Story image

Three providers of unified endpoint management software named IDC innovators

02 Jul 2018

International Data Corporation (IDC) has published an IDC Innovators report profiling three technology providers that are considered key emerging vendors in the unified endpoint management software market.

The three companies named as IDC Innovators are 42Gears Mobility Systems, Fleetsmith, and Miradore.

Unified endpoint management (UEM) technologies provide management, configuration, and deployment capabilities to all types of end-user computing devices, from traditional PCs and laptops to smartphones, tablets, and even some Internet of Things (IoT) device types.

UEM software is experiencing new interest now that the software tools exist to provide common management across multiple operating environments, including Windows, Mac, iOS, Android, Chrome, and Linux-based systems.

While there are many large, established UEM providers, the evolving market has room for smaller players with products addressing innovative use cases for UEM deployments.

"Endpoint device deployments in enterprises today have never been more diverse in terms of use cases, device form factors, and varying operating system types," says IDC Enterprise Mobility program director Phil Hochmuth.

"The three vendors named as IDC Innovators reflect the heterogeneous nature of end-user computing and endpoint device management requirements among enterprises and SMBs today and in the future."

42Gears Mobility Systems offers a device management platform that allows for simplified, repeatable, and secure configuration setup and deployment for thousands of devices into unmanaged or challenging environments such as retail, manufacturing, and in-vehicle use cases.

Fleetsmith is a SaaS-based endpoint management software provider that specifically focuses on Apple products, enabling consolidated device procurement, management, support, and packaged application delivery.

Miradore combines a range of UEM management features into its platform, allowing the company to address both cloud-focused customers and regulated industries where on-premise delivery models are preferred

The report, IDC Innovators: Unified Endpoint Management Software, 2018 profiles three providers of unified endpoint management software.

The IDC Innovators reports present a set of vendors – under $100 million in revenue at the time of selection – chosen by an IDC analyst within a specific market that offers an innovative technology, a new approach to an existing issue, and/or an interesting business model.

It is not an exhaustive evaluation of all companies in a segment or a comparative ranking of the companies.

Vendors in the process of being acquired by a larger company may be included in the report provided the acquisition is not finalised at the time of publication of the report.

Vendors funded by venture capital firms may also be included in the report even if the venture capital firm has a financial stake in the vendor's company. 

SecOps: Clear opportunities for powerful collaboration
If there’s one thing security and IT ops professionals should do this year, the words ‘team up’ should be top priority.
Interview: Culture and cloud - the battle for cybersecurity
ESET CTO Juraj Malcho talks about the importance of culture in a cybersecurity strategy and the challenges and benefits of a world in the cloud.
Enterprise cloud deployments being exploited by cybercriminals
A new report has revealed a concerning number of enterprises still believe security is the responsibility of the cloud service provider.
Ping Identity Platform updated with new CX and IT automation
The new versions improve the user and administrative experience, while also aiming to meet enterprise needs to operate quickly and purposefully.
Venafi and nCipher Security partner on machine identity protection
Cryptographic keys serve as machine identities and are the foundation of enterprise information technology systems.
Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.