
TECH BUYER Nov 2019 - IDC MarketScape - Doc # US45353819
IDC MarketScape: Worldwide Enterprise Mobility Management Software for Ruggedized/IoT Device Deployments 2019–2020 Vendor Assessment
By: Phil Hochmuth Program Vice President, Enterprise Mobility
Abstract
This IDC study represents a vendor assessment of providers offering enterprise mobile mobility management (EMM) software through the IDC MarketScape model, specifically in the context of ruggedized and IoT device deployments. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for EMM software. The evaluation is based on a comprehensive and rigorous framework that assesses each vendor relative to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the EMM market over the short term and the long term.
"Digital transformation is affecting not only business operations models but the makeup of employees day-to-day workspaces, with the introduction of new smart, connected devices," says Phil Hochmuth, program vice president, Enterprise Mobility and Client Endpoint Management, IDC. "To that end, device management has evolved from PC and mobile management to a diverse environment of endpoints, with more than a half-dozen operating systems IT teams must manage and secure."
Coverage
Subscriptions Covered
Enterprise Mobility: Platforms and Security
Companies Covered
JAMF Software LLC, baramundi software AG, Ivanti Software, Inc., SOTI Inc., Citrix Systems, Inc., Sophos Plc, VMware, Inc., Blackberry Ltd., IBM, Miradore Ltd., Cisco Systems, Inc., Micro Focus International plc, ManageEngine, Quest Software Inc., 42Gears Mobility Systems Pvt. Ltd., Matrix42 AG, Microsoft Corporation, MobileIron, Inc., Zoho Corporation Pvt. Ltd.
Regions Covered
Topics Covered
Endpoint security, Enterprise mobility, Internet of things, Messaging security, Mobile identity and access management, Mobile secure content and threat management, Mobile security and vulnerability management, Network security, Technology buyer, Wearables
Content
List of Tables
List of Figures
Get More
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.