TECH BUYER Nov 2019 - IDC MarketScape - Doc # US45353919
IDC MarketScape: Worldwide Enterprise Mobility Management Software for Small and Medium-Sized Businesses 2019–2020 Vendor Assessment
This IDC study represents a vendor assessment of providers offering enterprise mobile mobility management (EMM) software through the IDC MarketScape model, specifically in the context of small and medium-sized business (SMB) deployments. The assessment reviews both quantitative and qualitative characteristics that define current market demands and expected buyer needs for EMM software. The evaluation is based on a comprehensive and rigorous framework that assesses each vendor relative to one another, and the framework highlights the key factors that are expected to be the most significant for achieving success in the EMM market for SMBs over the short term and the long term.
"Mobility is now a ubiquitous technology across all industries and market segments, with many small and midsize companies now adopting mobility use cases securing requirements similar to large enterprises," says Phil Hochmuth, program vice president, Enterprise Mobility and Client Endpoint Management, IDC. "However, SMBs have different requirements from enterprises in terms of integrated solution requirements, bundled offering preferences, and channel partner relationships. EMM vendors selling into the SMB market must be aware of these differences and adjust product management and go-to-market strategies accordingly."
JAMF Software LLC, baramundi software AG, Quest, Ivanti Software, Inc., Citrix Systems, Inc., Sophos Plc, Google Inc., VMware, Inc., Blackberry Ltd., IBM, Miradore Ltd., Cisco Systems, Inc., Micro Focus International plc, ManageEngine, 42Gears Mobility Systems Pvt. Ltd., Matrix42 AG, Microsoft Corporation, MobileIron, Inc., Zoho Corporation Pvt. Ltd.
Endpoint security, Enterprise mobility, Messaging security, Mobile identity and access management, Mobile secure content and threat management, Mobile security and vulnerability management, Network security, Secure content and threat management, Security management, Technology buyer
List of Tables
List of Figures
When you purchase this document, the purchase price can be applied to the cost of an annual subscription, giving you access to more research for your investment.