Get Instant Access
to This Blueprint

Infrastructure Operations icon

Endpoint Management Selection Guide

Streamline your organizational approach to selecting a right-sized endpoint management platform.

Endpoint management solutions are becoming an essential solution: Deploying the right devices and applications to the right user and the need for zero-touch provisioning are indispensable parts of a holistic strategy for improving customer experience. However, selecting the right-sized platform that aligns with your requirements is a big challenge.

Following improvements in end-user computation strategies, selection of the right endpoint management solution is a crucial next step in delivering a concrete business value.

Our Advice

Critical Insight

Investigate vendors’ roadmaps to figure out which of the candidate platforms can fulfill your long-term requirements, without any unnecessary investment in features that are not currently useful for you. Make sure you don’t purchase capabilities that you will never use.

Impact and Result

  • Determine what you require from an endpoint management solution.
  • Review the market space and product offerings, and compare capabilities of key players.
  • Create a use case and use top-level requirements to determine use cases and shortlist vendors.
  • Conduct a formal process for interviewing vendors using Info-Tech’s templates to select the best platform for your requirements.

Endpoint Management Selection Guide Research & Tools

1. Endpoint Management Selection Guide Storyboard – A structured guide to walk you through the endpoint management market.

This storyboard will help you understand endpoint management solution core capabilities and prepare you to select an appropriate tool.

2. UEM Requirements Workbook – A template to help you build your first draft of requirements for UEM selection.

Use this spreadsheet to brainstorm use cases and features to satisfy your requirements. This document will be help you score solutions and narrow down the field to a list of candidates who can meet your requirements.

Endpoint Management Selection Guide

Streamline your organizational approach to selecting a right-sized endpoint management platform.

Endpoint Management Selection Guide

Streamline your organizational approach toward the selection of a right-sized endpoint management platform.


Analyst Perspective

Revolutionize your endpoint management with a proper tool selection approach

The endpoint management market has an ever-expanding and highly competitive landscape. The market has undergone tremendous evolution in past years, from device management to application deployments and security management. The COVID-19 pandemic forced organizations to service employees and end users remotely while making sure corporate data is safe and user satisfaction doesn't get negatively affected. In the meantime, vendors were forced to leverage technology enhancements to satisfy such requirements.

That being said, endpoint management solutions have become more complex, with many options to manage operating systems and run applications for relevant user groups. With the work-from-anywhere model, customer support is even more important than before, as a remote workforce may face more issues than before, or enterprises may want to ensure more compliance with policies.

Moreover, the market has become more complex, with lots of added capabilities. Some features may not be beneficial to corporations, and with a poor market validation, businesses may end up paying for some capabilities that are not useful.

In this blueprint, we help you quickly define your requirements for endpoint management and narrow down a list to find the solutions that fulfill your use cases.

An image of Mahmoud Ramin, PhD

Mahmoud Ramin, PhD
Senior Research Analyst, Infrastructure and Operations
Info-Tech Research Group

Executive Summary

Your Challenge

Endpoint management solutions are becoming increasingly essential – deploying the right devices and applications to the right users and zero-touch provisioning are indispensable parts of a holistic strategy for improving customers' experience. However, selecting the right-sized platform that aligns with your requirements is a big challenge.

Following improvements in end-user computation strategies, selection of the right endpoint management solution is a crucial next step in delivering concrete business value.

Common Obstacles

Despite the importance of selecting the right endpoint management platform, many organizations struggle to define an approach to picking the most appropriate vendor and rolling out the solution in an effective and cost-efficient manner. There are many options available, which can cause business and IT leaders to feel lost.

The endpoint management market is evolving quickly, making the selection process tedious. On top of that, IT has a hard time defining their needs and aligning solution features with their requirements.

Info-Tech's Approach

Determine what you require from an endpoint management solution.

Review the market space and product offerings, and compare the capabilities of key players.

Create a use case – use top-level requirements to determine use cases and short-list vendors.

Conduct a formal process for interviewing vendors, using Info-Tech's templates to select the best platform for your requirements.

Info-Tech Insight

Investigate vendors' roadmaps to figure out which of the candidate platforms can fulfill your long-term requirements without any unnecessary investment in features that are not currently useful for you. Make sure you don't purchase capabilities that you will never use.

What are endpoint management platforms?

Our definition: Endpoint management solutions are platforms that enable IT with appropriate provisioning, security, monitoring, and updating endpoints to ensure that they are in good health. Typical examples of endpoints are laptops, computers, wearable devices, tablets, smart phones, servers, and the Internet of Things (IoT).

First, understand differences between mobile management solutions

  • Endpoint management solutions monitor and control the status of endpoints. They help IT manage and control their environment and provide top-notch customer service.
  • These solutions ensure a seamless and efficient problem management, software updates and remediations in a secure environment.
  • Endpoint management solutions have evolved very quickly to satisfy IT and user needs:
  • Mobile Device Management (MDM) helps with controlling features of a device.
  • Enterprise Mobile Management (EMM) controls everything in a device.
  • Unified Endpoint Management (UEM) manages all endpoints.

Endpoint management includes:

  • Device management
  • Device configuration
  • Device monitoring
  • Device security

Info-Tech Insight

As endpoint management encompasses a broad range of solution categories including MDM, EMM, and UEM, look for your real requirements. Don't pay for something that you won't end up using.

As UEM covers all of MDM and EMM capabilities, we overview market trends of UEM in this blueprint to give you an overall view of market in this space.

Your challenge: Endpoint management has evolved significantly over the past few years, which makes software selection overwhelming

An mage showing endpoint management visualzed as positions on an iceberg. at the top is UEM, at the midpoint above the waterline is Enterprise Mobile Management, and below the water is Mobile Device Management.

Additional challenges occur in securing endpoints

A rise in the number of attacks on cloud services creates a need to leverage endpoint management solutions

MarketsandMarkets predicted that global cloud infrastructure services would increase from US$73 billion in 2019 to US$166.6 billion in 2024 (2019).

A study by the Ponemon Institute showed that 68% of respondents believe that security attacks increased over the past 12 months (2020).

The study reveals that over half of IT security professionals who participated in the survey believe that organizations are not very efficient in securing their endpoints, mainly because they're not efficient in detecting attacks.

IT professionals would like to link endpoint management and security platforms to unify visibility and control, to determine potential risks to endpoints, and to manage them in a single solution.

Businesses will continue to be compromised by the vulnerabilities of cloud services, which pose a challenge to organizations trying to maintain control of their data.

Trends in endpoint management have been undergoing a tremendous change

In 2020, about 5.2 million users subscribed to mobile services, and smartphones accounted for 65% of connections. This will increase to 80% by 2025.
Source: Fortune Business Insights, 2021

Info-Tech's methodology for selecting a right-sized endpoint management platform

1. Understand Core Features and Build Your Use Case

2. Discover the Endpoint Management Market Space and Select the Right Vendor

Phase Steps

  1. Define endpoint management platforms
  2. Explore endpoint management trends
  3. Classify table stakes & differentiating capabilities
  4. Streamline the requirements elicitation process for a new endpoint management platform
  1. Discover key players across the vendor landscape
  2. Engage the shortlist and select finalists
  3. Prepare for implementation

Phase Outcomes

  1. Consensus on scope of endpoint management and key endpoint management platform capabilities
  2. Top-level use cases and requirements
  1. Overview of shortlisted vendors
  2. Prioritized list of UEM features

Guided Implementation

What does a typical GI on this topic look like?

Phase 1 Phase 2

Call #1: Understand what an endpoint management platform is and learn how it evolved. Discuss core capabilities and key trends.
Call #2: Build a use case and define features to fulfill the use case.

Call #3: Define your core endpoint management platform requirements.
Call #4: Evaluate the endpoint management platform vendor landscape and shortlist viable options.
Review implementation considerations.

A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

The endpoint management purchase process should be broken into segments:

  1. Endpoint management vendor shortlisting with this buyer's guide
  2. Structured approach to selection
  3. Contract review

Info-Tech's approach

The Info-Tech difference:
Analyze needs

Evaluate solutions

Determine where you need to improve the tools and processes used to support the company.

Determine the best fit for your needs by scoring against features.

Assess existing solution


Determine if your solution can be upgraded or easily updated to meet your needs.

Determine which features will be key to your success

Create a business case for change

Use Cases

A two-part business case will focus on a need to change and use cases and requirements to bring stakeholders onboard.

Create use cases to ensure your needs are met as you evaluate features

Improve existing

High-Level Requirements

Work with Info-Tech's analysts to determine next steps to improve your process and make better use of the features you have available.

Use the high-level requirements to determine use cases and shortlist vendors

Complementary research:

Create a quick business case and requirements document to align stakeholders to your vision with Info-Tech's Rapid Application Selection Framework.
See what your peers are saying about these vendors at

Info-Tech offers various levels of support to best suit your needs

DIY Toolkit

“Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

Guided Implementation

“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”


“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”


“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

Diagnostics and consistent frameworks used throughout all four options

Phase 1

Understand core features and build your business case

Phase 1

Phase 2

Define endpoint management platforms

Explore endpoint management trends

Classify table stakes & differentiating capabilities

Streamline the requirements elicitation process for a new endpoint management platform

Discover key players across the vendor landscape

Engage the shortlist and select finalist

Prepare for implementation

This phase will walk you through the following activity:

Define use cases and core features for meeting business and technical goals

This phase involves the following participants:

  • CIO
  • IT manager
  • Infrastructure & Applications directors
Mobile Device Management

Enterprise Mobile Management

MDM applies security over corporate-owned devices.

What is MDM and what can you do with it?

  1. MDM helps manage and control corporate owned devices.
  2. You can enforce company policies, track, monitor, and lock device remotely by an MDM.
  3. MDM helps with remote wiping of the device when it is lost or stolen.
  4. You can avoid unsecure Wi-Fi connections via MDM.

EMM solutions solve the restrictions arose with BYOD (Bring Your Own Device) and COPE (Corporate Owned, Personally Enabled) provisioning models.

  • IT needs to secure corporate-owned data without compromising personal and private data. MDM cannot fulfill this requirement. This led to the development of EMM solutions.
  • EMM tools allow you to manage multiple device platforms through MDM protocols. These tools enforce security settings, allow you to push apps to managed devices, and monitor patch compliance through reporting.

MDM solutions function at the level of corporate devices. Something else was needed to enable personal device management.

Major components of EMM solutions

Mobile Application Management (MAM)

Allows organizations to control individual applications and their associated data. It restricts malicious apps and enables in-depth application management, configuration, and removal.


Enables separation of work-related data from private data. It provides encrypted containers on personal devices to separate the data, providing security on personal devices while maintaining users' personal data.

Mobile Content Management (MCM)

Helps remote distribution, control, management, and access to corporate data.

Mobile Security Management (MSM)

Provides application and data security on devices. It enables application analysis and auditing. IT can use MSM to provide strong passwords to applications, restrict unwanted applications, and protect devices from unsecure websites by blacklisting them.

Mobile Expense Management (MEM)

Enables mobile data communication expenses auditing. It can also set data limits and restrict network connections on devices.

Identity Management

Sets role-based access to corporate data. It also controls how different roles can use data, improving application and data security. Multifactor authentication can be enforced through the identity management featured of an EMM solution.

Unified endpoint management: Control all endpoints in a single pane of glass

IT admins used to provide customer service such as installation, upgrades, patches, and account administration via desktop support. IT support is not on physical assistance over end users' desktops anymore.

The rise of BYOD enhanced the need to be able to control sensitive data outside corporate network connection on all endpoints, which was beyond the capability of MDM and EMM solutions.

  • It's now almost impossible for IT to be everywhere to support customers.
  • This created a need to conduct tasks simultaneously from one single place.
  • UEM enables IT to run, manage, and control endpoints from one place, while ensuring that device health and security remain uncompromised.
  • UEM combines features of MDM and EMM while extending EMM's capabilities to all endpoints, including computers, laptops, tablets, phones, printers, wearables, and IoT.

Info-Tech Insight

Organizations once needed to worry about company connectivity assets such as computers and laptops. To manage them, traditional client management tools like Microsoft Configuration Manager would be enough.

With the increase in the work-from-anywhere model, it is very hard to control, manage, and monitor devices that are not connected to a VPN. UEM solutions enable IT to tackle this challenge and have full visibility into and management of any device.

UEM platforms help with saving costs and increasing efficiency

UEM helps corporates save on their investments as it consolidates use-case management in a single console. Businesses don't need to invest in different device and application management solutions.

From the employee perspective, UEM enables them to work on their own devices while enforcing security on their personal data.

  • Security and privacy are very important criteria for organizations. With the rapid growth of the work-from-anywhere model, corporate security is a huge concern for companies.
  • Working from home has forced companies to invest a lot in data security, which has led to high UEM demand. UEM solutions streamline security management by consolidating device management in a single platform.
  • With the fourth-generation industrial revolution, we're experiencing a significant rise in the use of IoT devices. UEM solutions are very critical for managing, configuring, and securing these devices.
  • There will be a huge increase in cyber threats due to automation, IoT, and cloud services. The pandemic has sped up the adoption of such services, forcing businesses to rethink their enterprise mobility strategies. They are now more cautious about security risks and remediations. Businesses need UEM to simplify device management on multiple endpoints.
  • With UEM, IT environment management gets more granular, while giving IT better visibility on devices and applications.

UEM streamlines mundane admin tasks and simplifies user issues.

Even with a COPE or COBO provisioning model, without any IT intervention, users can decide on when to install relevant updates. It also may lead to shadow IT.

Endpoint management, and UEM more specifically, enables IT to enforce administration over user devices, whether they are corporate or personally owned. This is enabled without interfering with private/personal data.

Where it's going: The future state of UEM

Despite the fast evolution of the UEM market, many organizations do not move as fast as technological capabilities. Although over half of all organizations have at least one UEM solution, they may not have a good strategy or policies to maximize the value of technology (Tech Orchard, 2022). As opposed to such organizations, there are others that use UEM to transform their endpoint management strategy and move service management to the next level. That integration between endpoint management and service management is a developing trend (Ivanti, 2021).

  • SaaS tools like Office 365 are built to be used on multiple devices, including multiple computers. Further, the pandemic saw 47% of organizations significantly increase their use of BYOD (Cybersecurity Insiders, 2021).
  • Over 2022, 78% of people worked remotely for at least some amount of time during the week (Tech Orchard, 2022).
  • 84% of organizations believe that cybersecurity threat alarms are becoming very overwhelming, and almost half of companies believe that the best way to tackle this is through consolidating platforms so that everything will be visible and manageable through a single pane of glass (Cybersecurity Insiders, 2022).
  • The UEM market was worth $3.39 billion in 2020. It is expected to reach $53.65 billion by 2030, with an annual growth rate of 31.7% (Datamation, 2022). This demonstrates how dependent IT is becoming on endpoint management solutions.

An image of a donut chart showing the current state of UEM Strategy.

Only 27% of organizations have "fully deployed" UEM "with easy management across all endpoints"
Source: IT Pro Today, 2018.

Endpoint Management Key Trends

  • Commoditization of endpoint management features. Although their focus is the same, some UEM solutions have unique features.
  • New endpoint management paradigms have emerged. Endpoint management has evolved from client management tools (CMT) and MDM into UEM, also known as "modern management" (Ivanti, 2022).
  • One pane of glass for the entire end-user experience. Endpoint management vendors are integrating their solution into their ITSM, ITOM, digital workspace, and security products.
  • AI-powered insights. UEM tools collect data on endpoints and user behavior. Vendors are using their data to differentiate themselves: Products offer threat reports, automated compliance workflows, and user experience insights. The UEM market is ultimately working toward autonomous endpoint management (Microsoft, 2022).
  • Web apps and cloud storage are the new normal. Less data is stored locally. Fewer apps need to be patched on the device. Apps can be accessed on different devices more easily. However, data can more easily be accessed on BYOD and on new operating systems like Chrome OS.
  • Lighter device provisioning tools. Instead of managing thick images, UEM tools use lighter provisioning packages. Once set up, Autopilot and UEM device enrollment should take less time to manage than thick images.
  • UEM controls built around SaaS. Web apps and the cloud allow access from any device, even unmanaged BYOD. UEM tools allow IT to apply the right level of control for the situation – mobile application management, mobile content management, or mobile device management.
  • Work-from-anywhere and 5G result in more devices outside of your firewalls. Cloud-based management tools are not limited by your VPN connection and can scale up more easily than traditional, on-prem tools.

Understand endpoint management table stakes features

Determine high-level use cases to help you narrow down to specific features

Support the organization's operating systems:
Many UEM vendors support the most dominant operating systems, Windows and Mac; however, they are usually stronger in one particular OS than the other. For instance, Intune supports both Windows and Mac, although there are some drawbacks with MacOS management by Intune. Conversely, Jamf is mainly for MacOS and iOS management. Enterprises look to satisfy their end users' needs. The more UEM vendors support different systems, the more likely enterprises will pick them. Although, as mentioned, in some instances, enterprises may need to select more than one option, depending on their requirements.

Support BYOD and remote environments:
With the impact of the pandemic on work model, 60-70% of workforce would like to have more flexibility for working remotely (Ivanti, 2022). BYOD is becoming the default, and SaaS tools like Office 365 are built to be used on multiple devices, including multiple computers. As BYOD can boost productivity (Samsung Insights, 2016), you may be interested in how your prospective UEM solution will enable this capability with remote wipe (corporate wipe capability vs. wiping the whole device), data and device tracking, and user activity auditing.

Understand endpoint management table stakes features

Determine high-level use cases to help you narrow down to specific features

Integration with the enterprise's IT products:
To get everything in a single platform and to generate better metrics and dashboards, vendors provide integrations with ticketing and monitoring solutions. Many large vendors have strong integrations with multiple ITSM and ITAM platforms to streamline incident management, request management, asset management, and patch management.

Support security and compliance policies:
With the significant boost in work-from-anywhere, companies would like to enable endpoint security more than ever. This includes device threat detection, malware detection, anti-phishing, and more. All UEMs provide these, although the big difference between them is how well they enable security and compliance, and how flexible they are when it comes to giving conditional access to certain data.

Provide a fully automated vs manual deployment:
Employees want to get their devices faster, IT wants to deploy devices faster, and businesses want to enable employees faster to get them onboard sooner. UEMs have the capability to provide automated and manual deployment. However, the choice of solution depends on enterprise's infrastructure and policies. Full automation of deployment is very applicable for corporate devices, while it may not be a good option for personally owned devices. Define your user groups and provisioning models, and make sure your candidate vendors satisfy requirements.

Plan a proper UEM selection according to your requirements

  1. Identify IT governance, policy, and process maturity
    Tools cannot compensate for your bad processes. You should improve deploying and provisioning processes before rolling out a UEM. Automation of a bad process only wraps the process in a nicer package – it does not fix the problem.
    Refer to InfoTech's Modernize and Transform Your End-User Computing Strategy for more information on improving endpoint management procedures.
  2. Consider supported operating systems, cloud services, and network infrastructure in your organization
    Most UEMs support all dominant operating systems, but some solutions have stronger capability for managing a certain OS over the other.
  3. Define enterprise security requirements
    Investigate security levels, policies, and requirements to align with the security features you're expecting in a UEM.
  4. Selection and implementation of a UEM depends on use case. Select a vendor that supports your use cases
    Identify use cases specific to your industry.
    For example, UEM use cases in Healthcare:
    • Secure EMR
    • Enforce HIPAA compliance
    • Secure communications
    • Enable shared device deployment

Activity: Define use cases and core features for meeting business and technical goals

1-2 hours

  1. Brainstorm with your colleagues to discuss your challenges with endpoint management.
  2. Identify how these challenges are impacting your ability to meet your goals for managing and controlling endpoints.
  3. Define high-level goals you wish to achieve in the first year and in the longer term.
  4. Identify the use cases that will support your overall goals.
  5. Document use cases in the UEM Requirements Workbook.


  • List of challenges and goals


  • Use cases to be used for determining requirements


  • Whiteboard/flip charts
  • Laptop to record output


  • CIO
  • IT manager
  • Infrastructure & Applications directors

Download the UEM Requirements Workbook

Phase 2

Discover the endpoint management market space and select the right vendor

Phase 1

Phase 2

Define endpoint management platforms

Explore endpoint management trends

Classify table stakes & differentiating capabilities

Streamline the requirements elicitation process for a new endpoint management platform

Discover key players across the vendor landscape

Engage the shortlist and select finalist

Prepare for implementation

This phase will walk you through the following activity:
Define top-level features for meeting business and technical goals
This phase involves the following participants:

  • CIO
  • IT manager
  • Infrastructure & Applications directors
  • Project managers

Elicit and prioritize granular requirements for your endpoint management platform

Understanding business needs through requirements gathering is the key to defining everything about what is
being purchased. However, it is an area where people often make critical mistakes.

Risks of poorly scoped requirements

  • Fail to be comprehensive and miss certain areas of scope.
  • Focus on how the solution should work instead of what it must accomplish.
  • Have multiple levels of confusing and inconsistent detail in the requirements.
  • Drill down all the way to system-level detail.
  • Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow.
  • Omit constraints or preferences that buyers think are "obvious."

Best practices

  • Get a clear understanding of what the system needs to do and what it is expected to produce.
  • Test against the principle of MECE – requirements should be "mutually exclusive and collectively exhaustive."
  • Explicitly state the obvious and assume nothing.
  • Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes.
  • Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors.

Review Info-Tech's blueprint Improve Requirements Gathering to improve your requirements gathering process.

Consider the perspective of each stakeholder to ensure functionality needs are met

Best of breed vs. "good enough" is an important discussion and will feed your success

Costs can be high when customizing an ill-fitting module or creating workarounds to solve business problems, including loss of functionality, productivity, and credibility.

  • Start with use cases to drive the initial discussion, then determine which features are mandatory and which are nice-to-haves. Mandatory features will help determine high success for critical functionality and identify where "good enough" is an acceptable state.
  • Consider the implications of implementation and all use cases of:
    • Buying an all-in-one solution.
    • Integration of multiple best-of-breed solutions.
    • Customizing features that were not built into a solution.
  • Be prepared to shelve a use case for this solution and look to alternatives for integration where mandatory features cannot meet highly specialized needs that are outside of traditional endpoint management solutions.

Pros and Cons

An image showing the pros and cons of building vs buying

Evaluate software category leaders through vendor rankings and awards

A screenshot of softwareReviews Data Quadrant analyis.. A screenshot of softwareReviews Emotonal Fotprint analyis
  • evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
  • Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.
  • The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
  • Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

Speak with category experts to dive deeper into the vendor landscape


  • Fact-based reviews of business software from IT professionals.
  • Product and category reports with state-of-the-art data visualization.
  • Top-tier data quality backed by a rigorous quality assurance process.
  • User-experience insight that reveals the intangibles of working with a vendor.


Comprehensive software reviews
to make better IT decisions

We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

SoftwareReviews is powered by Info-Tech

Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today's technology.
With the insight of our expert analysts, our members receive unparalleled support in their buying journey.

Get to Know the Key Players in the Endpoint Management Landscape

The following slides provide a top-level overview of the popular players you will encounter in the endpoint management shortlisting process in alphabetical order.

A screenshot showing a series of logos for the companies addressed later in this blueprint. It includes: Ciso; Meraki; Citrix; IBM MaaS360; Ivanti; Jamf|Pro; ManageEngine Endpoint Central; Microsoft Endpoint Manager, and VMWARE.

Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF, and NPS scores are pulled from live data as of January 2023.

Secure business units and enhance connection by simplifying the digital workplace

A good option for enterprises that want a single-pane-of-glass UEM that is easy to use, with a modern-looking dashboard, high threat-management capability, and high-quality customer support.

CISCO Meraki

Est. 1984 | CA, USA | NASDAQ: CSCO










This is a Screenshot of CISCO Meraki's dashboard.

Screenshot of CISCO Meraki's dashboard. Source: Cisco


Areas to improve:

  • Cisco Meraki offers granular control over what users can and cannot use.
  • The system is user friendly and intuitive, with a variety of features.
  • The anti-malware capability enhances security.
  • Users are very satisfied with being able to control everything in a single platform.
  • System configuration is easy.
  • Vendor relationship is very high with a rate of 96%.
  • System setup is easy, and users don't need much experience for initial configuration of devices.
  • Users are also mostly satisfied with the platform design.
  • Monitoring within the tool is easy.
  • According to SoftwareReviews' survey report, the primary reason for leaving Cisco Meraki and switching over to another vendor is functionality.
  • Regardless of the top-notch offerings and high-quality features, the product is relatively expensive. The quality and price factors make the solution a better fit for large enterprises. However, SoftwareReviews' scorecard for Cisco Meraki shows that small organizations are the most satisfied compared to the medium and large enterprises, with a net promoter score of 81%.

Transform work experience and support every endpoint with a unified view to ensure users are productive

A tool that enables you to access corporate resources on personal devices. It is adaptable to your budget. SoftwareReviews reports that 75% of organizations have received a discount at initial purchase or renewal, which makes it a good candidate if looking for a negotiable option.

Citrix Endpoint Management

Est. 1989 | TX, USA | Private










Screenshot of Citrix Endpoint Management's dashboard.

Screenshot of Citrix Endpoint Management's dashboard. Source: Citrix


Areas to improve:

  • Citrix Endpoint Management is a cloud-centric, easy-to-use UEM with an upgradable interface.
  • The solution simplifies endpoint management and provides real-time visibility and notifications.
  • Citrix allows deployments on different operating systems to meet organizations' infrastructure requirements.
  • The vendor offers different licenses and pricing models, allowing businesses of different sizes to use the tool based on their budgets and requirements.
  • Some users believe that integration with external applications should be improved.
  • Deployment is not very intuitive, making implementation process challenging.
  • User may experience some lagging while opening applications on Citrix. Application is even a bit slower when using a mobile device.

Scale remote users, enable BYOD, and drive a zero-trust strategy with IBM's modern UEM solution

A perfect option to boost cybersecurity. Remote administration and installation are made very easy and intuitive on the platform. It is very user friendly, making implementation straightforward. It comes with four licensing options: Essential, Deluxe, Premier, and Enterprise. Check IBM's website for information on pricing and offerings.

IBM MaaS360

Est. 1911 | NY, USA | NYSE: IBM










Screenshot of IBM MaaS360's dashboard.

Screenshot of IBM MaaS360's dashboard. Source: IBM


Areas to improve:

  • IBM MaaS360 is easy to install and implement.
  • It has different pricing models to fit enterprises' needs.
  • MaaS360 is compatible with different operating systems.
  • Security management is one of the strongest features, making the tool perfect for organizations that want to improve cybersecurity.
  • Vendor support is very effective, and users find knowledge articles very helpful.
  • It has a very intuitive dashboard.
  • The tool can control organizational data, allowing you to apply BYOD policy.
  • AI Advisor with Watson provides AI-driven reporting and insights.
  • Working with iOS may not be as intuitive as other operating systems.
  • Adding or removing users in a user group is not very straightforward.
  • Some capabilities are limited to particular Android or iOS devices.
  • Deploying application packages may be a bit difficult.
  • Hardware deployment may need some manual work and is not fully automated.

Get complete device visibility from asset discovery to lifecycle management and remediation

A powerful tool for patch management with a great user interface. You can automate patching and improve cybersecurity, while having complete visibility into devices. According to SoftwareReviews, 100% of survey participants plan to renew their contract with Ivanti.

Ivanti Neurons

Est. 1985 | CA, USA | Private










Screenshot of Ivanti Neurons UEM's dashboard.

Screenshot of Ivanti Neurons UEM's dashboard. Source: Ivanti


Areas to improve:

  • The tool is intuitive and user friendly.
  • It's a powerful security management platform, supporting multiple operating systems.
  • Ivanti Neurons is very strong in patch management and inventory management. It helps a seamless application deployment.
  • Users can install their applications via Ivanti's portal.
  • The user interface is very powerful and easy to use.
  • AI-augmented process management automates protocols, streamlining device management and application updates.
  • Vendor is very efficient in training and provides free webinars.
  • Data integration is very easy. According to SoftwareReviews, it had a satisfaction score for ease of data integration of 86%, which makes Ivanti the top solution for this capability.
  • Data analytics is powerful but complicated.
  • Setup is easy for some teams but not as easy for others, which may cause delays for implementation.
  • Software monitoring is not as good as other competitors.

Improve your end-user productivity and transform enterprise Apple devices

An Apple-focused UEM with a great interface. Jamf can manage and control macOS and iOS, and it is one of the best options for Apple products, according to users' sentiments. However, it may not be a one-stop solution if you want to manage non-Apple products as well. In this case, you can use Jamf in addition to another UEM. Jamf has some integrations with Microsoft, but it may not be sufficient if you want to fully manage Windows endpoints.

Jamf PRO

Est. 2002 | MN, USA | NASDAQ: JAMF










Screenshot of Jamf PRO's dashboard.

Screenshot of Jamf PRO's dashboard. Source: Jamf


Areas to improve:

  • Jamf Pro is a unique product with an easy implementation that enables IT with minimum admin intervention.
  • It can create smart groups (based on MDM profile and user group) to automatically assign users to their pertinent apps and updates.
  • It's a very user-friendly tool, conducting device management in fewer steps than other competitors.
  • Reports are totally customizable and dynamic.
  • Notifications are easy to navigate and monitor.
  • Self-service feature enables end users to download their predefined categories of applications in the App Store.
  • It can apply single sign-on integrations to streamline user access to applications.
  • Businesses can personalize the tool with corporate logos.
  • Vendor does great for customer service when problems arise.
  • It is a costly tool relative to other competitors, pushing prospects to consider other products.
  • The learning process may be long and not easy, especially if admins do not script, or it's their first time using a UEM.

Apply automation of traditional desktop management, software deployment, endpoint security, and patch management

A strong choice for patch management, software deployment, asset management, and security management. There is a free version of the tool available to try get an understanding of the platform before purchasing a higher tier of the product.

ManageEngine Endpoint Central

Est. 1996 | India | Private










Screenshot of ME Endpoint Central's dashboard.

Screenshot of ME Endpoint Central's dashboard. Source: ManageEngine


Areas to improve:

  • It supports several operating systems including Windows, Mac, Linux, Android, and iOS.
  • Endpoint Central provides end-to-end monitoring, asset management, and security in a single platform.
  • Setup is simple and intuitive, and it's easy to learn and configure.
  • The reporting feature is very useful and gives you clear visibility into dashboard.
  • Combined with ME Service Desk Plus, we can call Endpoint Central an all-in-one solution.
  • The tool provides a real-time report on devices and tracks their health status.
  • It has multiple integrations with third-party solutions.
  • Tool does not automate updates, making application updates time-consuming.
  • Sometimes, patches and software deployments fail, and the tool doesn't provide any information on the reason for the failure.
  • There is no single point of contact/account manager for the clients when they have trouble with the tool.
  • Remote connection to Android devices can sometimes get a little tedious.

Get device management and security in a single platform with a combination of Microsoft Intune and Configuration Manager

A solution that combines Intune and ConfigMgr's capabilities into a single endpoint management suite for enrolling, managing, monitoring, and securing endpoints. It's a very cost-effective solution for enterprises in the Microsoft ecosystem, but it also supports other operating systems.

Microsoft Endpoint Manager

Est. 1975 | NM, USA | NASDAQ: MSFT










Screenshot of MS Endpoint Manager's dashboard.

Screenshot of MS Endpoint Manager's dashboard. Source: Microsoft


Areas to improve:

  • Licensing for the enterprises that use Windows as their primary operating system is more efficient and cost effective.
  • Endpoint Manager is very customizable, with the ability to assign personas to device groups.
  • Besides Windows, it manages other operating systems, such as Linux, Android, and iOS.
  • It creates endpoint security and compliance policies for BitLocker that streamlines data protection and security. It also provides SSO.
  • It provides very strong documentation and knowledgebase.
  • User interface is not as good as competitors. It's a bit clunky and complex to use.
  • The process of changing configurations on devices can be time consuming.
  • Sometimes there are service outages such as Autopilot failure, which push IT to deploy manually.
  • Location tracking is not very accurate.

Simplify and consolidate endpoint management into a single solution and secure all devices with real-time, "over-the-air" modern management across all use cases

A strong tool for managing and controlling mobile devices. It can access all profiles through Google and Apple, and it integrates with various IT management solutions.

VMware Workspace ONE

Est. 1998 | CA, USA | NYSE: VMW










Screenshot of Workspace ONE's dashboard.

Screenshot of Workspace ONE's dashboard. Source: VMware


Areas to improve:

  • Workspace ONE provides lots of information about devices.
  • It provides a large list of integrations.
  • The solution supports various operating systems.
  • The platform has many out-of-the-box features and helps with security management, asset management, and application management.
  • The vendor has a community forum which users find helpful for resolving issues or asking questions about the solution.
  • It is very simple to use and provides SSO capability.
  • Implementation is relatively easy and straightforward.
  • Customization may be tricky and require expertise.
  • The solution can be more user friendly with a better UI.
  • Because of intensive processing, updates to applications take a long time.
  • The tool may sometimes be very sensitive and lock devices.
  • Analytics and reporting may need improvement.

Review your use cases to start your shortlist

Your Info-Tech analysts can help you narrow down the list of vendors that will meet your requirements.

Next steps will include:

  1. Reviewing your requirements
  2. Checking out SoftwareReviews
  3. Shortlisting your vendors
  4. Conducting demos and detailed proposal reviews
  5. Selecting and contracting with a finalist!

Activity: Define high-level features for meeting business and technical goals


  • List of endpoint management use cases
  • List of prioritized features


  • Vendor evaluation
  • Final list of candidate vendors


  • Whiteboard/flip charts
  • Laptop
  • UEM Requirements Workbook


  • CIO
  • IT manager
  • Infrastructure & Applications directors
  • Project managers

Activity: Define top-level features for meeting business and technical goals

As there are many solutions in the market that share capabilities, it is imperative to closely evaluate how well they fulfill your endpoint management requirements.
Use the UEM Requirements Workbook to identify your desired endpoint solution features and compare vendor solution functionality based on your desired features.

  1. Refer to the output of the previous activity, the identified use cases in the spreadsheet.
  2. List the features you want in an endpoint solution for your devices that will fulfill these use cases. Record those features in the second column ("Detailed Feature").
  3. Prioritize each feature (must have, should have, nice to have, not required).
  4. Send this list to candidate vendors.
  5. When you finish your investigation, review the spreadsheet to compare the various offerings and pros and cons of each solution.

Info-Tech Insight

The output of this activity can be used for a detailed evaluation of UEM vendors. The next steps will be vendor briefing and having further discussion on technical capabilities and conducting demos of solutions. Info-Tech's blueprint, The Rapid Application Selection Framework, takes you to these next steps.

This is a screenshot showing the high value use cases table from The Rapid Application Selection Framework.

Download the UEM Requirements Workbook

Leverage Info-Tech's research to plan and execute your endpoint management selection and implementation

Use Info-Tech Research Group's blueprints for selection and implementation processes to guide your own planning.

  • Assess
  • Prepare
  • Govern & Course Correct

This is a screenshot of the title pages from INfo-tech's Governance and management of enterprise Software Implementaton; and The Rapid Applicaton Selection Framework.

Ensure your implementation team has a high degree of trust and communication

If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.


Teams must have some type of communication strategy. This can be broken into:

  • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
  • Ceremonies: Injecting awards and continually emphasizing delivery of value can encourage relationship building and constructive motivation.
  • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.


Distributed teams create complexity because communication can break down more easily. This can be mitigated by:

  • Location: Placing teams in proximity can close the barrier of geographical distance and time zone differences.
  • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
  • Communication Tools: Having the right technology (e.g. video conference) can help bring teams closer together virtually.


Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:

Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.

  • Role Clarity: Having a clear definition of what everyone's role is.

Implementation with a partner typically results in higher satisfaction

Align your implementation plans with both the complexity of the solution and internal skill levels

Be clear and realistic in your requirements to the vendor about the level of involvement you need to be successful.

Primary reasons to use a vendor:

  • Lack of skilled resources: For solutions with little configuration change happening after the initial installation, the ramp-up time for an individual to build skills for a single event is not practical.
  • Complexity of solution: Multiple integrations, configurations, modules, and even acquisitions that haven't been fully integrated in the solution you choose can make it difficult to complete the installation and rollout on time and on budget. Troubleshooting becomes even more complex if multiple vendors are involved.
  • Data migration: Decide what information will be valuable to transfer to the new solution and which will not benefit your organization. Data structure and residency can both be factors in the complexity of this exercise.

This is an image of a bar graph showing the Satisfaction Net Promotor Score by Implementation type and Organization Size.

Source: SoftwareReviews, January 2020 to January 2023, N= 20,024 unique reviews

To ensure your SOW is mutually beneficial, download the blueprint Improve Your Statements of Work to Hold Your Vendors Accountable.

Consider running a proof of concept if concerns are expressed about the feasibility of the chosen solution

Proofs of concept (PoCs) can be time consuming, so make good choices on where to spend the effort

Create a PoC charter that will enable a quick evaluation of the defined use cases and functions. These key dimensions should form the PoC.

  1. Objective – Giving an overview of the planned PoC will help to focus and clarify the rest of this section. What must the PoC achieve? Objectives should be specific, measurable, attainable, relevant, and time bound. Outline and track key performance indicators.
  2. Key Success Factors – These are conditions that will positively impact the PoC's success.
  3. Scope – High-level statement of scope. More specifically, state what is in scope and what is out of scope.
  4. Project Team – Identify the team's structure, e.g. sponsors, subject matter experts.
  5. Resource Estimation – Identify what resources (time, materials, space, tools, expertise, etc.) will be needed to build and socialize your prototype. How will they be secured?

An image of two screenshots from Info-Tech Research Group showing documentaton used to generate effective proof of concepts.

To create a full proof of concept plan, download the Proof of Concept Template and see the instructions in Phase 3 of the blueprint Exploit Disruptive Infrastructure Technology.

Selecting a right-sized endpoint management platform

This selection guide allows organizations to execute a structured methodology for picking a UEM platform that aligns with their needs. This includes:

  • Identifying and prioritizing key business and technology drivers for an endpoint management selection business case.
  • Defining key use cases and requirements for a right-sized UEM platform.
  • Reviewing a comprehensive market scan of key players in the UEM marketspace.

This formal UEM selection initiative will map out requirements and identify technology capabilities to fill the gap for better endpoint management. It also allows a formal roll-out of a UEM platform that is highly likely to satisfy all stakeholder needs.

If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

Contact your account representative for more information

Summary of Accomplishment

Knowledge Gained

  • What endpoint management is
  • Historical origins and evolution of endpoint management platforms
  • Current trends and future state of endpoint management platforms

Processes Optimized

  • Identifying use cases
  • Gathering requirements
  • Reviewing market key players and their capabilities
  • Selecting a UEM tool that fulfills your requirements

UEM Solutions Analyzed

  • CISCO Meraki
  • Citrix Endpoint Management
  • IBM MaaS360
  • Ivanti Neurons UEM
  • Jamf Pro
  • ManageEngine Endpoint Central
  • Microsoft Endpoint Manager
  • VMware Workspace ONE

Related Info-Tech Research

Modernize and Transform Your End-User Computing Strategy

This project helps support the workforce of the future by answering the following questions: What types of computing devices, provisioning models, and operating systems should be offered to end users? How will IT support devices? What are the policies and governance surrounding how devices are used? What actions are we taking and when? How do end-user devices support larger corporate priorities and strategies?

Best Unified Endpoint Management (UEM) Software | SoftwareReviews

Compare and evaluate Unified Endpoint Management vendors using the most in-depth and unbiased buyer reports available. Download free comprehensive 40+ page reports to select the best Unified Endpoint Management software for your organization.

The Rapid Application Selection Framework

This blueprint walks you through a process for a fast and efficient selection of your prospective application. You will be enabled to use a data-driven approach to select the right application vendor for your needs, shatter stakeholder expectations with truly rapid application selections, boost collaboration and crush the broken telephone with concise and effective stakeholder meetings, and lock in hard savings.


"BYOD Security Report." Cybersecurity Insiders, 2021. Accessed January 2023.
"Cloud Infrastructure Services Market." MarketsAnd Markets, 2019. Accessed December 2022.
Evans, Alma. "Mastering Mobility Management: MDM Vs. EMM Vs. UEM." Hexnode, 2019. Accessed November 2022.
"Evercore-ISI Quarterly Enterprise Technology Spending Survey." Evercore-ISI, 2022. Accessed January 2023.
"5G Service Revenue to Reach $315 Billion Globally in 2023." Jupiter Research, 2022. Accessed January 2023.
Hein, Daniel. "5 Common Unified Endpoint Management Use Cases You Need to Know." Solutions Review, 2020. Accessed January 2023.
"Mobile Device Management Market Size, Share & COVID-19 Impact Analysis." Fortune Business Insights, 2021. Accessed December 2022.
Ot, Anina. "The Unified Endpoint Management (UEM) Market." Datamation, 14 Apr. 2022. Accessed Jan. 2023.
Poje, Phil. "CEO Corner: 4 Trends in Unified Endpoint Management for 2023." Tech Orchard, 2022. Accessed January 2023.
"The Future of UEM November 2021 Webinar." Ivanti, 2021. Accessed January 2023.
"The Third Annual Study on the State of Endpoint Security Risk." Ponemon Institute, 2020. Accessed December 2022.
"The Ultimate Guide to Unified Endpoint Management (UEM)." MobileIron. Accessed January 2023.
"Trends in Unified Endpoint Management." It Pro Today, 2018. Accessed January 2023.
Turek, Melanie. "Employees Say Smartphones Boost Productivity by 34 Percent: Frost & Sullivan Research." Samsung Insights, 3 Aug. 2016.
"2023 State of Security Report." Cybersecurity Insiders, 2022. Accessed January 2023.
Violino, Bob. "Enterprise Mobility 2022: UEM Adds User Experience, AI, Automation." Computerworld, 2022. Accessed January 2023.
Violino, Bob. "How to Choose the Right UEM Platform." Computerworld, 2021. Accessed January 2023.
Violino, Bob. "UEM Vendor Comparison Chart 2022." Computerworld, 2022. Accessed January 2023.
Wallent, Michael. "5 Endpoint Management Predictions for 2023." Microsoft, 2022. Accessed January 2023.
"What Is the Difference Between MDM, EMM, and UEM?" 42Gears, 2017. Accessed November 2022.

Endpoint Management Selection Guide preview picture

About Info-Tech

Info-Tech Research Group is the world’s fastest-growing information technology research and advisory company, proudly serving over 30,000 IT professionals.

We produce unbiased and highly relevant research to help CIOs and IT leaders make strategic, timely, and well-informed decisions. We partner closely with IT teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for their organizations.

What Is a Blueprint?

A blueprint is designed to be a roadmap, containing a methodology and the tools and templates you need to solve your IT problems.

Each blueprint can be accompanied by a Guided Implementation that provides you access to our world-class analysts to help you get through the project.

Talk to an Analyst

Our analyst calls are focused on helping our members use the research we produce, and our experts will guide you to successful project completion.

Book an Analyst Call on This Topic

You can start as early as tomorrow morning. Our analysts will explain the process during your first call.

Get Advice From a Subject Matter Expert

Each call will focus on explaining the material and helping you to plan your project, interpret and analyze the results of each project step, and set the direction for your next project step.

Unlock Sample Research


Mahmoud Ramin

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019