December 14, 2016 By Wes Gyure 3 min read

Make the Most of Mobile With MaaS360 Mobile Metrics

In just a matter of years, mobile has effectively overtaken the enterprise. It has transformed the way we work, forcing chief information officers (CIOs) and chief information security officers (CISOs) to rethink their technology investments and security strategies. Those responsible for enterprise mobility management (EMM) have had to adapt quickly to keep up with the fast pace of change in mobile, undergoing drastic changes as they’ve wandered into uncharted territories of:

  • Managing a diverse array of ever-evolving mobile device types and operating systems;
  • Securely storing, syncing and sharing proprietary mobile data; and
  • Developing mobile apps and effectively distributing, managing and securing them.

Watch the on-demand webinar to See How You Measure Up with MaaS360 Mobile Metrics

Mobile’s Epoch: The Wrong Time for the Right Information

With no historical data to refer to or industry statistics to benchmark themselves against, most organizations began their paths to mobile by taking a bootstrapped, trial-and-error approach. Operating in a world that is both highly regulated and full of opportunities, where the smallest slips can have the biggest backlash and minor investments can pay the most dividends, organizations forced themselves to get smarter. To stay ahead of the pack, they’ve resolutely kept their decisions in line with recognized best practices.

Participating at events and webinars has undoubtedly helped information technology and security professionals. These events offer IT professionals forums to share experiences with their peers and ways to learn from industry thought leaders regarding the latest trends and the best ways to embrace them. User groups are often small, however, making it difficult to glean wide-ranging industry best practices. Speakers often convey information at a high level, providing the right guidance but not always the specific answers that are needed at a moment’s notice.

Since organizations are different sizes and industries, and they adhere to differing regulatory standards, they need to base their choices on contextual information that can be applied to their individual business needs and use cases. Due to the rapid shifts that occur in the mobile space, the information needs to be current and available at the click of a button.

You Are Not Alone: Make Informed Moves With IBM MaaS360 Mobile Metrics

All MaaS360 customers now have access to Mobile Metrics, which provides valuable benchmarking data and the actionable intelligence needed to make educated decisions for effective enterprise mobility management.

Only IBM can deliver these metrics — the first of their kind in the EMM industry. The analytical tools that have recently been announced by other EMM vendors do not provide customers with real-time, dynamic benchmarking capabilities. Delivered through its software-as-a-service (SaaS) platform, with 5 million devices under management for over 10,000 global clients, MaaS360 gives customers a unique leg up with Mobile Metrics. With instant access to cloud-sourced benchmarking data, clients can improve security, efficiency and decision-making across their mobile environments.

Whether you’re looking to see how you compare to the broader MaaS360 customer community, those in your industry or even those with similarly sized deployments, Mobile Metrics make it possible to see how you stack up to the competition. It also enables you to identify any gaps across four major categories: deployment, devices, apps and (coming soon) security. It’s easy to export the reports you generate to share trends and influence change with cross-functional teams and the broader organization.

MaaS360 Mobile Metrics allows IT professionals to:

  1. Query the diversity of employee-owned devices.
  2. View the number of devices the average user has.
  3. Determine the most frequently blacklisted or whitelisted apps.
  4. Uncover the most commonly enabled data security settings.

How Do You Measure Up? Benchmark Yourself Against Your Peers

We encourage you to join us for our upcoming webinar, “See How You Measure Up With MaaS360 Mobile Metrics,” to learn more about this new offering. We’ll be sharing:

  • New findings and statistics we’ve garnered from the benchmarking data;
  • Best practices for using the tool; and
  • Tips to better your organization’s approach to mobile productivity and security.

In the meantime, you can begin taking advantage of these new capabilities. Compare your mobile environment to your peers’ by signing up for a 30-day free trial of MaaS360. Mobile Metrics can be accessed today under Community Analytics within the Reports section of the MaaS360 portal.

Watch the on-demand webinar to See How You Measure Up with MaaS360 Mobile Metrics

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today