December 14, 2016 By Wes Gyure 3 min read

Make the Most of Mobile With MaaS360 Mobile Metrics

In just a matter of years, mobile has effectively overtaken the enterprise. It has transformed the way we work, forcing chief information officers (CIOs) and chief information security officers (CISOs) to rethink their technology investments and security strategies. Those responsible for enterprise mobility management (EMM) have had to adapt quickly to keep up with the fast pace of change in mobile, undergoing drastic changes as they’ve wandered into uncharted territories of:

  • Managing a diverse array of ever-evolving mobile device types and operating systems;
  • Securely storing, syncing and sharing proprietary mobile data; and
  • Developing mobile apps and effectively distributing, managing and securing them.

Watch the on-demand webinar to See How You Measure Up with MaaS360 Mobile Metrics

Mobile’s Epoch: The Wrong Time for the Right Information

With no historical data to refer to or industry statistics to benchmark themselves against, most organizations began their paths to mobile by taking a bootstrapped, trial-and-error approach. Operating in a world that is both highly regulated and full of opportunities, where the smallest slips can have the biggest backlash and minor investments can pay the most dividends, organizations forced themselves to get smarter. To stay ahead of the pack, they’ve resolutely kept their decisions in line with recognized best practices.

Participating at events and webinars has undoubtedly helped information technology and security professionals. These events offer IT professionals forums to share experiences with their peers and ways to learn from industry thought leaders regarding the latest trends and the best ways to embrace them. User groups are often small, however, making it difficult to glean wide-ranging industry best practices. Speakers often convey information at a high level, providing the right guidance but not always the specific answers that are needed at a moment’s notice.

Since organizations are different sizes and industries, and they adhere to differing regulatory standards, they need to base their choices on contextual information that can be applied to their individual business needs and use cases. Due to the rapid shifts that occur in the mobile space, the information needs to be current and available at the click of a button.

You Are Not Alone: Make Informed Moves With IBM MaaS360 Mobile Metrics

All MaaS360 customers now have access to Mobile Metrics, which provides valuable benchmarking data and the actionable intelligence needed to make educated decisions for effective enterprise mobility management.

Only IBM can deliver these metrics — the first of their kind in the EMM industry. The analytical tools that have recently been announced by other EMM vendors do not provide customers with real-time, dynamic benchmarking capabilities. Delivered through its software-as-a-service (SaaS) platform, with 5 million devices under management for over 10,000 global clients, MaaS360 gives customers a unique leg up with Mobile Metrics. With instant access to cloud-sourced benchmarking data, clients can improve security, efficiency and decision-making across their mobile environments.

Whether you’re looking to see how you compare to the broader MaaS360 customer community, those in your industry or even those with similarly sized deployments, Mobile Metrics make it possible to see how you stack up to the competition. It also enables you to identify any gaps across four major categories: deployment, devices, apps and (coming soon) security. It’s easy to export the reports you generate to share trends and influence change with cross-functional teams and the broader organization.

MaaS360 Mobile Metrics allows IT professionals to:

  1. Query the diversity of employee-owned devices.
  2. View the number of devices the average user has.
  3. Determine the most frequently blacklisted or whitelisted apps.
  4. Uncover the most commonly enabled data security settings.

How Do You Measure Up? Benchmark Yourself Against Your Peers

We encourage you to join us for our upcoming webinar, “See How You Measure Up With MaaS360 Mobile Metrics,” to learn more about this new offering. We’ll be sharing:

  • New findings and statistics we’ve garnered from the benchmarking data;
  • Best practices for using the tool; and
  • Tips to better your organization’s approach to mobile productivity and security.

In the meantime, you can begin taking advantage of these new capabilities. Compare your mobile environment to your peers’ by signing up for a 30-day free trial of MaaS360. Mobile Metrics can be accessed today under Community Analytics within the Reports section of the MaaS360 portal.

Watch the on-demand webinar to See How You Measure Up with MaaS360 Mobile Metrics

More from

NIST’s role in the global tech race against AI

4 min read - Last year, the United States Secretary of Commerce announced that the National Institute of Standards and Technology (NIST) has been put in charge of launching a new public working group on artificial intelligence (AI) that will build on the success of the NIST AI Risk Management Framework to address this rapidly advancing technology.However, recent budget cuts at NIST, along with a lack of strategy implementation, have called into question the agency’s ability to lead this critical effort. Ultimately, the success…

Researchers develop malicious AI ‘worm’ targeting generative AI systems

2 min read - Researchers have created a new, never-seen-before kind of malware they call the "Morris II" worm, which uses popular AI services to spread itself, infect new systems and steal data. The name references the original Morris computer worm that wreaked havoc on the internet in 1988.The worm demonstrates the potential dangers of AI security threats and creates a new urgency around securing AI models.New worm utilizes adversarial self-replicating promptThe researchers from Cornell Tech, the Israel Institute of Technology and Intuit, used what’s…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today