You are on page 1of 25

2019

MOBILITY MANAGEMENT
BUYER’S GUIDE

1
MOBILITY MANAGEMENT BUYER’S GUIDE

MARKET OVERVIEW
The mobility management space has evolved significantly in recent years. Traditionally called mobile
device management (MDM), the technology has been rebranded and is also known as Enterprise Mobility
Management (EMM). While this rebranding was trivial at first, it has become more significant in redefining
what MDM is. MDM is now part of EMM along with other components and works to protect every aspect of
mobile, not just the device itself. Unified Endpoint Management (UEM) is increasingly being used to manage
different types of endpoints, acting as an umbrella under which EMM and its components fit.

EMM offers users features such as provisioning, data protection, auditing, tracking, and reporting. To break
that down, EMM enables users to configure mobile devices, manage OS and app updates, as well as manage
the device life cycle. Users can also implement data encryption, manage data remediation, reduce data
loss, and accelerate the process of hiring and terminating employees. Additionally, an EMM suite can offer
hardware and software inventories, audit settings, and usage to verify compliance.

In your search for an EMM provider you will come to realize that many of the leading solutions now offer
multiple and bundled mobility components including: MDM, Mobile Application Management (MAM), UEM,
Mobile Content/Email Management (MCM/MEM), Mobile Collaboration, and Policy and Configuration
Management.

Out of these six components, UEM has markedly increased in popularity, so much so that analyst house,
Gartner, Inc. released a Magic Quadrant report on the marketplace. This is likely reflective of the proliferation
of diverse endpoints such as laptops, desktops, smartphones, wearables, and Internet of Things (IoT)
devices; all of which are difficult to manage without the single console that UEM solutions provide. However,
because the market is still emerging, businesses are not yet able to fully embrace UEM as a means to
manage all of their devices. Gartner projects that the number of businesses shifting to UEM will increase in
the next three years as the market grows.

What makes an EMM solution even more important is the value it holds for the future of your enterprise.
Computers are only becoming smaller; laptops and IoT devices are considered mobile devices to most of the
top solutions, not just smartphones. Sooner than you realize, all kinds of endpoints in the enterprise will be
a necessity as the lifestyle of the workplace continues to change. Ignore this and not only will you have less
efficient workers than your competitors, but employees will seek to work other places with more favorable
and modern work environments.

EMM is a necessity in the workplace, but that doesn’t mean finding the best tool for your business is simple.
Solutions Review has developed this buyer’s guide to assist those searching for the best possible tool to fit
the needs of their organization. This resource includes 10 essential questions to ask throughout the buying
process, along with full, one-page vendor profiles that provide a solution overview, three key features, contact
information, and our own ‘Bottom Line’ analysis. Companion research can be found at solutionsreview.com

Tess Hanna, Editor


Solutions Review

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 2
MOBILITY MANAGEMENT BUYER’S GUIDE

5 Questions You Should Ask When


Evaluating a Mobility Solution

How sophisticated is our mobile environment/strategy?


Users are accessing data through their devices more often, leaving that data at risk of theft or loss. EMM tools have evolved past
traditional MDM to address application, content, and data management. Consider your current mobile environment and look to
the future. If your needs go beyond focusing on the hardware and application and cost concerns that exist, then a comprehensive
EMM solution should be chosen over a more traditional MDM solution.

How will this new level of security and management impact employees?
Enterprise mobility calls for security and management, and with that comes a view into what a device is doing, its location, and
what is stored on it. Employee concerns around privacy can crop up, possibly leading to rejection of mobility programs or non-
compliance around policy. Ask vendors for their input to develop policies outlining the dos and don’ts of device usage. Users will
benefit from increased mobility, but those benefits should not be gained at the expense of user trust.

Do I have the internal IT resources to manage and maintain an MDM solution?


Typically, IT will be responsible for securing devices, applications, and the data stored on both all the while keeping up with
compliance needs and regulation. EMM solutions are meant to alleviate some of the burden mobility brings, but first, evaluate your
internal team and understand what they can handle. EMM can save time, effort, and money in the long run, but if the solution you
choose isn’t the right fit, it can become clunky and cost prohibitive.

How will we ensure compliance and decrease risk?


Monitoring tools or asset tracking can help you maintain a certain level of compliance, but some of these functions are more
reactive then proactive. Waivers, forms and policy agreements are typically needed before access to the network and corporate
data is granted. To ensure compliance and policy integrity, communication and education is the best policy. By communicating
rules and regulations directly to users, you can feel better about there being a true understanding of your mobile policies.

What specifications and MDM functions will our enterprise mobility policy entail?
Each Enterprise Mobility Management vendor offers something different, so it’s important to be aware of your organization’s
mobility needs, as well as how employees use their mobile devices. For example, if your employees are using multiple diverse
endpoints, finding a solution with Unified Endpoint Management (UEM) capabilities would be critical. Other functions offered by
EMM can include data encryption, data management, device management, data protection, and application management.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 3
MOBILITY MANAGEMENT BUYER’S GUIDE

5 Questions You Should Ask Your


Potential Mobility Provider

How hard will it be to integrate your MDM solution into my existing infrastructure?
Mobility implementations can be hard enough on a small scale. That is why it is important to truly understand how a MDM
solution will integrate into your current architecture and what the implementation process looks like before getting started. Look
for solutions with simple installation requirements, distributed control, and scalability suitable for your organization’s size and
structure.

How do you maintain or improve the user experience?


A negative user experience can be more than just a nuisance for the employees of your company. If users start to find ways around
the rules you have set and technology you have implemented because they are too inconvenient, you may experience security
breaches you hadn’t anticipated in addition to the potential for decreased productivity. Collaborate with IT and your employees to
protect data without infringing on user privacy.

How flexible is the MDM architecture and solution?


With new operating systems, device features, and capabilities seemingly entering the market on a monthly basis, making a choice
can be difficult. That is why it will be very important for you to find out how adaptable, flexible, and scalable a provider’s solution is.
Choosing a tool that isn’t designed to be flexible will become a real problem as new devices continue to be introduced and become
part of the mix. Keep in mind your needs for the future as switching solutions may prove to be a difficult process.

What aspects of mobility do I need to manage?


Knowing what actually needs to be managed can help guide you in your purchasing decision. Additionally, you need to consider
whether to approach the process with an aim to shop for the best single solution that covers everything, or to look for the best
solution for each particular area of mobility and then try to integrate them all together.

With the rise in BYOD, does your solution offer containerization?


BYOD offers great options for employees, but it can also present a tough mix of personal and corporate data for IT to have to
manage. In the instance of device exceptions, actions such as remote wiping or locking may need to be taken. Solutions offering
containerization can help prevent some of the issues organizations face when allowing for BYOD. For example, containers can
separate personal and corporate data, so that data is safe while using their personal device in a corporate environment.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 4
MOBILITY MANAGEMENT BUYER’S GUIDE

Solution Provider Profiles


6 ....................................................................................... 42Gears

7 ....................................................................................... Amtel Net Plus

8 ....................................................................................... Blackberry

9 ....................................................................................... CA Technologies

10 ..................................................................................... Centrify

11 ..................................................................................... Citrix

12 ..................................................................................... FileWave

13 ..................................................................................... Hexnode

14 ..................................................................................... Hypori

15 ..................................................................................... Ivanti

16 ..................................................................................... IBM MaaS360

17 ..................................................................................... ManageEngine

18 ..................................................................................... Microsoft

19 ..................................................................................... Miradore

20 ..................................................................................... MobileIron

21 ..................................................................................... SOPHOS

22 ..................................................................................... SOTI

23 ..................................................................................... Symantec

24 ..................................................................................... VMware AirWatch

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 5
MOBILITY MANAGEMENT BUYER’S GUIDE

42Gears
42Gears is a Unified Endpoint Management (UEM) provider, offering Software 48521 Warm Springs Blvd
as a Service (SaaS) and on-prem solutions to secure, monitor, and manage all
Fremont, CA
business endpoints. 42Gears products support company-owned and employee-
owned devices built on Android, iOS, Windows, Linux, MacOS, and Wear OS United States
platforms. Organizations can remotely manage and support their digital +1 (408) 758-0205
infrastructure, secure company data, and control access to company assets. www.42gears.com
The company has also made efforts to support IoT management. Additionally,
42Gears has leveraged Artificial Intelligence to address mobility challenges.
42Gears products are widely used by customers in education, healthcare,
manufacturing, logistics, retail, and other verticals across the globe.

Key Features
Mobile Device Management
Configures devices to your specifications, optimizes their functionality, and secures your network and critical
data. SureMDM offers device and app provisioning, OS configuration, remote wipe, and remote viewing. The
tool provides app management, file synchronization and sharing, data security tools and support for corporate-
owned and personally-owned devices. It also facilitates remote troubleshooting of technical issues.

Mobile App Management


SureMDM app management helps IT manage apps on enrolled devices. Users can blacklist or whitelist apps and
control their access permissions. Also offers policy control to manage applications distributed to devices via
enterprise app stores and managed through SureMDM console. Additionally, provides app extensions that use
software development kit or wrapping to apply company policies for additional app level security.

Rugged Devices Management


Offers mobility management solution to secure and manage rugged handhelds across verticals. Supports
Windows Mobile operating systems starting from Windows CE 5, 6, 6.5 to 7 as well as Windows Mobile 5.X,
6.1 and 6.5 (professional/standard). It also supports native as well as MX Android operating systems. Device
Provisioning, tracking, remote control, profile management are some of the features offered for Rugged Device.

Bottom Line
42Gears’ Unified Endpoint Management solution is a highly scalable platform which enables IT teams to approach
mobility and endpoint management through the use of one management architecture. The architecture includes
AI, device, and app analytics capabilities for seamless administration of digital workspaces and company
owned devices. 42Gears was also listed as a “Visionary” in Gartner’s 2018 Magic Quadrant for Unified Endpoint
Management Tools. Though the provider’s solution does not yet offer support for Windows Autopilot and Microsoft
Graph APIs, its flexibility in terms of pricing and deployment models make it a good fit for mid-size organizations.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 6
MOBILITY MANAGEMENT BUYER’S GUIDE

Amtel
Amtel MDM allows you to safely deploy mobile devices in the enterprise using 9707 Key West Ave
a unified console for greater operating efficiency, secure devices, and protect
Rockville, MD
access to enterprise data from corporate or BYOD devices. Deployed from a
secure private cloud with SSAE 16 Type II compliance, Amtel by Netplus’ mobile United States
security solution is ideal for smartphone and tablet deployments in the enterprise. +1 (301) 721-3010
Protect enterprise data with the capabilities to remotely lock and unlock lost or www.amtelnet.com
stolen devices and fully or selectively wipe content. Set policy to restrict mobile
device features such as camera or NFC at sensitive locations. By centralizing
device configuration, Email server, Wi-Fi, VPN, LDAP and CalDAV settings are
rolled out simply. Amtel was founded in 2001 and is headquartered in California.

Key Features
Mobile Apps Management
Protect and secure enterprise applications and data with access control policies that take control over mobile
applications with the ability to setup and manage both public and private apps. Additionally, configure whitelist
policies for recommended applications and blacklist policies to restrict risky or time wasting apps. Users can
also easily deploy the enterprise application store for distribution of in-house private apps.

BYOD Security
Allows flexibility for users while retaining the ability to secure corporate data on personal devices. Define user
profiles with access rights and restrictions, deploy over the air and manage centrally. Users have the ability to
protect corporate data using a selective wipe in the event of a lost device or user leaving the company. User or
admin alerts and reports help manage BYOD with monitoring and audit trail.

Secure Enterprise Workspace


IT admins can enforce workspace restrictions on both corporate owned and BYOD mobile devices with pre-
defined configuration settings for access control, content sharing, and mobile application usage. With secure
workspace for Android, administrators can control how users’ home screens look and operate, restrict what
applications can be accessed by a user and automatically hide any of the installed widgets and applications.

Bottom Line
Amtel MDM can be deployed from large enterprises to small businesses and nonprofits, but is most effective
for mid-market enterprises. In addition to offering EMM solutions, the vendor provides an app for secure mobile
communication, called ‘Plum.’ Solutions Review also recently named Amtel one of the best mobility management
solutions of 2018. Amtel provides its services across a range of industries, including construction, government,
hospitality, and healthcare. Currently, it is only available as a cloud-based solution and integrates Mobile Device
Security, Mobile App Management and Mobile Content Management with Mobile Expense Management (MEM).

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 7
MOBILITY MANAGEMENT BUYER’S GUIDE

Blackberry
BES12 is a multiplatform Enterprise Mobility Management solution from 220 University Ave. E
BlackBerry that provides comprehensive device, application, and content
Waterloo, ON
management with integrated security and connectivity, for BlackBerry, iOS, and
Android. Deploy, manage, and control both corporate and Bring Your Own Device Canada
(BYOD) users through a single, simple unified console. BES12 assists users in +1 (519) 888-7465
managing mobile devices for your organization in order to protect business us.blackberry.com
information, keep mobile workers connected with the information they need, and
provide administrators with efficient business tools. BES12 is the foundation to
extend secure mobile productivity and collaboration within your organization
beyond EMM.

Key Features
Backwards Compatible
BlackBerry OS devices will be supported with backwards compatibility and the new platform will provide the
foundation for customers to integrate new mobile endpoints, enhanced user self-service, advanced service
management, highly scalable data center-grade deployments, and implementation of active-active high
availability clusters for reliability. The tool is also future proof, so new devices can integrate with the platform.

Scalable Architecture
BES12 has been built from the ground up as a modern services-based architecture. The platform is scalable for
up to 25k devices per server and 150k devices per domain. Users have the ability to deploy the solution on premise
as well as through the private cloud. Additionally, the scalable architecture reduces complexity, optimizes pooled
resources, ensures maximum uptime, and creates the lowest Total Cost of Ownership (TCO).

Cross-Platform MAM, MDM, and MCM


Cross-platform device, app, and content management are all built into a single console. Supports multiple device
ownership policies at once, from BYOD to company owned personally enabled to company owned business
enabled. It also offers comprehensive lifecycle management of apps across iOS, Android, Windows Phone, and
BlackBerry devices. Integrated secure connectivity gives apps behind-the-firewall access to your resources.

Bottom Line
BlackBerry BES12 has the ability to work well for both mid-market companies and larger enterprises because
it is highly scalable. BES12 is also regarded as one of the most secure solutions out there and is BlackBerry’s
main focus at the moment as they move away from device manufacturing. The solution is a broader expansion
from BES 10, as it is currently available on private cloud, while public and hybrid cloud installations are currently
in development. Though BlackBerry’s macOS support is not on par with its Windows 10 support, its focus on
developing IoT capabilities make the company a more viable vendor in the mobility management space.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 8
MOBILITY MANAGEMENT BUYER’S GUIDE

CA Technologies
CA Mobile Device Management (CA MDM), is a scalable mobile device One CA Plz
management solution designed to help organizations control and secure
Islandia, NY
mobile and desktop devices, as well as deploy applications. Developed to be
a sustainable approach to unlocking the value of mobility, CA MDM can give IT United States
complete deployment flexibility. The solution also provides the freedom of Bring +1 (800) 225-5224
Your Own Device (BYOD), which can enhance productivity. This mobile device www.ca.com
security solution is equipped with enterprise-level application management and
data security features to help you maintain a seamless mobile experience for
users without sacrificing safety. CA Technologies is based in New York and was
founded in 1976.

Key Features
Security
CA MDM uses a relay server in a demilitarized zone (DMZ). It also provides comprehensive add-on email security
options that can secure both internal and external email communications within your enterprise. In the case
of loss or theft, users can remotely locate, lock and wipe a lost device, reset the passcode, remove enterprise
controls, and unregister a device through the solution’s admin/self-service portal.

BYOD
Users have the ability to securely manage enterprise and personal apps, content, and emails separately. Gain
complete BYOD freedom with an end user option that allows the removal of CA MDM control. BYOD solutions
also allow enterprise productivity apps to reside on users’ personal devices. With this policy, users can be assured
that their corporate data is secure and their personal data is untouched by their organization.

Self-Service Portal
Streamlines enrollment and provisioning of a device. It allows users to remotely locate, lock, and wipe a lost
device, then reset the passcode, remove enterprise controls, and unregister a device. With BYOD programs,
users demand the flexibility of using their device for both work and personal use with the assurance that their
enterprise information is secure and their personal content is untouched by the enterprise.

Bottom Line
CA Technologies MDM is a viable option for enterprises and businesses of any size. The vendor offers Content
Management, which includes encryption to, from, and on the device. There are still more developments to come
in this area, as CA MDM has only been around since 2013 and is still growing. Additionally, the vendor was named
a leader in Gartner’s Magic Quadrant for Application Release Orchestration. CA Technologies also licensed SAP
Afaria mobile management technology to develop CA MDM, and now integrates and offers DevOps solutions on
the SAP Cloud Platform.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 9
MOBILITY MANAGEMENT BUYER’S GUIDE

Centrify
Centrify provides solutions for unifying identity management across cloud, 3300 Tannery Way
mobile and data center IT environments. Centrify software and cloud services
Santa Clara, CA
let organizations securely leverage their existing infrastructure to centrally
manage a wide range of identity-related IT activities—such as authentication, United States
access control, privilege management, policy enforcement and compliance— +1 (669) 444-5200
across both cloud and data center based resources. Centrify is a complete www.centrify.com
Enterprise Mobility Management tool integrated with Identity Management. Its
EMM offering allows you to automatically push email, WiFi and VPN settings,
and ensure device compliance. Users can also manage passcodes, remotely
lock and wipe, and leverage device posture for app SSO policy.

Key Features
Active Directory or Cloud-Based Device Management
Offers group Policy-based management and enforcement of security settings, device and application Device
assignment to an Active Directory user associates each device to a unique user credential in Active Directory.
Automated de-provisioning occurs when an Active Directory user account is disabled or deleted. Group-based
enrollment ensures only members of a specific domain or user group can enroll mobile devices.

Unified Platform for Mobile Device, Mac OS X and More


Centralized support for multiple device platforms and release levels ensure secure management across all
devices. Enables the centralized management of your devices, systems, and applications. Centrify also manages
450 versions of UNIX, Linux and Mac OS X systems and applications, providing a unified access management
platform that further secures corporate resources compared to single-purpose mobile point products.

Inventory Devices and Detect Jail-Broken Ones


An inventory of mobile devices across your entire enterprise, which can be organized by group or role, allows
IT administrators to easily monitor and enforce the status of both company-owned and user-owned mobile
devices. This inventory of applications across your entire business, organized by user, group, or device operating
system, also ensures that solely authorized applications are installed for the approved users.

Bottom Line
Centrify Identity Service works well with midmarket companies and manages popular mobile devices along with
UNIX and Linux based systems. Centrify for Mobile’s cloud-based service lets you centrally secure and manage
smart phones and tablets using your existing Active Directory infrastructure. The vendor’s tool, Centrify Identity
Services Platform, was named a 2018 Cloud Computing Product of the Year by TMC. Users should be aware that
the initial implementation can take time if you have a complex IT environment. According to Gartner Peer Insights,
while there is a learning curve to configuring access, the functionality after implementation is exemplary.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 10
MOBILITY MANAGEMENT BUYER’S GUIDE

Citrix
Citrix XenMobile is a comprehensive solution to manage mobile devices, apps, 851 West Cypress Creek Rd
and data. Users have access to all of their mobile, SaaS and Windows applications
Fort Lauderdale, FL
from a unified corporate app store, including integrated email, browser, data
sharing, and support applications. IT gains control over mobile devices with full United States
configuration, security, provisioning and support capabilities. XenMobile delivers +1 (954) 267-3000
EMM with role-based management, configuration, security and support for www.citrix.com
corporate and employee-owned devices. Users enroll their devices, enabling IT to
provision policies and apps to those devices automatically, blacklist or whitelist
apps, detect and protect against jailbroken devices, troubleshoot device and app
issues, and wipe or selectively wipe lost or stolen devices.

Key Features
XenMobile Device Manager
Provides organizations with role-based management, configuration and security of corporate-owned and user-
owned devices. In addition to this, IT administrators have the ability to enroll and manage mobile devices, blacklist
or whitelist applications, detect devices that are jailbroken or non-compliant, block their ActiveSync email access,
and do a wipe of any devices that are lost, stolen, or out of compliance.

Citrix Secure Hub


Now available for any mobile device, Secure Hub is an app that allows IT admins to implement mobile settings
and security while also providing users with access to a unified app store and live support services. The platform
acts as the launchpad for mobile productivity applications. XenMobile Endpoint Management communicates
with Secure Hub to deliver device-specific policies and Secure Hub-enabled application policies.

NetScaler Gateway
NetScaler Gateway is a secure application and data access solution that gives IT admins a single point to manage
access control and limit actions within sessions based on both user identity and the endpoint device, thereby
providing better application security, data protection, and compliance management. By consolidating remote
access infrastructure, NetScaler Gateway also provides single sign-on across all applications.

Bottom Line
Citrix XenMobile is a good fit for midmarket businesses. The Secure Hub Apps have been proven to improve the
user experience, have a high customer support rating, and can create a virtual private network tunnel without the
user having to manually create one. Citrix excels in MCM and has a comprehensive user interface. Because the
vendor enables users to consume SaaS, mobile, and virtualized Windows applications through a single app store,
organizations are able to easily leverage existing investments and provide a diverse set of applications. Citrix has
also added new features, such as macOS management, recently.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 11
MOBILITY MANAGEMENT BUYER’S GUIDE

FileWave
FileWave is a leader in multi-platform device management. The vendor provides 7320 E 86th St
mobility management software, which enables users to secure, manage, and
Indianapolis, IN
maintain devices, content, updates, and settings. The provider’s tools are used
across many industries, including enterprise, education, and government. Of United States
FileWave’s many features, most notable is the support for all major operating +1 (317) 863-6282
systems for desktop and mobile - macOS, Windows, iOS, Chrome OS and www.filewave.com
Android - all within one console. This is a plus for any organization that needs
the ability to manage a diverse and growing population of users, devices,
content, applications, and accounts. Additionally, all products and features are
all-inclusive, ensuring IT teams have all the tools needed with no add-ons.

Key Features
Software/Application Deployment
Powerful deployment workflows with FileWave’s patented Fileset Magic technology provides IT teams with
granular control over content distribution, reducing the need to rely on end user interactions to install. When
used in conjunction with FileWave’s patented self-healing technology and Self-Service Kiosk for computers and
mobile devices, deployments are efficient, flexible, and dependable.

Multi-Platform Management/Imaging
Full automation through the use of a drag and drop interface makes imaging Mac and Windows devices fast and
reliable for users. Furthermore, the tool supports direct, network, and layered imaging models. In addition to this,
multi-platform management ensures that all current and future devices are fully supported within one console,
thereby eliminating the need for multiple products.

Asset & License Management


Streamline the tracking of mobile devices and licenses with FileWave’s robust Integrated Inventory and License
Management features. With license information, users have the ability to reduce purchase and renewal costs by
detecting unused licenses. The platform also enables users to receive detailed reports, set alert notifications,
and much more.

Bottom Line
FileWave is a great fit for enterprise, education, and government organizations of all sizes, especially those in need
of a solution to manage a mixed environment of macOS, Windows, iOS, Chrome OS and Android. The company
also boasts a 97% customer retention rate and an Alliance Community, where users can collaborate with each
other. Additionally, the company offers online certification courses, which allow users to learn about FileWave
without having to travel. According to Gartner Peer Insights, deployment is simple and relatively quick. With 26
years in the industry, FileWave provides a comprehensive feature set, many of which are unique in today’s market.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 12
MOBILITY MANAGEMENT BUYER’S GUIDE

Hexnode
Hexnode provides a mobility management solution that simplifies mobility 340 S Lemon Ave
across each aspect of your business, ensuring that business processes, data,
Walnut, CA
systems, and employees are always connected. It is equipped with all standard
MDM features, which include management and provisioning tools, remote set United States
up and configuration, application control and distribution, compliance checks, +1 (510) 545-9700
and remote lock and wipe. Additionally, the provider offers email, security, www.hexnode.com
application, and content management to businesses. The solution is built on a
scalable infrastructure that is able to handle increased demand while the amount
of mobile devices at a company grows. The solution can be deployed with on-
prem or in the cloud. Hexnode was founded in 2013 and is based in California.

Key Features
Remote View and Control
Users have the ability to remotely view and manage the entire list of mobile devices in your network. MDM
dashboard renders graphical illustrations to monitor device activity data in real-time. You can view the activity
summary or get detailed information on individual mobile devices. The solution’s activity feed also allows users
to keep track of statistics about deployment, policy, and enrollment.

Configuration and Policy Management


Hexnode MDM provides users with an extensive set of policy controls for effective mobile device management.
From passcode policies and group policies to configurations and restrictions: users have sufficient control over
the mobile devices in their corporate network. This enables you to secure your content and network by enforcing
strong passcode policies on the devices.

Mobile App Distribution


Allows you to centrally deploy public and in house applications. You can send links or webclips of public
applications to a specific user or user groups. Also offers creation of custom application catalogs for deploying
and managing apps. The application catalog lets you distribute enterprise and public applications. Additionally,
users have total control over the applications you install.

Bottom Line
Hexnode provides a mobility solution that is able to support a number of devices all from one screen with a highly
intuitive user interface. The software is capable of handling whole enterprise mobility management, while assisting
users with the ability to centrally manage all devices, disable and restrict features, and create policies with desired
configurations and assign them to specific groups. Hexnode was also named a Mobile Star Award Winner by
MobileVillage in 2017. Additionally, G2 Crowd listed Hexnode as a High Performer in fall of 2018. According to
Gartner Peer Insights, the implementation process is simple with the help of Hexnode MDM’s support team.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 13
MOBILITY MANAGEMENT BUYER’S GUIDE

Hypori
Hypori provides Virtual Mobile Infrastructure solutions (VMI) designed to 1801 Robert Fulton Dr
protect enterprises from the risks associated with BYOD. Hypori’s VMI platform
Reston, VA
gives organizations the ability to keep data secure within the company and
not exposed on the user’s mobile device. The solution gives users access to a United States
virtual mobile device in the cloud from IOS, Windows and Android devices, while +1 (703) 766-7999
providing security and compliance for organizations. Hypori presents a user- www.hypori.com
centric solution designed for all enterprises and regulated industries such as
government, healthcare, financial services and payments. With Hypori’s Virtual
Mobile Infrastructure platform, an enterprise can keep all apps and data in the
enterprise, leaving no data at risk on the end user’s mobile device.

Key Features
Security and Compliance
With Hypori’s solution, the entire mobile experience is completely virtualized, leaving no data at rest on the
physical mobile device. Through this technology, risks associated with mobile malware, reverse engineering,
and theft are eliminated. Additionally, Hypori enables users to meet critical compliance requirements including
Common Criteria, HIPAA and PCI.

Managed and Controlled


Allows organizations to develop for only one operating system - but distribute to many. Hypori’s VMI also
provides a single, centralized mobile OS version on persistent virtual mobile devices. Simplify the development,
deployment, testing, and support of applications with one central gold image and control point. Users are also
enabled to roll out new applications and patches instantaneously.

Adopted and Embraced


There’s no need for more agents, spyware, or employee adoption because of concerns with privacy, remote
wipe and remote monitoring. Hypori’s mobile thin client provides businesses access to an entire virtual mobile
environment without an intrusive agent. In addition to this, IT administrators have the ability to drive adoption and
eliminate liability from big brother policies.

Bottom Line
Hypori presents a highly scalable solution completely unlike traditional MDM technologies. Hypori’s solution
allows users to have complete control of the virtual device in a controlled environment, while protecting the
communications in transit and also ensuring that there is no communications residue during or after the sessions.
Additionally, Hypori enables users to have absolute control of what apps are allowed. It takes a completely new
approach to the challenge of securing, managing and driving use of mobile applications. Hypori offers an efficient
way to access important mobile applications and data without sacrificing security or user experience.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 14
MOBILITY MANAGEMENT BUYER’S GUIDE

IBM
IBM MaaS360 Enterprise Mobility Management (EMM) combines device, app, 1 New Orchard Rd
and content management with strong security to simplify how you go mobile.
Armonk, NY
You can monitor for threats and automate compliance to maximize security
without compromising the user experience. It delivers the ability to diagnose and United States
resolve device, user or application issues in real-time from a web-based portal; +1 (800) 426-4968
offering complete IT visibility and control, and ensuring optimum mobile user www.ibm.com
productivity. MaaS360 provides a unified mobile device management console
for smartphones and tablets with centralized policy and control across multiple
platforms.

Key Features
Application Security
Enables an application container for your enterprise and third-party applications with comprehensive operational
and security management for iOS and Android operating systems. IT administrators also gain the ability to
enforce authentication, provide access control across MaaS360 contained applications, and configure data leak
prevention (DLP) controls.

Mobile Threat Management


Delivers a system to protect against mobile malware on iOS and Android devices. Users are able to gain visibility
of these mobile risks and remediate the threats before they compromise their enterprise data. Additionally, users
can detect applications with malware signatures from a continually updated database, and proactively manage
mobile threats in real-time.

Mobile Enterprise Gateway


Enables collaboration while securing your content with authorization, encryption, and containerization policies.
Users can set up, configure, and maintain without additional hardware in their IT environment. Protect corporate
data with security policies, including authorization, encryption and data leak prevention controls and provide
access without requiring changes to your network or firewall security configuration.

Bottom Line
MaaS360 is a great fit for large enterprises and users that are looking for a SaaS-based tool. Since they’re owned
by IBM, MaaS360 is compatible with other IBM products. Users have said that the interface is easy to use for both
administrators and end users. MaaS360 is also broadening to offer a full-featured Unified Endpoint Management
(UEM) solution as it transitions away from an EMM strategy. According to Gartner, though MaaS360 is currently
available only as Software as a Service (SaaS), users consistently report that the solution is simple to implement,
compared to other mobility management solutions.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 15
MOBILITY MANAGEMENT BUYER’S GUIDE

Ivanti
Ivanti is unique in that it is only dedicated to Apple devices. The company works 698 West 10000 South
with businesses of all sizes to configure, manage, and protect devices using
South Jordan, UT
central app deployment, remote passcode enforcement, and encryption. With
Ivanti, IT teams can view device details, link physical inventory to their digital United States
records, export device inventory data to spreadsheets, and automatically install +1 (888) 253-6201
apps from the App Store to all of their devices. Ivanti offers both Ivanti Pro and www.Ivanti.com
Ivanti Now. While Ivanti Now is geared towards smaller businesses, Ivanti Pro
is directed towards larger organizations, automating device management while
driving productivity and creativity. This MDM solution can be deployed through
the cloud or on-premises to fit your situation.

Key Features
Device Deployment
This technology offers businesses powerful deployment workflows to provision the perfect Mac, iPad, or
iPhone for every scenario. With Ivanti Pro and the Apple Device Enrollment Program, users have the ability to
automatically enroll and configure new devices without needing any hands on support from IT. The tool is ready-
to-use without manual configuration.

Inventory
IT administrators can automatically collect user, hardware, software, and security device data or customize
inventory specifications with extension attributes, such as the status of a third-party app. Additionally, users
have the ability to create custom reports, alerts, and manage software licenses and warranty records. Users can
also use inventory to automate ongoing management.

Self Service
More than an enterprise application catalog, Ivanti’s Self Service transforms the IT and end user experience.
Through an intuitive interface, which is customizable by the IT teams, users can gain immediate access to
resources, install applications, update configurations, and troubleshoot common problems, without the need of
any help desk tickets.

Bottom Line
Ivanti is an ideal MDM solution for Apple-centric businesses whether they’re hosting ten devices or hundreds.
By focusing solely on Apple, Ivanti is able to ensure that end users can receive the experience they expect from
Apple. The provider also offers a range of products, including IT asset management, IT service management, and
security, which integrate into its Unified Endpoint Management platform. With this solution, IT administrators are
able to use a single workflow to deploy an application to mobile devices and PCs. In addition, Ivanti provides zero-
day support and resources from Ivanti Nation, the largest Apple IT management community in the world.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 16
MOBILITY MANAGEMENT BUYER’S GUIDE

ManageEngine
ManageEngine’s mobility solution, Desktop Central is integrated desktop and 4141 Hacienda Dr
mobile device management software that helps in managing servers, laptops,
Pleasanton, CA
desktops, smartphones, and tablets from a central location. Automate your
desktop management routines like installing patches, distributing software, United States
managing your IT assets, managing software licenses, monitoring software +1 (925) 924-9500
usage statistics, managing USB device usage, and taking control of remote www.manageengine.com
desktops. It supports managing Windows, Mac and Linux operating systems.
Manage your mobile devices to deploy profiles and policies, configure devices for
Wifi, VPN, email accounts, etc., apply restrictions on using cameras or browsers
to secure your devices like enabling passwords or remote lock/wipe.

Key Features
Profile Management
Configure policy settings to access enterprise resources; configure native e-mail client with Microsoft Exchange
ActiveSync at an enterprise level. Additionally, provide access to corporate accounts like Email, Wi-Fi, VPN and
create a logical group of devices based on department, location, or to distinguish corporate and BYOD and apply
policies, restrictions and distribute apps to all devices in the group.

Application Management
Users are enabled to manage and distribute both in-house and App Store applications. Users can also integrate
with Apple Volume Purchase Program (VPP) for hassle free distribution of commercial applications and publish
the applications in App Catalog. Users can choose and install the applications themselves, as well as segregate
blacklist and whitelist applications.

Security Management
Allows users to enforce strict passcodes to prevent unauthorized access to prevent the misuse of misplaced/
lost devices. Additionally, the solution offers geo-location for device tracking and prevents data loss/theft by
erasing all the device data. Organizations also have the ability to remove only the corporate data and leave the
personal data like contacts and photos.

Bottom Line
Manage Engine is especially fitting for small businesses because the most basic version of Desktop Central is
free and perfect for businesses with 25 or less employees. Other editions include Patch Edition, Professional
and Enterprise each fitting for different sized businesses with different industries and needs. Desktop Central
is also easy to deploy and is scalable, so upgrading is easy and all functions carry across all versions. While
ManageEngine lacks certain EMM features, such as geo-fencing and time fencing, the vendor offers a free edition
that can be used for up to 50 devices that can be downloaded or installed through cloud marketplaces.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 17
MOBILITY MANAGEMENT BUYER’S GUIDE

Microsoft
The Enterprise Mobility Suite is Microsoft’s comprehensive cloud solution for your One Microsoft Way
consumption of IT and Bring Your Own Device (BYOD) challenges. In addition, the
Redmond, WA
Enterprise Mobility Suite discount makes it cost-effective to acquire the included
cloud services: Microsoft Azure Active Directory Premium for hybrid identity United States
management, Microsoft Intune for mobile device and application management +1 (425) 882-8080
and Microsoft Azure Rights Management for information protection. Microsoft www.microsoft.com
enterprise tools and technologies can help IT administrators maintain security
across all device types, regardless of whether the devices are corporate or
personal assets, and establish security measures that protect their organizations’
systems, data, and networks.

Key Features
Advanced Identity Security
Users are able to monitor and protect access to their cloud applications by viewing detailed reports showing
more advanced anomalies and inconsistent access patter reports. Advanced reports are based in machine
learning and can assist IT administrators in gaining new insights to improve access security and respond to
potential threats.

Consistent Identity
IT administrators have the ability to create and manage a single identity for each user across all your directories,
keeping attributes in sync and providing single sign-on for users. In addition to this, provide single sign-on access
to thousands of cloud-based Software as a Service (SaaS) applications and information with conditional access
policies and multi-factor authentication.

Mobile Application Management


Enable your workforce to securely access corporate information using the Office mobile applications. Additionally,
the solution allows administrators and device users to protect corporate information through selective wipe of
managed applications and related data when a device is unenrolled, no longer compliant, lost, stolen, or retired.

Bottom Line
Microsoft Enterprise Mobility Suite is built to support any sized business. The tool is a good fit for organizations
that are looking to standardize on Microsoft tools and use existing agreement entitlements. The Enterprise Mobility
Suite is a combination of Windows Intune, Microsoft Azure Rights Management and Microsoft Azure Active
Directory Premium. All of these components are needed to get the full benefits of Microsoft Enterprise Mobility
Suite, but they work together well and provide a solid solution. Though Intune lacks full support for integration with
some identity management products, the company offers full integration with Office 365 mobile apps.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 18
MOBILITY MANAGEMENT BUYER’S GUIDE

Miradore
Miradore is a software company providing cloud-based solutions for managing Laserkatu 8
IT and mobile devices. With Miradore Online Mobile Device Management (MDM),
53850 Lappeenranta, Finland
Enterprise Mobility Management (EMM), and Unified Endpoint Management
(UEM), IT Service Providers and IT departments can secure and control IT devices +358 45 1322772
while reducing costs and creating value-added IT automation. The vendor www.miradore.com
provides organizations with a single dashboard view and remote access for a
range of end user devices, including those running Windows, macOS, Android,
and iOS. Miradore is headquartered in Finland and was founded in 2006.

Key Features
Security
Ensures mobile device and data security and data compliance. Users can protect company data by separating
business and personal use, enforcing safe passcodes and screen locks, and encrypting confidential content.
Also ensures control over the use of mobile devices, offering email configuration, application management and
restrictions, device tracking, and analytics for an overview of all devices for enhanced management.

BYOD and Other Ownership Models


Enables a Bring Your Own Device (BYOD) policy by allowing employees to use their personal devices to access
business data and apps at work, potentially resulting in increased productivity and savings on device acquisition.
Users can also consider Corporate-Owned, Personally-Enabled (COPE) devices, an IT governance model in which
a company provides devices to employees and lets them use the endpoints both on and off the job.

Automation and Productivity


Users can save time by deploying business policies, automating installations, and enforcing configurations,
applications. Supports automated device enrollment programs like Apple Device Enrollment Program, Android
Zero-Touch Enrollment, and Samsung Knox Mobile Enrollment for Android devices. Tasks will not be completed
manually, so there will be reduced human error, increased efficiency, and compliant and secure use of devices.

Bottom Line
Miradore Online is recommended for small to mid-sized businesses and enterprises. Recent upgrades and feature
additions to the provider’s platform include the rollout of the MSP Portal for IT Service Providers and expanded
support for macOS devices. Additionally, Miradore is an Android Enterprise Recommended EMM solutions provider
and was named an Innovator in UEM by research firm IDC. Miradore Online is free, and users can eventually
upgrade their service level if they choose to with a pay as you go model. Miradore offers 24/7 online support, as
well as user support through email, chat, and phone.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 19
MOBILITY MANAGEMENT BUYER’S GUIDE

MobileIron
The MobileIron EMM Platform allows IT to secure and manage devices, apps and 415 East Middlefield Rd
content providing end users with instant access to corporate data on the mobile
Mountain View, CA
device of their choice. With this purpose built enterprise mobility management
platform, organizations can spend more time innovating and driving business United States
and less time securing mobile devices. The MobileIron EMM Platform was +1 (877) 819-3451
built to secure and manage modern operating systems in a world of mixed-use www.mobileiron.com
devices. It incorporates identity, context, and privacy enforcement to set the
appropriate level of access to enterprise data and services. It also secures and
manages mobile devices, automatically provisions enterprise settings such as
Wi-Fi and VPN, and provides end-users with secure access to corporate email.

Key Features
MobileIron Core
The solution integrates with backend enterprise IT systems and enables IT administrators to define security
and management policies for mobile applications, content, and devices. Additionally, core can also be extended
through APIs to integrate with the offerings of MobileIron Technology Alliance Partners.

Mobile Application Management


Delivers, secures, and retires mobile apps. With these capabilities, IT can manage the entire application life cycle;
from making the applications available to employees through the Apps@Work private enterprise app store, to
securing applications on the device and containerizing corporate apps from personal apps using MobileIron
AppConnect.

Mobile Device Management


Enables IT to secure and manage a diverse set of mobile devices, automatically provision enterprise settings
such as Wi-Fi and VPN and provide end users with secure access to corporate email. If a device should fall out
of compliance, IT can define remediation actions that will either notify the user of policy violations or selectively
wipe corporate information without touching any personal data.

Bottom Line
MobileIron Platform is an effective solution for any size company. They are one of the few vendors in the EMM
market that has real time remote-view capacity for iOS. Their separate products for MCM and MAM are a stand
out for MobileIron and are highly compatible and user friendly. According to Gartner Peer Insights, the provider’s
technical support is superior to third-party support from other partners. Though it becomes more difficult to
extract useful business insights as the solution expands to manage more device types, the MobileIron Access
user base is growing, allowing customers to enable adaotive access across SaaS and internally hosted apps.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 20
MOBILITY MANAGEMENT BUYER’S GUIDE

Sophos
Sophos Mobile Control (SMC) ensures each document connected to the server 3 Van de Gaaff Dr
remains secure, allowing users to remain productive by collaborating safely.
Burlington, MA
Gated entry to each file assures security anywhere and everywhere users go.
Ensure compliance by maintaining control of what apps are being installed. United States
An overview of all mobile devices in your company shows the device model, +1 (781) 494-5800
OS version, and many other properties of the device. Each file is individually www.sophos.com
encrypted making sure your data is secure. SMC also integrates with Sophos
UTM, Checkpoint and Cisco, keeping the networks protected. If a device is
rendered non-compliant, network access is revoked. Users can also filter web
access on their Android devices based on categories.

Key Features
Mobile Content Management (MCM)
Provides transparent encryption of each file while keeping documents and data safe anywhere. Additionally, the
tool leverages Sophos’ Mobile Encryption app, which can be centrally managed through the SMC console. The
solution also accesses content from cloud storage providers like Dropbox, Google Drive, Microsoft OneDrive,
Egnyte and various WebDAV compatible solutions.

Controlled Network Access


The solution constantly monitors device health and detects jailbreaks, blacklisted apps or insecure settings. In
addition to this, integration with Sophos UTM enables administrators to block Wi-Fi and VPN access based on
compliance status of the device. Also offers out-of-the-box interfaces to control network access via Checkpoint
and Cisco ISE.

Mobile Email Management (MEM)


Distribute email settings, allowing your users to become productive in minutes. Additionally, users can control
access to e-mail via a secure email gateway based on the device posture. The solution supports email containers
such as Nitrodesk Touchdown and can also perform a selective wipe all corporate emails, once a user leaves
the company.

Bottom Line
Sophos Mobile control works best with small to midmarket businesses and is one of the few vendors to have
digital rights management. It also integrates well with third party storage but does not yet support Samsung Knox
and only supports Microsoft Certificate Services. Sophos works best with iOS and although it supports Android, it
has not yet adopted support of Android for Work. Additionally, Sophos Mobile’s console makes use of configurable
tiles to provide a multimodal dashboard, thereby offering users an intuitive experience. The provider also offers a
combination Unified Endpoint Management (UEM) and security solution in a single package and console.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 21
MOBILITY MANAGEMENT BUYER’S GUIDE

SOTI
SOTI MobiControl is an EMM solution that delivers enhanced features like 5770 Hurontario St
application management, content management, location services, and remote
Mississauga, ON
help. SOTI MobiControl‘s advanced security features enable your business
to maintain full control over who is using your mobile devices and how they Canada
are using them. All data on the device or moving between the device and your +1 (905) 624-9828
company servers remains private and secure. SOTI unifies mobility management www.soti.com
from a single console, removing the complexity from managing a multi-OS,
multi-vendor, and multi-purpose mobile ecosystem. SOTI provides the ability
to manage mobile devices, applications, content, email, and security within a
secure, all-in-one offering.

Key Features
Mobile Application Management (MAM)
Offers technical and professional services support in multiple languages, as well as a multi OS platform and
device agnostic solution. Reduce the complexity of onboarding, securing, monitoring, tracking, and supporting
endpoints accessing resources at anytime and gather data points for analysis. Display data like serial numbers,
Mac addresses, installed apps, phone numbers, and other data with custom views and reports.

Mobile Device Management (MDM)


Manage your complete mobile asset lifecycle, secure data and network integrity in order to integrate applications
environment, optimize costs and operations management, as well as provide help desk support and services.
Additionally, SOTI MobiControl offers standard and customized diagnostics and analytics in order to support
high-end business intelligence requirements for comprehensive mobile device asset management.

AntiVirus and Malware Protection


Enables users to quarantine mobile threats in real-time across the device’s file system and installed applications.
It also provides the ability to extend desktop grade antivirus and malware protection to your managed devices.
Scans to monitor device files and applications can be configured from every two minutes to as much as once a
month. SOTI MobiControl allows you to remain vigilant against evolving mobile threats.

Bottom Line
SOTI MobiControl is a good fit for larger companies that need to manage a lot of devices, as the solution offers
users a lot of control. If your company currently has a high number of Android devices, SOTI is the top vendor
for securing Android devices with their SOTI MobiControl, Android for Work, with which they work closely with
Google. SOTI consistently proves itself in regard to managing nontraditional devices and use cases, according to
Gartner. Though SOTI does not have much of presence in certain countries, such as China, the advent of another
tool, SOTI One, enables the provider’s offerings to address management, content delivery, and user support.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 22
MOBILITY MANAGEMENT BUYER’S GUIDE

Symantec
Symantec Mobility Suite offers a unified solution that enforces consistent 350 Ellis St
security standards without impeding the end user’s productivity or personal
Mountain View CA
privacy. By providing flexible, comprehensive tools to secure data, deliver apps
and content, and protect against threats, Mobility Suite gives users what they United States
need to be productive without compromising security or the user experience. +1 (650) 527-8000
Instead of serving as gatekeepers, enterprise IT becomes an enabler of mobile www.symantec.com
business. Mobility Suite simplifies mobility management, integrating MDM,
MAM, MCM and mobile threat protection into a single console solution. Also,
allows for a Choose Your Own Device (CYOD) or BYOD program, or manages a
mix of these options.

Key Features
Symantec Sealed Program
The Symantec Sealed Program enables enterprises to embrace third-party mobile apps while meeting data
security requirements. The apps in the Sealed Program have been wrapped with a layer of security and
management, allowing IT to define granular policies, such as encryption. It delivers an ecosystem of trusted and
secure third-party mobile apps, allowing you to provide a protected mobile workspace to meet your business
needs.

Threat Protection
Provides users with powerful, effective protection against malicious threats and unauthorized access to sensitive
corporate information. Through leveraging cutting-edge technology, research, and intelligence from Norton
Mobile Insight and Symantec Security Technology and Response (STAR) experts, the suite is able to protect
Android devices from privacy and performance risks, mobile malware and fraudulent websites.

Device Management
Mobility Suite includes scalable MDM capabilities, providing visibility and control over smartphones and tablets.
Enroll devices in your enterprise environment, configure and update device settings over-the-air, and protect
mobile devices with certificate-based security. You can prevent non-compliant devices from connecting to
corporate assets, helping to ensure compliance to internal and external security requirements.

Bottom Line
The Symantec Mobility Suite does well with midmarket to larger sized companies. It’s also one of the only EPP
mobility vendors, which offers an extra level of security. However, this may cause Symantec to be a bit more
expensive. The provider’s deployment across a large population of business and consumer endpoints gives the
company a broad view of the threat landscape across multiple verticals. Though Symantec’s solution is seen
as somewhat complex and resource-intensive to manage, it offers users improved detection and response
capabilities.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 23
MOBILITY MANAGEMENT BUYER’S GUIDE

VMware AirWatch
VMware AirWatch is an enterprise-grade mobility, productivity, identity and 1155 Perimeter Center West
collaboration solution which empowers end users with a seamless digital
Atlanta, GA
workspace for all mobility needs. AirWatch gives IT admins the power of a
future-proof mobility platform that provides flexibility to manage multiple use United States
cases, unified management of endpoints, end-to-end security from devices to +1 (404) 478-7500
data center, and integration across enterprise systems. An HTML5, web-based www.air-watch.com
console enables organizations to enroll devices in their enterprise environment,
configure and update device settings over-the-air, and secure mobile devices.
The admin console gives visibility into all enrolled corporate owned, employee
owned, and shared devices, regardless of platform or device type.

Key Features
Unified Endpoint Management
Unifies and centralizes the management of endpoints with a single console. Additionally, manages Windows
10, Mac OS X, and Chrome OS laptops alongside a mobile device fleet. Install and manage virtual machine
applications, including VMware Fusion, on laptops using the AirWatch Catalog. These laptops are managed right
alongside traditional mobile devices running iOS, Android, Windows Mobile, Blackberry, QNX and more.

True Platform Solution


Users can leverage a complete mobile productivity solution with Mobile Application Management, Mobile
Browsing Management, Mobile Email Management, and containerized personal information management (PIM)
through Boxer, the newest addition to the AirWatch product suite. Address challenges associated with mobility
by providing a simplified, efficient way to view and manage all devices from the central administrator console.

Mobile Security
Ensures your enterprise mobility deployment is secure and corporate information is protected with end-to-end
security extending to users, devices, applications, content, data, email, and networks. With containerization,
corporate and personal data can be segregated to prevent data loss and leakage. AirWatch provides real-time
device details and continuous compliance monitoring to ensure your devices and data are secure.

Bottom Line
AirWatch Enterprise Mobility Management has proven its ability to handle large enterprises and is a leader in the
industry. The solution supports macOS but reportedly doesn’t have some of the advanced patch management
capabilities for it. The vendor has made investments in microservices, analytics, and in offering features, such as
increased integration and functionality of its Boxer product, demonstrating a heightened awareness of market
needs. Additionally, VMware regularly releases product improvements and new offerings, such as integrations
with Office 365 mobile apps and Chrome management.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 24
MOBILITY MANAGEMENT BUYER’S GUIDE

ABOUT
SOLUTIONS REVIEW
Solutions Review is a collection of technology news sites that aggregates, curates, and creates the best
content within leading technology categories. Solutions Review’s mission is to connect buyers of enterprise
technology with the best solution sellers.

Over the past four years, Solutions Review has launched ten technology buyer’s guide sites in categories
ranging from cybersecurity to wireless 802.11, as well as mobility management, business intelligence and
data analytics, data integration, and cloud platforms.

Information for this report was gathered via a meta-analysis of available online materials and reports,
conversations with vendor representatives, and examinations of product demonstrations and free trials.
Solutions Review does not endorse any vendor, product or service depicted in this publication and does not
advise technology users to base their vendor selection entirely on this research. Solutions Review disclaims
all warranties, expressed or implied, regarding this research, including any warranties of merchantability or
fitness for a particular purpose.

© 2019 | Solutions Review | 500 West Cummings Park | Woburn, Massachusetts 01801 | USA 25

You might also like