IBM MaaS360 Features
Operating System (6)
Multi-Systems Support
Supports differing operating systems and mobile devices 64 reviewers of IBM MaaS360 have provided feedback on this feature.
Apple Support
As reported in 62 IBM MaaS360 reviews. Supports Apple devices
Android Support
As reported in 64 IBM MaaS360 reviews. Support Android devices
Multiple Mobile Operating System Support
As reported in 31 IBM MaaS360 reviews. Supports differing operating systems and mobile devices
Apple Support
Supports Apple devices This feature was mentioned in 29 IBM MaaS360 reviews.
Android Support
Support Android devices This feature was mentioned in 31 IBM MaaS360 reviews.
Management (15)
Applicatons Management
As reported in 69 IBM MaaS360 reviews. Centrally manages, configures, and oversees applications on employees' mobile devices
Applications Consolidation
As reported in 61 IBM MaaS360 reviews. Separates work apps and data from personal apps and data
Whitelist
As reported in 61 IBM MaaS360 reviews. Implements whitelist policy to easily and securely deploy recommended or required applications
Blacklist
As reported in 56 IBM MaaS360 reviews. Implements blacklist policy to block unwanted or suspicious applications
Usage Information
As reported in 63 IBM MaaS360 reviews. Offers visibility into employee mobile device activity
Applicatons Management
Based on 35 IBM MaaS360 reviews. Centrally manages, configures, and oversees applications on employees' mobile devices
Applications Consolidation
As reported in 33 IBM MaaS360 reviews. Separates work apps and data from personal apps and data
Whitelist
Implements whitelist policy to easily and securely deploy recommended or required applications 34 reviewers of IBM MaaS360 have provided feedback on this feature.
Blacklist
As reported in 32 IBM MaaS360 reviews. Implements blacklist policy to block unwanted or suspicious applications
Usage Information
As reported in 33 IBM MaaS360 reviews. Offers visibility into employee mobile device activity
Device Enrollment
As reported in 37 IBM MaaS360 reviews. Registers employee-owned or company-distributed devices for IT access.
Device Configuration
Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. 35 reviewers of IBM MaaS360 have provided feedback on this feature.
Device Compliance
Ensures that employee devices are compliant with business regulations and requirements. This feature was mentioned in 36 IBM MaaS360 reviews.
Usage Information
As reported in 33 IBM MaaS360 reviews. Offers visibility into employee device activity.
Data Separation
Separates personal data on devices from business-specific data. 33 reviewers of IBM MaaS360 have provided feedback on this feature.
Security (8)
Remote Wipe
Based on 67 IBM MaaS360 reviews. Enable the remote locking down and encryption of employee mobile devices
Security
Protects employee, company, and data from potential vulnerabilities or malware This feature was mentioned in 66 IBM MaaS360 reviews.
Device Management
As reported in 35 IBM MaaS360 reviews. Unifies endpoint management of employee devices
Custom Alerts
Creates custom reports and alerts about existing or upcoming software licenses and security updates 29 reviewers of IBM MaaS360 have provided feedback on this feature.
Security
As reported in 34 IBM MaaS360 reviews. Protects employee, company, and data from potential vulnerabilities or malware
Reporting and Alerts
As reported in 33 IBM MaaS360 reviews. Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more.
Endpoint Protection
As reported in 35 IBM MaaS360 reviews. Protects employee, company, and data from potential vulnerabilities or malware.
Remote Wiping
As reported in 34 IBM MaaS360 reviews. Remotely clears all data from compromised devices.
Platform - Mobile Device Management (MDM) (1)
Regulation Compliant
Ensures that employees mobile devices are compliant with business regulations and requirements This feature was mentioned in 65 IBM MaaS360 reviews.
Platform (3)
Regulation Compliant
Ensures that employees mobile devices are compliant with business regulations and requirements 32 reviewers of IBM MaaS360 have provided feedback on this feature.
Device Enrollment
Registers employee-owned or company-distributed mobile devices for IT access 34 reviewers of IBM MaaS360 have provided feedback on this feature.
Device Configuration
Based on 34 IBM MaaS360 reviews. Configures mobile devices to seamlessly work with business-required applications, WiFi, VPN, etc.
Scope (2)
Endpoint Inclusiveness
Based on 33 IBM MaaS360 reviews. Manages numerous endpoint types, including mobile, desktop, IoT, and wearable.
Multi-OS Support
Supports diverse operating systems across several endpoint types. 34 reviewers of IBM MaaS360 have provided feedback on this feature.
Administration (5)
Compliance
Monitors assets and enforces security policies to audit assets and infrastructure security.
Web Control
Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network.
Application Control
Blocks endpoint users from accessing restricted applications.
Asset Management
Keeps records of each network asset and its activity. Discovers new assets accessing the network.
Device Control
Manages user network accessibility on laptops and mobile devices.
Functionality (4)
System Isolation
Cuts off network connection or temporarily inactivate applications until incidents are remedied.
Firewall
Protects endpoint devices from a variety of attacks and malware threats.
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices.
Malware Detection
Provides multiple techniques and information sources to alert users of malware occurrences.
Analysis (3)
Automated Remediation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Behavioral Analysis
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Monitoring (5)
Investigate
Investigate identity threats with contextual user information. This feature was mentioned in 10 IBM MaaS360 reviews.
Monitoring
As reported in 10 IBM MaaS360 reviews. Monitor & detect malicous identity and privileges activity
Misconfigurations
Identify identity-related misconfigurations. This feature was mentioned in 10 IBM MaaS360 reviews.
Integrate
Based on 10 IBM MaaS360 reviews. Offers integrations to identity store providers.
Visability
Based on 10 IBM MaaS360 reviews. Provide full coverage of identity estate with granular detail.
Remediation (2)
Remediation
Based on 10 IBM MaaS360 reviews. Remove unauthorized accounts and excessive privileges
Audit
Provides full audit trail with notifications, ticketing, and compliance information. 10 reviewers of IBM MaaS360 have provided feedback on this feature.
Generative AI (1)
AI Text Summarization
Based on 23 IBM MaaS360 reviews. Condenses long documents or text into a brief summary.
Agentic AI - Mobile Device Management (MDM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Enterprise Mobility Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Unified Endpoint Management (UEM) (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input 14 reviewers of IBM MaaS360 have provided feedback on this feature.
Multi-step Planning
Ability to break down and plan multi-step processes This feature was mentioned in 13 IBM MaaS360 reviews.
Cross-system Integration
Works across multiple software systems or databases This feature was mentioned in 14 IBM MaaS360 reviews.
Adaptive Learning
Improves performance based on feedback and experience 14 reviewers of IBM MaaS360 have provided feedback on this feature.
Natural Language Interaction
Engages in human-like conversation for task delegation This feature was mentioned in 14 IBM MaaS360 reviews.
Proactive Assistance
Anticipates needs and offers suggestions without prompting This feature was mentioned in 15 IBM MaaS360 reviews.
Decision Making
Based on 15 IBM MaaS360 reviews. Makes informed choices based on available data and objectives
Agentic AI - Mobile Application Management (7)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Cross-system Integration
Works across multiple software systems or databases
Adaptive Learning
Improves performance based on feedback and experience
Natural Language Interaction
Engages in human-like conversation for task delegation
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Generative AI - Autonomous Endpoint Management (3)
Behavioral Analysis
Creates detailed models of normal user and device behavior across endpoints.
Adaptive
Generates new security policies or modifies existing ones to adapt to evolving threats.
Predictive
Analyze patterns and predicts potential endpoint failures or security breaches before they occur to proactively perform maintenance tasks or apply security patches, reducing downtime and preventing incidents.
Monitoring and Management - Autonomous Endpoint Management (4)
Patch Management
Automatically deploys software updates and security patches to ensure all endpoint devices remain up-to-date with the latest protection against vulnerabilities.
Oversees
Automatically discovers and maintains an updated inventory of all endpoints within the network, ensuring accurate asset management.
Self-Healing
Equips endpoints with the ability to self-diagnose and repair certain issues without manual intervention.
Centralized Dashboard
Provides centralized monitoring of endpoint status and health, enabling remote troubleshooting and management for IT teams.
Services - Endpoint Detection & Response (EDR) (1)
Managed Services
Offers managed detection and response services.






