Laptop Displaying the GigaOm Research Portal

Get your Free GigaOm account today.

Access complimentary GigaOm content by signing up for a FREE GigaOm account today — or upgrade to premium for full access to the GigaOm research catalog. Join now and uncover what you’ve been missing!

GigaOm Radar for Unified Endpoint Management (UEM)v3.0

Table of Contents

  1. Executive Summary
  2. Market Categories and Deployment Types
  3. Decision Criteria Comparison
  4. GigaOm Radar
  5. Solution Insights
  6. Analyst’s Outlook
  7. About Paul Stringfellow

1. Executive Summary

Endpoint management is a significant challenge for organizations. Providing employees access to the data and services they require to do their jobs effectively, whether inside or outside a physical office, comes with significant risk. It demands that access be granted to one of the most important assets a business has—its data. To do this, organizations must solve two issues: how to provide access to the applications and data, and how to do so in a way that maintains security and control of business-critical data assets.

The goal is to find the right balance between user experience (UX) and enterprise control. Without that balance, numerous risks to business efficiency, competitiveness, and security are likely to be introduced. All of this has pushed organizations to rapidly evolve their endpoint management strategies, driving unified endpoint management (UEM) vendors to advance their solutions as well.

UEM solutions bring user and device management together into one view and enable organizations to:

  • Manage all devices through a single console.
  • Manage device lifecycle from enrollment to deactivation.
  • Ensure device sustainability.
  • Create and enforce security policies.
  • Patch and maintain devices and applications.
  • Enhance the user experience.
  • Ensure devices meet the requirements of an overall security strategy.

Effective UEM tools will help deliver a better user experience, improve operational efficiency, and ensure strong endpoint security is maintained.

This is our third year evaluating the UEM space in the context of our Key Criteria and Radar reports. This report builds on our previous analysis and considers how the market has evolved over the last year.

This GigaOm Radar report examines 13 of the top UEM solutions in the market and compares offerings against the capabilities (table stakes, key features, and emerging features) and non-functional requirements (business criteria) outlined in the companion Key Criteria report. Together, these reports provide an overview of the category and its underlying technology, identify leading UEM offerings, and help decision-makers evaluate these solutions so they can make a more informed investment decision.

GIGAOM KEY CRITERIA AND RADAR REPORTS

The GigaOm Key Criteria report provides a detailed decision framework for IT and executive leadership assessing enterprise technologies. Each report defines relevant functional and non-functional aspects of solutions in a sector. The Key Criteria report informs the GigaOm Radar report, which provides a forward-looking assessment of vendor solutions in the sector.