IBM MaaS360 Features
Operating System (6)
Multi-Systems Support
Supports differing operating systems and mobile devices
Apple Support
Supports Apple devices
Android Support
Support Android devices
Multiple Mobile Operating System Support
Supports differing operating systems and mobile devices
Apple Support
Supports Apple devices
Android Support
Support Android devices
Management (15)
Applicatons Management
Centrally manages, configures, and oversees applications on employees' mobile devices
Applications Consolidation
Separates work apps and data from personal apps and data
Whitelist
Implements whitelist policy to easily and securely deploy recommended or required applications
Blacklist
Implements blacklist policy to block unwanted or suspicious applications
Usage Information
Offers visibility into employee mobile device activity
Applicatons Management
Centrally manages, configures, and oversees applications on employees' mobile devices
Applications Consolidation
Separates work apps and data from personal apps and data
Whitelist
Implements whitelist policy to easily and securely deploy recommended or required applications
Blacklist
Implements blacklist policy to block unwanted or suspicious applications
Usage Information
Offers visibility into employee mobile device activity
Device Enrollment
Registers employee-owned or company-distributed devices for IT access.
Device Configuration
Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc.
Device Compliance
Ensures that employee devices are compliant with business regulations and requirements.
Usage Information
Offers visibility into employee device activity.
Data Separation
Separates personal data on devices from business-specific data.
Security (8)
Remote Wipe
Enable the remote locking down and encryption of employee mobile devices
Security
Protects employee, company, and data from potential vulnerabilities or malware
Device Management
Unifies endpoint management of employee devices
Custom Alerts
Creates custom reports and alerts about existing or upcoming software licenses and security updates
Security
Protects employee, company, and data from potential vulnerabilities or malware
Reporting and Alerts
Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more.
Endpoint Protection
Protects employee, company, and data from potential vulnerabilities or malware.
Remote Wiping
Remotely clears all data from compromised devices.
Platform - Mobile Device Management (MDM) (1)
Regulation Compliant
Ensures that employees mobile devices are compliant with business regulations and requirements
Platform (3)
Regulation Compliant
Ensures that employees mobile devices are compliant with business regulations and requirements
Device Enrollment
Registers employee-owned or company-distributed mobile devices for IT access
Device Configuration
Configures mobile devices to seamlessly work with business-required applications, WiFi, VPN, etc.
Scope (2)
Endpoint Inclusiveness
Manages numerous endpoint types, including mobile, desktop, IoT, and wearable.
Multi-OS Support
Supports diverse operating systems across several endpoint types.
Administration (5)
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Functionality (4)
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Analysis (3)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Monitoring (5)
Investigate
Investigate identity threats with contextual user information.
Monitoring
Monitor & detect malicous identity and privileges activity
Misconfigurations
Identify identity-related misconfigurations.
Integrate
Offers integrations to identity store providers.
Visability
Provide full coverage of identity estate with granular detail.
Remediation (2)
Remediation
Remove unauthorized accounts and excessive privileges
Audit
Provides full audit trail with notifications, ticketing, and compliance information.
Generative AI (1)
AI Text Summarization
Condenses long documents or text into a brief summary.
Agentic AI - Mobile Device Management (MDM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Enterprise Mobility Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Unified Endpoint Management (UEM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Mobile Application Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Generative AI - Autonomous Endpoint Management (3)
Behavioral Analysis
Creates detailed models of normal user and device behavior across endpoints.
Adaptive
Generates new security policies or modifies existing ones to adapt to evolving threats.
Predictive
Analyze patterns and predicts potential endpoint failures or security breaches before they occur to proactively perform maintenance tasks or apply security patches, reducing downtime and preventing incidents.
Monitoring and Management - Autonomous Endpoint Management (4)
Patch Management
Automatically deploys software updates and security patches to ensure all endpoint devices remain up-to-date with the latest protection against vulnerabilities.
Oversees
Automatically discovers and maintains an updated inventory of all endpoints within the network, ensuring accurate asset management.
Self-Healing
Equips endpoints with the ability to self-diagnose and repair certain issues without manual intervention.
Centralized Dashboard
Provides centralized monitoring of endpoint status and health, enabling remote troubleshooting and management for IT teams.
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.






