune is connected to SCCM, and changes to ConfigMgr can affect its ability to work with Intune. The next major version of ConfigMgr plans to address this issue. Intune supports most of the generic Android MDM APIs, as well as some Samsung Knox capabilities. It does not support MDM APIs of Android for Work or other handset manufacturers (such as LG and HTC). Intune's MAM has limited compatibility with third party mobile application development tools, and it is behind most competitive products on containerization and analytics features. MobileIron MobileIron became a publicly traded company in June MobileIron is one of the few stand alone EMM vendors, and it faces the challenge of increasingly competing with large IT infrastructure and operations vendors. The company has continued to demonstrate growth in the number of customers and the sophistication of its EMM deployments. MobileIron's strategy continues to be to enable an "open" ecosystem of devices and mobile applications, and to protect access and information through server side functions. This strategy can also add cost and complexity for customers that prefer a single vendor solution for EMM along with other mobile relevant products, such as EFSS, collaboration and antimalware. MobileIron continues to receive high marks for its ability to scale to multiple hundred thousanddevice deployments with few or no issues in architecture. Organizations that want a comprehensive EMM product, particularly to enable a diverse range of mobile applications, should consider MobileIron. MobileIron's MCM product, Docs@Work, can encrypt and delete files, allowing organizations to protect individual files even when they are in unmanaged content repositories. MobileIron's MAM product, AppConnect, has good compatibility across a wide range of MADP tools, and reference customers this year reported heavy use of AppConnect. MobileIron gets very positive feedback from customers for its certificate management capabilities, with a built in certificate authority, support for a long list of public app store apps, and single sign on to enterprise systems. SAP MobileIron's infrastructure is appliance based and more difficult to monitor for availability and performance than many competitive products. MobileIron has a SaaS version of its EMM product as well as an on premises version, and there is not feature parity between the two versions. Reporting is a challenge with MobileIron, in terms of building customized reports and scheduling. SAP Mobile Secure is a suite of products that includes Afaria (on premises MDM), SAP MDM (SaaS based MDM), SAP Mobile App Protection by Mocana (for MAM) and SAP Mobile Documents (for MCM and EFSS). SAP also released a SaaS edition of SAP Mobile Secure in Mobile Secure benefits from SAP's breadth of assets, including SAP business intelligence, to deliver a unique administrator dashboard experience. SAP Mobile Secure's primary differentiation lies in its ability to integrate and support SAP products. SAP Mobile Secure is a good fit for companies that own SAP products and value the extension of those products within a single vendor's offering, although the product does not require an existing SAP back end. Organizations can build and wrap certificate signed SAP Fiori apps and custom apps built on SAP Mobile Platform or SAP Hana Cloud Platform mobile services. SAP Mobile Secure's reporting is strong. It provides nice visualizations and intuitive ways to create custom reports. SAP has good Android for Work support, including the ability to wrap applications with Android for Work security capabilities for pre Android L devices. 2HF4VDW&ct=150608&st=sb 5/10

6 Sophos The SAP Mobile Secure administrative interface is disjointed, with MDM, MAM and MCM residing in separate consoles. Several of the references using Afaria were running older versions of software due to their experience of challenges with Afaria updates. SAP Mobile Secure lacks a proprietary secure PIM capability. Sophos' EMM product is part of a broader strategy aimed at securing PCs and mobile devices through a combination of endpoint and network based technologies. Sophos Cloud provides this broad set of capabilities, although Sophos also sells EMM as a stand alone offering through Sophos Mobile Control (SMC). SMC is one of the few products to provide a form of digital rights management as a core component in its MCM. Gartner frequently sees SMC deployments with small and midsize businesses, but rarely in large enterprise customers' sites. Sophos is a good fit for organizations looking for integrated endpoint protection and EMM from the same console. Sophos' MCM encrypts files leaving a PC or mobile device to prevent data leakage. This integrates with third party file storage providers and enables companies to securely use low cost third party storage. Most of Sophos' references cited ease of administration and use as a significant product strength. SMC directly integrates security capabilities, such as anti malware, Web security, unified threat management (UTM) gateways from Sophos, Cisco integrated development environment (IDE), and Check Point for easier enablement of remote access. Soti Sophos can be slower to support the latest advancements in mobile technology than the leading vendors' technology; for example, it does not plan to support Android for Work until later in SMC has limited role based administration, which can be an issue, particularly for large organizations. Sophos MAM functionality is limited to a mobile SDK. Therefore, organizations looking to deploy third party developed apps must build in additional security that other EMM vendors provide as a core portion of their products. Soti has deep roots in the dedicated purpose device management space. Its MobiControl Android+ technology, which allows MobiControl to manage Android devices with a high degree of control and configuration management capability, remains a differentiator. The company has maintained its affinity for the Android platform in version 12.1 with same day support for Android for Work, and its comprehensive management of this platform solidifies Soti's position as a leading EMM product for Android environments. Soti is used less frequently as an EMM product where BYOD is the predominant scenario, and we sometimes find Soti customers using another EMM products for ios, Windows Phone and Mac OS X devices. Soti is a good fit for organizations that require broad EMM capabilities, especially those making a heavy investment in Android mobile devices. Soti's extensive experience with and comprehensive support for Android makes it one of the strongest EMM solutions for this platform. MobiControl has strong remote support capabilities, with full remote control for Android devices and remote viewing for SDK enabled ios apps. MobiControl implements sophisticated geofencing capabilities based on polygonal perimeters, depending on devices in use. While Soti has strong support for Android (and legacy Windows Mobile), it has a relatively small percentage of ios devices under management. While 24/7 support is available to "Advantage" and "Enterprise Support" customers, direct support from named technical account managers is available only weekdays from 9 a.m. to 5 p.m. in the customer's local time zone. The published SLAs for escalations during off hours and weekends for any issue that requires product development to be involved are tied to business hours of Soti headquarters. Customers have reported product stability to be an occasional issue with Soti. Vendors Added and Dropped We review and adjust our inclusion criteria for Magic Quadrants and MarketScopes as markets change. As a result of these adjustments, the mix of vendors in any Magic Quadrant or MarketScope may change over time. A vendor's appearance in a Magic Quadrant or MarketScope one year and not the next does not necessarily indicate that we have changed our opinion of that vendor. It may be a reflection of a change in the market and, therefore, changed evaluation criteria, or of a change of focus by that vendor. Added Microsoft Dropped Symantec: Symantec did not have the revenue necessary for inclusion. We believe Symantec will continue to support current EMM customers but will focus R&D on adjacent mobile security technologies, such as DLP, authentication and identity management. Tangoe: Tangoe focuses on the telecom expense management (TEM) and managed mobility services (MMS) markets. As the EMM market continues to move quickly, Tangoe has decided to partner with EMM vendors to provide an integrated MMS TEM offering. Absolute Software: Absolute is a strong player in the client management tool space and sees MDM 2HF4VDW&ct=150608&st=sb 6/10

7 as a component of its Absolute Manage product. The EMM market has been moving quickly on the MAM and MCM fronts, and Absolute has not invested aggressively in these areas. Absolute Software is still a good choice for organizations looking to extend MDM from their client management tool consoles. Inclusion and Exclusion Criteria More than 100 vendors offer EMM functions. We developed inclusion criteria involving a combination of business metrics and technical capabilities. Each vendor in the Magic Quadrant must meet the following criteria: The vendor must have at least $12 million in 2014 EMM revenue. There must be five references from organizations using the EMM product in production. The vendor must offer EMM support for ios, Android and Windows Phone. The vendor must provide MDM, MAM through app wrapping or an SDK, and MCM. Many EMM products provide functions beyond those already listed. Some features were considered optional and not necessarily critical criteria for comparison. For example: Advanced MAM that manages PIMs, browsers and other applications Support for Mac OS X and Windows Mobile identity and access through capabilities such as certificate management, enabling single signon on mobile devices, and executing "contextual authentication" through dynamic conditions, such as time, location, user and device posture Mobile analytics to understand usage trends and support troubleshooting File level protections to protect data consumed or created in a mobile context Many vendors were considered for the Magic Quadrant but did not qualify because they did not meet the business metrics or the technical capabilities required for inclusion. The following are a few vendors that have increased their investments in EMM but lacked the product completeness or established track record to qualify for inclusion: Centrify has offered a free EMM for several years, with an option to buy into a fully supported product. During 2014, Centrify was endorsed by Samsung as a Knox EMM provider. During the review period for this report, Centrify was unable to meet sales thresholds for market size inclusion. Centrify is separately pursuing secure server connections as alternatives to per app VPNs. Cisco's EMM offering is marketed under the Meraki brand and has garnered significant interest for organizations early in the process of selecting an MDM with little or no prior experience of deploying one. Cisco does not currently have a MAM module and did not meet the revenue inclusion requirements. Oracle, a leading global ISV and database company that acquired Bitzer Mobile, offers basic EMM, app wrapping, per app mobile VPN and scalable mobile identity management. Pricing is attractive, and the mobile framework integrates well with Oracle business apps. Oracle's mobility solution has been available for too short a time to qualify for inclusion based on market presence, but is expected to be increasingly competitive in Support needs to be expanded to more platforms; currently, it is available only for ios and a limited number of Android models. Evaluation Criteria Ability to Execute The Ability to Execute axis measures the vendors' ability to meet the current needs of EMM buyers, as well as their ability to succeed in this market by gaining market share and achieving revenue growth. Product/Service: What features are provided, and does the vendor have customers using these features successfully in production environments? Overall Viability: This criterion evaluates the size of the vendor and its financial performance. We also evaluated the size and growth of the vendor's EMM business. Sales Execution/Pricing: This criterion was influenced by the frequency of the vendor's appearance on buyers' shortlists. We also evaluated the degree to which the vendor has a presence in North America, Europe, Latin America and the Asia/Pacific region. Market Responsiveness/Record: We evaluated execution on delivering products consistently and in a timely fashion, the agility to meet new market demands, and how well the vendor received customer feedback and quickly built it into the product. We looked at the vendor's ability to meet promised timelines. Marketing Execution: This is a measure of brand and mind share through client references and channel partner feedback. We evaluated the degree to which customers and partners have positive identification with the EMM product, and whether the vendor has credibility in this market. We also used search hits on gartner.com for the vendor and product as a measure of brand recognition and market awareness. Customer Experience: We assessed the vendor's reputation in the market based on customer feedback regarding customers' experiences working with the vendor, whether they were glad they chose the vendor's product and whether they planned to continue working with the vendor. Operations: This refers to the ability of the organization to meet its goals and commitments. Factors include the quality of the organizational structure, including skills, experiences, programs, systems and other vehicles that enable the organization to operate effectively and efficiently on an ongoing basis. Table 1. Ability to Execute Evaluation Criteria Evaluation Criteria Weighting 2HF4VDW&ct=150608&st=sb 7/10

8 Product or Service Overall Viability Sales Execution/Pricing Market Responsiveness/Record Marketing Execution Customer Experience Operations Source: Gartner (June 2015) Standard Standard None Completeness of Vision The Completeness of Vision scale provides an aggregate measure of a vendor's likelihood of future success in the EMM market. We evaluated vendors' statements about product direction, the degree to which current capabilities map to future demands, and the vendor's focus on EMM requirements. Market Understanding: This criterion evaluated vendor capabilities against future market requirements. It takes into consideration the evolution of the buyer for EMM suites, and whether the vendor will remain focused on meeting the buyer's needs. Marketing Strategy: This criterion considered how EMM technology and value are positioned. The marketing strategy must be aligned with the evolution of the EMM buying center and its requirements. Sales Strategy: This criterion evaluated the vendor's route to market (for example, direct versus indirect sales) and the strength of the offerings that go to market with the vendor's EMM tools (for example, endpoint management, file sync and share, desktop virtualization, and endpoint security). We also evaluated the vendor's pricing models and whether they map to customer requirements. Offering (Product) Strategy: This describes the degree to which vendors have plans to deliver differentiated functionality and have a timely roadmap to provide that functionality. Business Model: This considers the vendor's business model for its EMM product and whether it ensures future investment and success in the EMM market. Innovation: This evaluated the vendor's plans to meet customer needs that extend beyond conventional EMM technology. Geographic Strategy: This refers to the vendor's strategy to direct resources, skills and offerings to meet the specific needs of geographies outside the vendor's home or native geography, either directly or through partners, channels and subsidiaries, as appropriate for the geography and market. Table 2. Completeness of Vision Evaluation Criteria Evaluation Criteria Weighting Market Understanding Marketing Strategy Sales Strategy Offering (Product) Strategy Business Model Vertical/Industry Strategy Innovation Geographic Strategy Source: Gartner (June 2015) Standard Standard Not Weighted Standard Quadrant Descriptions Leaders Leaders have the highest product revenue in the EMM market, several years of proven customer implementations, customer mind share, and extensive partnerships with channel and other technology providers. They have the most complete products in the EMM market. Their companies are aligned with the trends of the EMM market. They possess product roadmaps that (if executed upon) would establish continued differentiation in the market. Leaders also demonstrate commitment to the EMM market. Overall, they have a strategy that creates a high likelihood of success in this market. Challengers Challengers possess a strong ability to execute, demonstrated by high product revenue and a large customer base. The vendor's considerable resources ensure long term viability. Challengers may have solid products but lack the product commitment to lead the market. They are not as closely aligned with the most important EMM market trends, and they do not have a roadmap that demonstrates compelling differentiation from other EMM products. Visionaries Visionaries have unique capabilities in certain aspects of EMM. They meet the requirements of customers that place a high priority in certain critical EMM areas. They may not have the product completeness, support capability, business performance, mind share or track record compared with leading vendors. 2HF4VDW&ct=150608&st=sb 8/10

9 Niche Players Niche Players are often excellent choices for organizations. Niche Players do not have the product completeness, revenue, mind share and track record of Leaders or Challengers. Their product roadmaps typically represent a strategy of following the market, rather than leading it. In some cases, this is due to a vendor's lack of resources. Often, many of the niche EMM products are extensions of other management, security or mobility products from those vendors. If a customer does not require best ofbreed capability, it may be best served by a Niche Player that may have an easier or less expensive way to meet EMM requirements, compared with Leaders or Challengers, for example. Context Organizations use EMM tools to integrate mobility into their business workflow. There are many factors that determine the appropriate vendor and product for your organization. The vendor must demonstrate the ability to keep up with the fast pace of mobile device change. Organizations must also factor the EMM vendor's ability to support the enterprise's critical mobile applications and integrate with its IT infrastructure (for example, public key infrastructure [PKI], VPN, wireless networking, identity and access management platforms). EMM product requirements change as mobile platforms change. Keep abreast of these changes; engage Gartner analysts regularly to understand the changing mobile device landscape and the implications for mobility management. Best practices are to create your requirements first, consider all the possible mobile scenarios you may have in your organization, such as BYOD and use cases specific to your organization, and then create a shortlist of vendors. Do not choose vendors simply on the basis of their position in the Magic Quadrant. Market Overview Gartner estimates that the average enterprise has deployed between eight and 15 mobile applications to its employees. Where mobile strategy previously consisted wholly of basic, horizontal productivity tools like , contacts and calendar, role specific and mission critical apps and data are increasingly the bulk of what is being pushed to users' mobile devices. As this trend matures, the need for application level controls and reporting along with the ability to deliver and consume a growing number of content types is at the heart of many mobile strategies. The tools to manage mobility are no longer sufficient if their purpose is solely to manage device hardware functions. An ability to provide managed access, deliver and manage mobile apps, and facilitate access to content on tablets and smartphones is the expanded set of core features demanded of EMM tools. Mobile Identity and Access Users no longer have a single device. They now frequently have a smartphone, a tablet and a laptop and, more often than not, they want to use devices as part of a BYOD program. As a result, it has become important to determine not just who is connected to the network but whether they are connected with a corporate authorized device. This is why Gartner recognizes mobile identity as a key pillar in EMM. Mobile identity is typically done using digital certificates but can be accomplished with a variety of other technologies, including biometric and token based authentication. The next wave of mobile identity is contextually based, with authentication identifying not only the user and device, but where and how a user connects to the network (that is, in the office, at home, on a public Wi Fi, or out of the country), and based on these contextual values, granting the user different levels of access. Over the next three years, Gartner expects contextually based mobile identity to become standard functionality within EMM products. EMM Executes File Level Protection at the Edge Protecting enterprise data on mobile devices has traditionally been based on a multipronged approach of encryption of data at rest, in use and in motion, as well as device and app level policies, such as screen lock timeouts, PIN enforcement and "open in" restrictions. However, these oblique protection approaches are incomplete, because once data leaves managed devices and networks, such protection schemes are rendered moot. Users can and often do get around such controls by ing enterprise data to outside parties or personal accounts, or copying data to their PCs, where open in restrictions are absent. In response, there is a growing need to protect data intrinsically, and/or implement a rights managementbased approach to mobile data protection. File level encryption products encrypt the individual files themselves (rather than simply encrypting stored data and network tunnels) and facilitate managed file access through PKI, such that data can be protected wherever it is stored or accessed. No one without the encryption keys can access files protected in this manner. Rights management products extend identity and access management frameworks to allow control over file operations, in addition to file access. These products allow an organization to restrict, for instance, who has permissions to read, edit or delete a file, or forward a file via . Such products typically also facilitate file level encryption as part of their mobile data protection schemes. Effective data classification is thus critical in making a rights management approach work in a given environment. Some EMM vendors are building file level protection and/or rights management capabilities as adjuncts to their core products, while others are tightly integrating their EMM systems with general purpose identity and access management products synergistically to enable this. As with device, app or content level policies, EMM should provide a single point of administration for encryption and access/rights policies where these capabilities are present. EMM Is the "Glue" EMM is the starting point, if you are planning to opt into managing anything on a mobile platform. Since it is the presumptive foothold agent, EMM is the logical choice to broker policies for other services and tools on the platform. EMM provides a common, cross platform baseline to set, contain, validate, enforce and update device policies for gateways, proxies, VPNs, network access controls and certificates, application certificates, content and rights management systems, identity and access management, version controls, backups, system updates, device initialization as well as wipe, and countless other practice areas that enter the mobile space from adjacent markets. As a single point of policy and accountability, EMM provides the opportunity to avoid agent bloat, which is so often seen on PCs, where an endless parade of add on utilities steal local resources, duplicate, and complicate the task of policy 2HF4VDW&ct=150608&st=sb 9/10

10 coordination for system administrators. PCs have the resources to cope with this situation, but users of small mobile devices and particularly BYOD cannot succeed with so much unnecessary complexity. Unified Endpoint Management Organizations have historically used different management tools for PCs and mobile devices. IT organizations are increasingly consolidating their PC and mobile device support groups and treating their devices as "endpoints." Meanwhile, the PC and mobile architectures continue to fuse together, blurring the boundaries between the EMM and client management tool capabilities. This trend continues with Windows 10, which added to the MDM APIs introduced with Windows 8.1. This presents organizations with the potential to manage PCs with either EMM tools or agent based client management tools. Large organizations will adopt both approaches based on user segmentation. As Win32 applications decline in number, organizations will manage PCs, smartphones and tablets with the same toolset. This is easier said than done, as Win32 applications still provide many critical functions for the majority of organizations today. It will take several years for most organizations to get to this point. Once organizations have retired their Win32 applications, the descriptor "unified" will not be necessary, at which point, the term will be "endpoint management." Unified endpoint management is not limited to PCs, tablets and smartphones. Smart devices, broadly grouped as the "Internet of Things" (IoT), will increasingly become included in unified endpoint management. Devices such as Apple TVs, printers and smartwatches are identifiable examples of IoT devices managed by EMM tools today. Not all IoT objects will fall under the realm of EMM tools, however. Some devices may be managed directly by manufacturers. Other types of devices will have proprietary management tools. And many devices will not need to be managed at all. However, it is clear that the diversity and number of devices will continue to grow, and IT organizations must be ready Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner s prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner s research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner s Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see Guiding Principles on Independence and Objectivity. About Gartner Careers Newsroom Policies Site Index IT Glossary Contact Gartner 2HF4VDW&ct=150608&st=sb 10/10

Magic Quadrant for Enterprise Mobility Management Suites

Magic Quadrant for Enterprise Mobility Management Suites Magic Quadrant for Enterprise Mobility Management Suites 8 June 2015 ID:G00265477 Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, John Girard, Bryan Taylor VIEW SUMMARY Enterprise mobility management

More information

Implement Mobile Device Management to Deploy HCSS Mobile Apps

Implement Mobile Device Management to Deploy HCSS Mobile Apps Implement Mobile Device Management to Deploy HCSS Mobile Apps A guide to MDM & EMM product selection Femi Ariyo Femi@hcss.com Our Goal Understand mobile device management and its benefits Examine different

More information

Critical Capabilities for Enterprise Mobility Management Suites

Critical Capabilities for Enterprise Mobility Management Suites G00265601 Critical Capabilities for Enterprise Mobility Management Suites Published: 9 June 2015 Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, John Girard, Bryan Taylor EMM products have become

More information

Magic Quadrant for Enterprise Mobility Management Suites

Magic Quadrant for Enterprise Mobility Management Suites Magic Quadrant for Enterprise Mobility Management Suites 3 June 2014 ID:G00261703 Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, Bryan Taylor, John Girard, Monica Basso VIEW SUMMARY EVALUATION

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 22 May 2014 ID:G00260863 Analyst(s): Kevin Knox, Terrence Cosgrove VIEW SUMMARY EVALUATION CRITERIA DEFINITIONS New client management tool capabilities have emerged

More information

Ability to Execute. What You Need to Know

Ability to Execute. What You Need to Know 1 of 10 11/30/2010 1:00 PM 28 July 2010 Bern Elliot, Steve Blood Gartner RAS Core Research Note G00201349 Unified communications offers the ability to improve how individuals, groups and companies interact

More information

Magic Quadrant for Enterprise Mobility Management Suites

Magic Quadrant for Enterprise Mobility Management Suites G00261703 Magic Quadrant for Enterprise Mobility Management Suites Published: 3 June 2014 Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, Bryan Taylor, John Girard, Monica Basso The mobile device

More information

The Forrester Wave : Enterprise Mobile Management, Q4 2015

The Forrester Wave : Enterprise Mobile Management, Q4 2015 The Forrester Wave : Enterprise Mobile Management, Q4 2015 by Christian Kane Why Read This Report In Forrester s 25-criteria evaluation of enterprise mobile management (EMM) vendors, we identified the

More information

Magic Quadrant for Global Enterprise Desktops and Notebooks

Magic Quadrant for Global Enterprise Desktops and Notebooks Magic Quadrant for Global Enterprise Desktops and Notebooks Gartner RAS Core Research Note G00207470, Stephen Kleynhans, 10 November 2010, R3553 11302011 In the general PC market, price is often the main

More information

Case Study & POC & Demos Information

Case Study & POC & Demos Information Case Study & POC & Demos Information Type: Case Study Name: Multichannel Campaign Management (MCCM) Description: The IBM Company seeks, as vendor, through the multichannel campaign management (MCCM) services,

More information

AirWatch Solution Overview

AirWatch Solution Overview AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server

More information

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally

More information

Mobile App Containers: Product Or Feature?

Mobile App Containers: Product Or Feature? ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating

More information

Magic Quadrant for Enterprise Mobility Management Suites

Magic Quadrant for Enterprise Mobility Management Suites Magic Quadrant for Enterprise Mobility Management Suites 3 June 2014 ID:G00261703 Analyst(s): Terrence Cosgrove, Rob Smith, Chris Silva, Bryan Taylor, John Girard, Monica Basso VIEW SUMMARY EVALUATION

More information

The top five enterprise mobility management vendors: product focus and financials

The top five enterprise mobility management vendors: product focus and financials The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest

More information

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt

Mobile Device Management. Andrius Šaveiko andrius.saveiko@atea.lt Mobile Device Management Andrius Šaveiko andrius.saveiko@atea.lt Content Mobile Device Management (MDM) where to start? Situation on MDM market MDM solutions very similar, but very different ios, Android,

More information

Enterprise mobile management a need or an option?

Enterprise mobile management a need or an option? perspective Enterprise mobile management a need or an option? - Payal Patel, Jagdish Vasishtha (Jags) Abstract Even as native platforms are growing tighter with security features, the enterprise mobile

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools G00247238 Magic Quadrant for Client Management Tools Published: 9 April 2013 Analyst(s): Terrence Cosgrove The client management tool market is maturing and evolving to adapt to consumerization, desktop

More information

What We Do: Simplify Enterprise Mobility

What We Do: Simplify Enterprise Mobility What We Do: Simplify Enterprise Mobility AirWatch by VMware is the global leader in enterprise-grade mobility solutions across every device, every operating system and every mobile deployment. Our scalable

More information

Securing Office 365 with MobileIron

Securing Office 365 with MobileIron Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,

More information

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device

How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population

More information

Solve BYOD with! Workspace as a Service!

Solve BYOD with! Workspace as a Service! Solve BYOD with! Workspace as a Service! Our Team Understands End User Computing Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology

More information

MobileIron and Samsung Value Proposition

MobileIron and Samsung Value Proposition MobileIron and Samsung Value Proposition Focused on customer success 4000+ 24x7 200+ 97% customers globally Operating globally of Fortune 500 / Global 2000 customer support satisfaction 8 of top 10 global

More information

RESEARCH NOTE Number: 2014-37 September 17, 2014

RESEARCH NOTE Number: 2014-37 September 17, 2014 Author: Jim Lundy Topic: Mobile Issue: Who are the vendors that are battling to lead the mobile computing revolution? The Aragon Research Globe for Enterprise Mobile Management Software, 2014 Summary:

More information

IT Self Service and BYOD Markku A Suistola

IT Self Service and BYOD Markku A Suistola IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling

More information

IBM United States Software Announcement 215-078, dated February 3, 2015

IBM United States Software Announcement 215-078, dated February 3, 2015 IBM United States Software Announcement 215-078, dated February 3, 2015 solutions provide a comprehensive, secure, and cloud-based enterprise mobility management platform to protect your devices, apps,

More information

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean

Making the Enterprise Mobile First. Riccardo Canetta Regional Sales Director, Mediterranean Making the Enterprise Mobile First Riccardo Canetta Regional Sales Director, Mediterranean 1960+ 1980+ 1995+ 2010+ Past technology transitions Change the way people work Mainframe Era PC Era Internet Era

More information

Unlike the general notebook market, in which

Unlike the general notebook market, in which Magic Quadrant for Global Enterprise Notebook PCs, 2H05 Gartner RAS Core Research Note G00133054, Mikako Kitagawa, Brian Gammage, Leslie Fiering, 12 January 2006, R1662 07222006. Unlike the general notebook

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Key Requirements of Enterprise Mobility Management Solutions

Key Requirements of Enterprise Mobility Management Solutions Key Requirements of Enterprise Mobility Management Solutions By Jack Madden, BrianMadden.com Contents Introduction. 1 Understanding the EMM World. 1 Critical EMM Capabilities. 3 A Note about BYOD. 8 Conclusion:

More information

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake

EFFECTIVE BYOD. A presentation by: Tzachy Givaty, CommuniTake EFFECTIVE BYOD A presentation by: Tzachy Givaty, CommuniTake MOBILITY TRENDS 2 MOBILITY TRENDS The Mobile-First organisation Apps drive the business BYOD On device data security - anti Cyber Crime 3 MOBILITY

More information

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com

MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360

More information

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system

MobileIron. Hendrik Van De Velde Exclusive Mobile Eco-system MobileIron Hendrik Van De Velde Exclusive Mobile Eco-system Agenda MobileIron Company and Vision Mobile First and Mobile IT The MobileIron Solution Mobile Device Management Mobile Application Management

More information

Enterprise Mobility Services

Enterprise Mobility Services Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools G00225953 Magic Quadrant for Client Management Tools Published: 31 January 2012 Analyst(s): Terrence Cosgrove We have renamed the Magic Quadrant for PC Configuration Life Cycle Management due to the emergence

More information

Magic Quadrant for Client Management Tools

Magic Quadrant for Client Management Tools Magic Quadrant for Client Management Tools 31 January 2012 ID:G00225953 Analyst(s): Terrence Cosgrove VIEW SUMMARY We have renamed the Magic Quadrant for PC Configuration Life Cycle Management due to the

More information

Mobile device and application management. Speaker Name Date

Mobile device and application management. Speaker Name Date Mobile device and application management Speaker Name Date 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two or more

More information

BEST PRACTICES IN BYOD

BEST PRACTICES IN BYOD 1 BEST PRACTICES IN BYOD Addressing BYOD Challenges in the Enterprise Whitepaper 2 Best Practices in BYOD Bring Your Own Device (BYOD) offers many potential advantages: enhanced productivity, increased

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Symantec Mobile Management 7.2

Symantec Mobile Management 7.2 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology

More information

Enterprise Mobility: The Impact of Changing Employee Behaviour

Enterprise Mobility: The Impact of Changing Employee Behaviour Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent

More information

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology

MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s

More information

Kony Mobile Application Management (MAM)

Kony Mobile Application Management (MAM) Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune

Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Infrastructure Deployment for Mobile Device Management with Microsoft System Center Configuration Manager and Windows Intune Enrollment and Management of Mobile Devices with Microsoft System Center Configuration

More information

Symantec Mobile Management Suite

Symantec Mobile Management Suite Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the

More information

IT Resource Management & Mobile Data Protection vs. User Empowerment

IT Resource Management & Mobile Data Protection vs. User Empowerment Enterprise Mobility Management Buyers Guide IT Resource Management & Mobile Data Protection vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity

More information

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?

BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD? BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile

More information

BYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015-2020

BYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015-2020 Brochure More information from http://www.researchandmarkets.com/reports/3196269/ BYOD in Enterprise Applications and Cloud Environment: Market Challenge and Opportunity Analysis 2015-2020 Description:

More information

Mobile Security and Management Opportunities for Telcos and Service Providers

Mobile Security and Management Opportunities for Telcos and Service Providers Mobile Security and Management Opportunities for Telcos and Service Providers Lionel Gonzalez Symantec EMEA Solution architect Mike Gibson Protirus Brice Renaud Orange Business Services ST B03 - Mobile

More information

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management

AirWatch Enterprise Mobility Management. AirWatch Enterprise Mobility Management Device Vendor Comparisons Deployment options ( + / -) Vendor for On premises Cloud/SaaS and other platforms supported (+ / -) Vendor for ios Android Extended Android APIs Knox, Safe Safe BlackBerry Windows

More information

Microsoft Enterprise Mobility Suite

Microsoft Enterprise Mobility Suite Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com

More information

What Is Cisco Mobile Workspace Solution?

What Is Cisco Mobile Workspace Solution? Solution Overview Cisco Mobile Workspace Solution A Whole New Level of Worker Mobility Basic mobile connectivity for employees using personal devices has been around for a while, bringing both benefits

More information

The ForeScout Difference

The ForeScout Difference The ForeScout Difference Mobile Device Management (MDM) can help IT security managers secure mobile and the sensitive corporate data that is frequently stored on such. However, ForeScout delivers a complete

More information

Magic Quadrant for CRM Service Providers, North

Magic Quadrant for CRM Service Providers, North Magic Quadrant for CRM Service Providers, North America 30 August 2010 Matthew Goldman, Ed Thompson Gartner RAS Core Research Note G00205524 Demand for CRM project-based consulting and implementation services

More information

Choosing an MDM Platform

Choosing an MDM Platform Whitepaper Choosing an MDM Platform Where to Start the Conversation 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com

Total Enterprise Mobility. Norbert Elek norbert_elek@hu.ibm.com www.maas360.com Total Enterprise Mobility Norbert Elek norbert_elek@hu.ibm.com www.maas360.com We Understand Your Mobility Challenges Bring your own device Support multiple platforms Increase productivity Reduce security

More information

IBM MobileFirst Managed Mobility

IBM MobileFirst Managed Mobility Enterprise Mobility IBM MobileFirst Managed Mobility Service Profile 1 The service 2Service components 3Transition/ deployment 4Service delivery 5Getting started A brief summary of the service and the

More information

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details

Agenda. Enterprise challenges. Hybrid identity. Mobile device management. Data protection. Offering details Agenda Enterprise challenges Hybrid identity Mobile device management Data protection Offering details 2 The time to address enterprise mobility is now 29% of today s global workforce use 3+ devices, work

More information

The Forrester Wave : Enterprise Mobile Management, Q3 2014

The Forrester Wave : Enterprise Mobile Management, Q3 2014 For: Infrastructure & Operations Professionals The Forrester Wave : Enterprise Mobile Management, Q3 2014 by Christian Kane, Tyler Shields, September 30, 2014 Key Takeaways IBM, Citrix, MobileIron, AirWatch

More information

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware

How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global

More information

Symantec Mobile Management for Configuration Manager 7.2

Symantec Mobile Management for Configuration Manager 7.2 Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices

More information

ForeScout MDM Enterprise

ForeScout MDM Enterprise Highlights Features Automated real-time detection of mobile Seamless enrollment & installation of MDM agents on unmanaged Policy-based blocking of unauthorized Identify corporate vs. personal Identify

More information

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult. Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources. The explosion of devices is eroding the standards-based approach to corporate IT. Deploying

More information

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite

SOLUTION BRIEF Enterprise Mobility Management. Critical Elements of an Enterprise Mobility Management Suite SOLUTION BRIEF Enterprise Mobility Management Critical Elements of an Enterprise Mobility Management Suite CA Technologies is unique in delivering Enterprise Mobility Management: the integration of the

More information

Sophos Acquires Cyberoam

Sophos Acquires Cyberoam Sophos Acquires Cyberoam Frequently Asked Questions Table of Contents FAQ... 2 What is Sophos announcing?... 2 Who is Cyberoam?... 2 Why is Sophos acquiring Cyberoam?... 2 Why is Sophos acquiring Cyberoam

More information

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service

BYOD How-To Guide. Securely deliver business applications and data to BYOD using Workspace as a Service BYOD How-To Guide Securely deliver business applications and data to BYOD using Workspace as a Service WORKSPOT UNDERSTANDS END USER COMPUTING AMITABH SINHA, CEO PUNEET CHAWLA, CTO (GM XenApp/XenDesktop,

More information

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity

Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Alexander De Houwer Technology Advisor Devices Win 10 Vincent Dal Technology Advisor Business Productivity Agenda INTRODUCTION (5 slides) WINDOWS 10 (10 slides) OFFICE 2016 (11 slides) Enterprise Mobility

More information

Total Enterprise Mobility

Total Enterprise Mobility Total Enterprise Mobility Presented by Wlodek Dymaczewski, IBM Wlodek Dymaczewski dymaczewski@pl.ibm.com www.maas360.com Top Enterprise Mobility Initiatives Embrace Bring Your Own Device (BYOD) Migrate

More information

Sophos Mobile Control - Competitive Overview

Sophos Mobile Control - Competitive Overview Sophos Mobile Control - Competitive Overview Content Page Introduction to MDM Market overview, positioning and discovery questions 2 Lightweight vs Heavy weight approaches 3 Competitive comparisons AirWatch

More information

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management

Symantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data

More information

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com

White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees

More information

Mobile Security Buyer s Guide

Mobile Security Buyer s Guide ANALYST BRIEF Mobile Security Buyer s Guide PART 1: THE BASICS Author Andrew Braunberg Overview The consumerization of information technology (IT), particularly relating to the increasingly common bring

More information

Embracing Complete BYOD Security with MDM and NAC

Embracing Complete BYOD Security with MDM and NAC Embracing Complete BYOD Security with MDM and NAC Clint Adams, CISSP, Director, Mobility Solutions Keith Glynn, CISSP, Sr. Technical Solutions Engineer August 22, 2013 Today s Speakers Clint Adams, CISSP

More information

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy

Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy Enterprise Solution & Business Revolution Enterprise Mobility Management Strategy PRESENTED BY: Giannis Loussidis EMM Landscape 2 Enterprise Mobility Management Landscape 77% of US and European businesses

More information

How To Protect Your Mobile Devices From Security Threats

How To Protect Your Mobile Devices From Security Threats Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has

More information

IT Enterprise Services

IT Enterprise Services IT Enterprise Services Enterprise Mobility Management...in the cloud. Powered by Is your enterprise mobile ready? The mobility challenge is on. By 2020 Gartner predict that 26 billion devices will be connected

More information

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173

More information

Ben Hall Technical Pre-Sales Manager

Ben Hall Technical Pre-Sales Manager Ben Hall Technical Pre-Sales Manager LANDESK MDM Solutions Mobility Manager (MDM in the Cloud) Secure User Management Suite with CSA LetMobile (Secure Mobile Email) Core MDM Functionality MDM Functionality

More information

Sophos Mobile Control

Sophos Mobile Control Sophos Mobile Control Enterprise Mobility Management - simplifed Joanna Wziątek-Ładosz Sales Engineer, Sophos 1 Why Sophos for EMM? Simple to learn and to operate Comprehensive self-service portal to reduce

More information

Mobile App Management:

Mobile App Management: Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management

More information

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players

Where are Organizations Today? The Cloud. The Current and Future State of IT When, Where, and How To Leverage the Cloud. The Cloud and the Players The Current and Future State of IT When, Where, and How To Leverage the The and the Players Software as a Service Citrix VMWare Google SalesForce.com Created and Presented by: Rand Morimoto, Ph.D., MCITP,

More information

How To Make Your Computer System More Secure And Secure

How To Make Your Computer System More Secure And Secure Unified Device Management with Windows Intune Andras Khan Microsoft Western Europe HQ Agenda What are the challenges we are seeing cross vertical Unified Device Management Strategy How Unified Device Management

More information

CHOOSING AN MDM PLATFORM

CHOOSING AN MDM PLATFORM CHOOSING AN MDM PLATFORM Where to Start the Conversation Whitepaper 2 Choosing an MDM Platform: Where to Start the Conversation There are dozens of MDM options on the market, each claiming to do more than

More information

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise

MobileIron for ios. Our Mobile IT Platform: Purpose-Built for Next Gen Mobility. MobileIron Platform: Accelerating ios Adoption in the Enterprise MobileIron for ios Mobile technology is driving a massive shift in the ability of IT to support the way people want to work. The adoption of smartphones and tablets has transformed the way users interact

More information

Brief History of Enterprise Mobility. Existing Stuff

Brief History of Enterprise Mobility. Existing Stuff Brief History of Enterprise Mobility Existing Stuff YOUR ASSETS ARE ON A PC TODAY YOU HAVE 50-500 APPS 90% ON-PREMISE 70% WEB 25% WINDOWS IT Owned IT Managed Domain Joined 90% CIFS 5% NATIVE 50% SHAREPOINT

More information

ITSM & Enterprise Mobility Management

ITSM & Enterprise Mobility Management ITSM & Enterprise Mobility Management Jason Lunghusen Introduction 1. Context - Client Computing 2012-2014 2. Context - ITS Our Service Management Maturity 3. You now own mobile telephony 4. What does

More information

Ensuring the security of your mobile business intelligence

Ensuring the security of your mobile business intelligence IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive

More information

2003 Desktop Software Distribution Magic Quadrant

2003 Desktop Software Distribution Magic Quadrant Markets, R. Colville Research Note 15 April 2003 2003 Desktop Software Distribution Magic Quadrant Software distribution is the critical component for desktop configuration management. Vendors in our Magic

More information

Okta Mobility Management

Okta Mobility Management Okta Mobility Management A User Centric Approach to Integrated Identity and Mobility Management Okta Inc. I 301 Brannan Street, Suite 300 I San Francisco CA, 94107 info@okta.com I 1-888-722-7871 Contents

More information

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS

ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS ENTERPRISE MOBILITY MANAGEMENT & REMOTE ACCESS SOLUTIONS Secure Remote Desktop & Application Access Mobile Device Management Mobile Content Management Mobile Email & PIM Secure Mobile Containerization

More information

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts

Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts Welcome! Thank you! mobco about mobile samsung about devices mobileiron about mobile IT accellion on mobile documents hands-on devices and race karts 2013 mobco MobileIron Hendrik Van De Velde Your regional

More information

Symantec Mobile Management 7.1

Symantec Mobile Management 7.1 Scalable, secure, and integrated device management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any previous technology,

More information

Jits Langedijk Sr. Consultant Jits.Langedijk@PQR.nl

Jits Langedijk Sr. Consultant Jits.Langedijk@PQR.nl 1 Jits Langedijk Sr. Consultant Jits.Langedijk@PQR.nl Tomorrow s Workspace Work is not a place, it s something you DO! Tomorrow s Workspace Application and Desktop Delivery Enterprise Mobility Management

More information

white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract

white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract white paper Enterprise Mobility Management Solution to Manage, Analyze and Control the Mobile Devices, Applications and Content Abstract This paper highlights what is the need of Enterprise Mobility Management

More information

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software

Magic Quadrant for Energy and Utilities Enterprise Asset Management Software Magic Quadrant for Energy and Utilities Enterprise Asset Management Software 29 September 2014 ID:G00263205 Analyst(s): Leif Eriksen, Kristian Steenstrup VIEW SUMMARY For energy and utility (including

More information

Mobile Security: The good, the bad, the way forward

Mobile Security: The good, the bad, the way forward Mobile Security: The good, the bad, the way forward Get the most out of HP s Mobility Protection Services Jan De Clercq, Felix Martin, HP TC, December, 2013 Today s Presenter Name Jan De Clercq Title &

More information

CA Enterprise Mobility Management MSO

CA Enterprise Mobility Management MSO SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.

More information