TECH BUYER Jan 2021 - IDC MarketScape - Doc # US46957920
IDC MarketScape: Worldwide Unified Endpoint Management Software for Ruggedized/Internet of Things Deployment 2021 Vendor Assessment
This IDC study represents a vendor assessment of providers offering unified endpoint management (UEM) software for ruggedized/IoT deployment through the IDC MarketScape model. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for UEM software. The evaluation is based on a comprehensive and rigorous framework that assesses each vendor relative to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the UEM market, targeting ruggedized/IoT device management, over the short term and the long term.
"Mobile devices are transforming a broad range of enterprise workflows and use cases beyond standard business apps and productivity tools," says Phil Hochmuth, program vice president, IDC's Enterprise Mobility and Client Endpoint Management. "Data input, customer transactions, quick information access, and similar tasks can be transformed by deploying smartphones and tablets, where stationary PCs or paper documents were once the primary tools. Managing device in these scenarios has specialized requirements around security, compliance, and monitoring, which makes unified endpoint management software a good fit. Enterprises should evaluate UEM platforms for specific ruggedized/IoT use cases, but also in the context of their broader device management strategy."
Endpoint Device Management and Enterprise Mobility
JAMF Software LLC, Ivanti Software Inc., baramundi software AG, Quest, Citrix Systems, Inc., SOTI Inc., VMware, Inc., Blackberry Ltd., IBM, Cisco Systems Inc., Micro Focus International plc, 42Gears Mobility Systems Pvt. Ltd., Matrix42 AG, ManageEngine, Microsoft Corporation, MobileIron, Inc., Samsung, Zoho Corporation Pvt. Ltd.
Endpoint security, Enterprise mobility, Internet of things, Mobile security and vulnerability management, System and network management software, Technology buyer
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.