{"id":25468,"date":"2022-10-12T18:00:38","date_gmt":"2022-10-12T18:00:38","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=25468"},"modified":"2022-10-12T18:00:41","modified_gmt":"2022-10-12T18:00:41","slug":"unified-endpoint-management-uem-solutions","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/","title":{"rendered":"Top Unified Endpoint Management (UEM) Solutions"},"content":{"rendered":"\n<p>Unification has been a trend in IT for a long time, whether it&#8217;s communications, storage, data management or other technologies, and the trend hasn&#8217;t escaped cybersecurity either, as products converge into more comprehensive platforms like <a href=\"https:\/\/www.esecurityplanet.com\/products\/xdr-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">XDR<\/a> or <a href=\"https:\/\/www.esecurityplanet.com\/products\/secure-access-service-edge-sase\/\" target=\"_blank\" rel=\"noreferrer noopener\">SASE<\/a>.<\/p>\n\n\n\n<p>Endpoint technologies are the latest to join the unification craze, as <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/antivirus-vs-epp-vs-edr\/\" target=\"_blank\" rel=\"noreferrer noopener\">endpoint security<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">mobile device management<\/a> are getting folded into unified endpoint management (UEM) solutions.<\/p>\n\n\n\n<p>Also see the <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Top Endpoint Detection &amp; Response (EDR) Solutions<\/strong><\/a><\/p>\n\n\n\n<p>Jump to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"#what\">What is Unified Endpoint Management?<\/a><\/li><li><a href=\"#benefits\">UEM Benefits<\/a><\/li><li><a href=\"#trends\">UEM Trends<\/a><\/li><li><a href=\"#top\">Top UEM Vendors<\/a><ul><li><a href=\"#vmware\">VMware Workspace One<\/a><\/li><li><a href=\"#microsoft\">Microsoft Endpoint Management<\/a><\/li><li><a href=\"#syxsense\">Syxsense Enterprise<\/a><\/li><li><a href=\"#ibm\">IBM Security MaaS360<\/a><\/li><li><a href=\"#ivanti\">Ivanti Neurons for UEM<\/a><\/li><li><a href=\"#manageengine\">ManageEngine<\/a><\/li><li><a href=\"#hexnode\">Hexnode UEM<\/a><\/li><li><a href=\"#matrix42\">Matrix42 Secure UEM<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what\">What is Unified Endpoint Management?<\/h2>\n\n\n\n<p>UEM is an attempt to bring together all of the different endpoint management and protection tools into one integrated console. As such, it encompasses areas such as <a href=\"https:\/\/www.esecurityplanet.com\/products\/antivirus-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus<\/a>, anti-spam, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\" target=\"_blank\" rel=\"noreferrer noopener\">malware protection<\/a>, <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">ransomware protection<\/a>, and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-malware-threats-and-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">mobile device protection<\/a>.<\/p>\n\n\n\n<p>Gartner sees such consolidation as an overall trend. And UEM is entering the mainstream, according to Gartner, having reached a market penetration level of 20% to 50%, with large organizations and certain verticals the biggest adopters.<\/p>\n\n\n\n<p>\u201cUnified endpoint management tools provide agent-based and agentless management of computers and mobile devices through an employee-centric view of endpoint devices running Windows, Google Android and Chrome OS, Apple macOS, iPadOS, and iOS,\u201d said Gartner analyst Dan Wilson. \u201cUEM tools apply data protection, device configuration and usage policies using telemetry from identities, apps, connectivity, and devices. They also integrate with <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">identity<\/a>, security, and <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/secure-access-for-remote-workers-rdp-vpn-vdi\/\" target=\"_blank\" rel=\"noreferrer noopener\">remote access tools<\/a> to support <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero trust<\/a>.\u201d<\/p>\n\n\n\n<p>Given UEM&#8217;s focus on mobile device management, <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-mobility-management\/\" target=\"_blank\" rel=\"noreferrer noopener\">Enterprise Mobility Management (EMM)<\/a> vendors have been among the early leaders in the UEM market.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"benefits\">UEM Benefits<\/h2>\n\n\n\n<p>Gartner lists benefits of UEM such as:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Eliminating many manually intensive tasks and processes across multiple endpoints<\/li><li>Location-agnostic endpoint management and patching<\/li><li>Reducing the total cost of ownership of managing endpoint devices<\/li><li>Simplified device management and support<\/li><li>Lowered risk due to covering more device types and operating systems (OSes)<\/li><li>Stronger policy management<\/li><li>Better integration with identity, security, and remote access tools<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"trends\">UEM Trends<\/h2>\n\n\n\n<p>UEM is a hot area of IT. As such, a number of trends are impacting this space. Aditya Kunduri, director of product marketing for end-user computing at VMware, drew attention to cloud-native modern management&nbsp;of endpoints. This makes it possible to deploy, manage, and support off-network and remote users, primarily their desktops and laptops.<\/p>\n\n\n\n<p>Automation,&nbsp;of endpoint tasks using data driven and no- and low-code automation is another UEM innovation. It enables admins to simplify and automate these complex and mundane administrative tasks.<\/p>\n\n\n\n<p>The digital employee experience (DEX)&nbsp;is also being integrated into UEM platforms.<\/p>\n\n\n\n<p>\u201cWe are seeing endpoint management teams ask for DEX capabilities that are tightly integrated with UEM to provide customers with the means to deliver and measure rich telemetry, analyze using data science, and proactively remediate user experience issues across endpoints, apps, network, and access,\u201d said Kunduri.<\/p>\n\n\n\n<p>Ashley Leonard, CEO of Syxsense, called attention to the fact that Gartner is now calling out security functionality as a key product ingredient in its latest UEM Magic Quadrant (MQ).<\/p>\n\n\n\n<p>\u201cIn an effort to narrow down the attack surface that comes from multiple agents and multiple consoles, customers are looking for solutions that provide both functions,\u201d said Leonard. \u201cThat means more intelligence on filtering through the haystack of incoming security telemetry into a meaningful subset, better threat prioritization, and automation that can automatically maintain an endpoint in a desired state.\u201d<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.esecurityplanet.com\/products\/iot-security-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">Internet of Things (IoT)<\/a> is an area that is gradually coming under the UEM banner, according to Apu Pavithran, CEO and founder of Hexnode.<\/p>\n\n\n\n<p>\u201cIoT has entered almost every enterprise, and just as with every mobile device and PC, the need to manage IoT will soon be predominant,\u201d Pavithran said.<\/p>\n\n\n\n<p>Rex McMillan, vice president of product management at Ivanti, also stressed the integration of DEX features and its raised profile in an increasingly remote workforce.<\/p>\n\n\n\n<p>\u201cUEM is key to enabling security and productivity in the hybrid and remote workplace,\u201d McMillan said. \u201cThe need for remote-access capabilities, mobile management tools, and visibility of all endpoint devices has never been greater.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"top\">Top UEM Vendors<\/h2>\n\n\n\n<p><em>eSecurity Planet<\/em> evaluated multiple vendors in the UEM space. These stood out from the pack in our analysis.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"vmware\">VMware Workspace One<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/05\/ESP.VMware.png\" alt=\"VMware logo.\" class=\"wp-image-22015\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.VMware.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/05\/ESP.VMware-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>VMware delivers UEM through VMware Workspace One. It offers a single solution for management of all device types, including desktops, mobile, rugged, wearables, and IoT, and across all use cases along with <a href=\"https:\/\/www.esecurityplanet.com\/products\/single-sign-on-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">single sign-on (SSO)<\/a> access, a consistent user workspace, DEX management, risk analytics, and plenty of features for workspace security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Cross-platform support and management capabilities in a single pane of glass, including rugged device types and use cases, point of sale (POS), augmented\/virtual reality (AR\/VR) headsets, mobile printers, peripherals, kiosks, and digital signage.<\/li><li>Advanced support is available for attended or unattended shared devices, COPE (corporate-owned, personally-enabled) architecture, and BYO (bring-your-own) policies.<\/li><li>Improved visibility and security, and the multi-tenant architecture supports complex deployments at scale.<\/li><li>Integrated identity and access controls, app and multi-platform endpoint management, analytics and automation (including purpose-built dashboards for frontline deployments), and cross-platform remote support (with integration with ServiceNow).<\/li><li>Low-code IT orchestration and automation platform that can streamline app deployments, device onboarding, and device state management.<\/li><li>Zero-trust security features include risk analytics, auto-remediation, SSO and <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">multi-factor authentication (MFA)<\/a>, integrated mobile threat defense (MTD) and VMware Tunnel for device and per-app <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-vpn-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPN<\/a>, integrations to third-party security tools via Trust Network and to VMware Secure Access cloud-hosted zero trust network access solution.<\/li><li>It can pull inventory data and device or system attributes with sensors and deploy scripts to query inventory data or make configuration changes as well as enable scripts to be triggered on-demand by end users in self-service catalog.<\/li><li>Offers provisioning of devices with business-approved settings, apps, and resources before they ship directly to end users, adding and updating what you want provisioned over the air (OTA) with zero touch from IT.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"microsoft\">Microsoft Endpoint Management<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/04\/Microsoft-Azure.jpg\" alt=\"Microsoft logo.\" class=\"wp-image-21506\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Microsoft-Azure.jpg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/04\/Microsoft-Azure-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>Microsoft Endpoint Manager was graded as the only vendor in the Leaders category in this year\u2019s Magic Quadrant for UEM. It is a cloud-enabled platform for unified and secure endpoint management that provides risk-based conditional access for apps and data as well as support for diverse corporate and BYOD scenarios.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Microsoft Endpoint Manager automates and prioritizes tasks.<\/li><li>Microsoft Endpoint Manager offers built-in security analytics.<\/li><li>Azure Active Directory Conditional Access is available.<\/li><li>Endpoint security is available courtesy of Microsoft Defender ATP.<\/li><li>Microsoft Endpoint Manager provides Apple, Android, Windows, and ruggedized device management.<\/li><li>Microsoft Endpoint Manager provides a productivity score for users.<\/li><li>Microsoft Endpoint Manager combines Intune and Configuration Manager.<\/li><li>The platform is available with an Enterprise Mobility + Security (EMS) license.<\/li><li>Microsoft Endpoint Manager offers integration with Azure Virtual Desktop, Windows 365, Defender for Endpoint, and Azure Active Directory (AD).<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"syxsense\">Syxsense Enterprise<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/syxsense-logo-esp.jpeg\" alt=\"Syxsense logo.\" class=\"wp-image-25469\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/syxsense-logo-esp.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/syxsense-logo-esp-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>Syxsense Enterprise brings together UEM and unified endpoint security (UES) to create what the company terms a unified security and endpoint management (USEM) solution. It delivers <a href=\"https:\/\/www.esecurityplanet.com\/products\/patch-management-software\/\" target=\"_blank\" rel=\"noreferrer noopener\">patch management<\/a>, mobile device management, real-time vulnerability monitoring, and instant remediation for endpoints as well as IT management across all endpoints.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Syxsense brings everything needed for endpoint management and protection onto one console.<\/li><li>It offers automatic detection and remediation of vulnerabilities and missing patches.<\/li><li>Syxsense scans for all vulnerabilities on any device, blocks communication from an infected device to the internet, isolates endpoints, and kills malicious processes before they spread.<\/li><li>The platform automatically prioritizes and deploys operating system (OS) and third-party patches to all major operating systems as well as Windows 10 feature updates.<\/li><li>Remediation is done using a <a href=\"https:\/\/www.esecurityplanet.com\/networks\/soar\/\" target=\"_blank\" rel=\"noreferrer noopener\">security orchestration, automation, and response (SOAR)<\/a>-like product called Syxsense Cortex that allows for drag-and-drop remediation workflows with no coding or scripting required.<\/li><li>A single agent automates the management of endpoints, secures the business, reduces the attack surface, and simplifies management.<\/li><li>Deep scanning is done for known security flaws, and IT is provided with a list of misconfigurations that require remediation.<\/li><li>Syxscore is a scoring methodology that reports on discovered threats and how prevalent they are in environments.<\/li><li>The security research team provides prebuilt workflows and playbooks that accomplish key IT management functions, such as setting up new laptops and rolling out new software, as well as remediating security flaws.<\/li><li>Syxsense provides proof of compliance against industry standards such as HIPAA and PCI.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ibm\">IBM Security MaaS360<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/01\/ESP.IBM_.jpeg\" alt=\"IBM logo.\" class=\"wp-image-24859\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/ESP.IBM_.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/ESP.IBM_-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>IBM Security MaaS360 with Watson earned a Challenger rating in the Gartner UEM MQ. It is an AI-enhanced UEM and endpoint security platform that tends to focus on the midsize market in verticals such as technology, retail, and manufacturing. It is available as a software-as-a-service (SaaS) solution and not for on-premises deployments.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Watson Analytics helps users identify, prioritize, triage, and resolve security while identifying risk or performance and configuration issues on devices managed by MaaS360.<\/li><li>IBM Security MaaS360 offers customizable, automated reporting.<\/li><li>There is a large catalog of templates with a wizard-like interface.<\/li><li>A large number of integrations are available with IBM and non-IBM software in security, vulnerability, identity, IT service and asset, digital adoption, data analytics, and remote support.<\/li><li>Microsoft partnership has opened up Conditional Access Device Trust integration.<\/li><li>Proficiency with IBM Security MaaS360 can lead to security certifications such as FedRAMP, SOC II Type 2, and ISO 27000 II.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"ivanti\">Ivanti Neurons for UEM<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/12\/Ivanti.jpg\" alt=\"Ivanti logo.\" class=\"wp-image-20812\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Ivanti.jpg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/12\/Ivanti-150x150.jpg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>Ivanti Neurons for UEM enables IT to discover, manage, and secure all devices on a network. In addition, endpoint management tasks are automated. The platform offers real-time device visibility, automated patch and OS deployments, user policies and configurations, personalized workspace environments, and secure access as well as fixes end-user issues.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>A digital user experience score is calculated using AI\/ML techniques to understand the user experience and see what facets are impacting the user experience.<\/li><li>Ivanti Neurons supports Windows, macOS, iOS, iPadOS, Android, ChromeOS, Linux, and IoT devices.<\/li><li>Ivanti Neurons offers a complete inventory of the environment as the foundation for managing and securing devices.<\/li><li>Real-time operational awareness coupled with Ivanti Neurons for Healing enables IT to discover and heal issues using automation.<\/li><li>Patch management, mobile threat defense, secure access, and tunnel are integrated in the UEM platform.<\/li><li>Ivanti Neurons for UEM platform integrates with other Ivanti products including its enterprise security management (ESM) solutions.<\/li><li>Application control and device control are included.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"manageengine\">ManageEngine<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/01\/ESP.ManageEngine.png\" alt=\"ManageEngine logo.\" class=\"wp-image-24855\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/ESP.ManageEngine.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/01\/ESP.ManageEngine-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>ManageEngine Desktop Central UEM Edition provides endpoint detection and response (EDR), endpoint security, remote access, and zero trust. It is available as SaaS and on-premises and provides tight integration with other products from Zoho.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>ManageEngine can manage Microsoft, Apple, and Google Oss.<\/li><li>Support is available for Ubuntu, Red Hat, CentOS, Fedora, Mandriva, Debian, Mint, SUSE, Pardus, and Oracle Linux distributions.<\/li><li>Support is available for Samsung, Zebra, Honeywell, Lenovo, Datalogic, Unitech, Nokia, Kyocera, Cipherlab, Seuic, and Spectralink OEMConfig devices.<\/li><li>Gartner said this was one of the most affordable UEM offerings, with list prices 20% lower than the next-lowest competitor.<\/li><li>Email, phone, and chat support is available at no additional cost.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"hexnode\">Hexnode UEM<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/hexnode-logo.png\" alt=\"Hexnode logo.\" class=\"wp-image-25470\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/hexnode-logo.png 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/hexnode-logo-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>Hexnode provides a relatively simple user interface for its UEM platform to provide ease of use for organizations that may lack tech-savvy IT admins. It backs this up with responsive tech support and slants its offering at small and midsize businesses (SMBs). As such, its pricing begins at $1.08 per device per month. It also incorporates plenty of security features within its UEM package, regarding unified endpoint security as being UEM with an additional security layer.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Hexnode offers support for Android, iOS and iPadOS, macOS, Android TV, tvOS, Fire OS, and Windows.<\/li><li>The remote view feature helps IT admins monitor and manage devices in real-time.<\/li><li>A remote-control feature assists the IT admin in troubleshooting and resolving errors without requiring user interference.<\/li><li>By leveraging Android and Apple containerization techniques, enterprises can currently separate their corporate data from personal files.<\/li><li>Admins can define the app inventory by dictating mandatory apps and blacklisting applications that can hinder productivity.<\/li><li>ManageEngine has partnerships with rugged device manufacturers like Honeywell, Kyocera, Zebra, CAT, and Sonim.<\/li><li>A kiosk management feature restricts publicly placed devices to a single or a set of predefined apps and limits users from accessing other features.<\/li><li>Security features include password management, restricted access to external media, web content filtering, incorporation of BitLocker encryption and Windows Defender, a firewall, remote locking and wiping, and OS updates.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"matrix42\">Matrix42 Secure UEM<\/h3>\n\n\n\n<figure class=\"wp-block-image alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2022\/10\/matrix42-logo-mx42-esp.jpeg\" alt=\"Matrix42 logo.\" class=\"wp-image-25471\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/matrix42-logo-mx42-esp.jpeg 200w, https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/matrix42-logo-mx42-esp-150x150.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure>\n\n\n\n<p>Matrix42 Secure UEM provides basic endpoint management and security. Recent acquisitions of EgoSecure, FastViewer, and Firescope have led to big strides in areas such as the addition of <a href=\"https:\/\/www.esecurityplanet.com\/products\/top-it-asset-management-tools-for-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">ITAM (IT asset management)<\/a>, ITSM (IT service management), and behavioral dynamic policy enforcement.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Key Differentiators<\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li>Matrix42 Secure UEM offers a low cost and flexibility married with plenty of features.<\/li><li>Distributed cloud deployment provides country- and market-specific customization to fit with local regulations.<\/li><li>Matrix42 Secure UEM can scale from 50 to 10,000 devices.<\/li><li>Additional module options include Browser Security Plus, Vulnerability Manager Plus, Device Control Plus, Application Control Plus, Analytics Plus, and Secure Gateway Server.<\/li><li>Integration with Fortinet tools adds automated detection and remediation of anomalies and malicious activities.<\/li><li>The platform is low-code and leverages a centralized configuration management database (CMDB).<\/li><\/ul>\n\n\n<div id=\"ta-campaign-widget-66d6ca1a747e3-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6ca1a747e3\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6ca1a747e3\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6ca1a747e3\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6ca1a747e3\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6ca1a747e3\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6ca1a747e3\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Unification has been a trend in IT for a long time, whether it&#8217;s communications, storage, data management or other technologies, and the trend hasn&#8217;t escaped cybersecurity either, as products converge into more comprehensive platforms like XDR or SASE. Endpoint technologies are the latest to join the unification craze, as endpoint security and mobile device management [&hellip;]<\/p>\n","protected":false},"author":213,"featured_media":25481,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[17],"tags":[28055,14404,31966,745,31968,31967],"b2b_audience":[34],"b2b_industry":[63],"b2b_product":[378,286],"class_list":["post-25468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products","tag-edr","tag-endpoint-security","tag-enterprise-mobility-management","tag-mobile-device-management","tag-uem","tag-unified-endpoint-management","b2b_audience-evaluation-and-selection","b2b_industry-technology","b2b_product-endpoint-security","b2b_product-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet<\/title>\n<meta name=\"description\" content=\"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet\" \/>\n<meta property=\"og:description\" content=\"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-12T18:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-12T18:00:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1538\" \/>\n\t<meta property=\"og:image:height\" content=\"843\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Drew Robb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Drew Robb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\"},\"author\":{\"name\":\"Drew Robb\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\"},\"headline\":\"Top Unified Endpoint Management (UEM) Solutions\",\"datePublished\":\"2022-10-12T18:00:38+00:00\",\"dateModified\":\"2022-10-12T18:00:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\"},\"wordCount\":2178,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png\",\"keywords\":[\"EDR\",\"endpoint security\",\"enterprise mobility management\",\"mobile device management\",\"uem\",\"unified endpoint management\"],\"articleSection\":[\"Products\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\",\"name\":\"Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png\",\"datePublished\":\"2022-10-12T18:00:38+00:00\",\"dateModified\":\"2022-10-12T18:00:41+00:00\",\"description\":\"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png\",\"width\":1538,\"height\":843,\"caption\":\"Image: Microsoft Endpoint Management\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Unified Endpoint Management (UEM) Solutions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2\",\"name\":\"Drew Robb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg\",\"caption\":\"Drew Robb\"},\"description\":\"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet","description":"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/","og_locale":"en_US","og_type":"article","og_title":"Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet","og_description":"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.","og_url":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/","og_site_name":"eSecurity Planet","article_published_time":"2022-10-12T18:00:38+00:00","article_modified_time":"2022-10-12T18:00:41+00:00","og_image":[{"width":1538,"height":843,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png","type":"image\/png"}],"author":"Drew Robb","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Drew Robb","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/"},"author":{"name":"Drew Robb","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2"},"headline":"Top Unified Endpoint Management (UEM) Solutions","datePublished":"2022-10-12T18:00:38+00:00","dateModified":"2022-10-12T18:00:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/"},"wordCount":2178,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png","keywords":["EDR","endpoint security","enterprise mobility management","mobile device management","uem","unified endpoint management"],"articleSection":["Products"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/","url":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/","name":"Top Unified Endpoint Management (UEM) Solutions | eSecurity Planet","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png","datePublished":"2022-10-12T18:00:38+00:00","dateModified":"2022-10-12T18:00:41+00:00","description":"Unified Endpoint Management (UEM) combines endpoint security with mobile device management. Here are the top UEM vendors.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/10\/microsoft-endpoint-dashboard1.png","width":1538,"height":843,"caption":"Image: Microsoft Endpoint Management"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/products\/unified-endpoint-management-uem-solutions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Top Unified Endpoint Management (UEM) Solutions"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/df930f1317eb05f959f8016777c920c2","name":"Drew Robb","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/0.jpg.256x256_q100_crop-smart-150x150.jpg","caption":"Drew Robb"},"description":"Drew Robb has contributed to eSecurity Planet and other TechnologyAdvice websites for more than twenty years. He's covered every aspect of enterprise IT in his career, from the latest trends to in-depth product analysis. He is also the editor-in-chief of an international engineering magazine.","url":"https:\/\/www.esecurityplanet.com\/author\/drew-robb-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25468"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/213"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=25468"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/25468\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/25481"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=25468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=25468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=25468"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=25468"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=25468"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=25468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}