Content collaboration tools provide an easy way for employees to use and share content both inside and outside the organizations. Since these tools can be used to collaborate with customers, partners and suppliers, they often provide rich security and privacy controls. Today, much of this functionality also can be found in other tools such as cloud office platforms, workstream collaboration platforms, content services platforms and content services applications. Functional differentiators in dedicated CCTs are difficult to identify.
An embedded operating system (OS) is a type of OS that is used in embedded computing devices. The term 'embedded' refers to devices that are installed (that is, embedded) as built-in components of a wider system, in which they serve a special, functional purpose. Embedded OSs differ from other types of OSs by their optimized design. Form factors, price points and other parameters of embedded devices set constraints on the OS, for example, in terms of functionality, user interface, memory space and driver support. Consequently, the architectures of embedded OSs tend to be extensively optimized for single-purpose deployment, stripped out of anything that is considered unnecessary for their use. This does not mean that embedded OSs cannot be applied outside of embedded devices. For instance, it is common to see embedded real-time operating systems (RTOSs) being used to handle the baseband functionality in smartphones.
EMNSs automate the distribution and management of messages to relevant stakeholders for localized events and regional and catastrophic disasters across multiple channels. Use cases include organizational crises, business-critical operations, IT outages, and public and personal safety.
The Endpoint Detection and Response Solutions (EDR) market is defined as solutions that record and store endpoint-system-level behaviors, use various data analytics techniques to detect suspicious system behavior, provide contextual information, block malicious activity, and provide remediation suggestions to restore affected systems. EDR solutions must provide the following four primary capabilities: • Detect security incidents • Contain the incident at the endpoint • Investigate security incidents • Provide remediation guidance
Gartner defines an endpoint protection platform (EPP) as security software designed to protect managed end-user endpoints — including desktop PCs, laptop PCs, and mobile devices — against known and unknown malicious attacks. Additionally, EPPs provide capabilities for security teams to investigate and remediate incidents that evade prevention controls. EPP products are delivered as software agents deployed to endpoints and connected to centralized security analytics and management interfaces.
Information-centric security products focus on content, more than device, and apply encryption and authentication to block file access and movement from unauthorized people or circumstances. Endpoint systems are porous, mistakenly sharing data is easy, and users can be careless. Information-centric security is the last line of defense for data when firewalls, anti-malware tools, best practices and other traditional defenses fail. The scope of this market is the protection of stored information, commonly referred to as data at rest. The protection of data at rest in some ways takes precedence, because the interconnectedness of today’s systems often undermines network protections. In other words, high-value information should be protected “at rest” to prevent the risk of a breach caused by an unexpected data in motion event.
The market for instant communications security and compliance consists of solutions that protect instant communications sent over networks, while also ensuring regulatory compliance.
Managed detection and response (MDR) services provide customers with remotely delivered security operations center (SOC) functions. These functions allow organizations to rapidly detect, analyze, investigate and actively respond through threat disruption and containment. They offer a turnkey experience, using a predefined technology stack that commonly covers endpoint, network, logs and cloud. Telemetry is analyzed within the provider’s platform using a range of techniques. This process allows for investigation by experts skilled in threat hunting and incident management, who deliver outcomes that businesses can act upon.
Gartner defines a mobile application management (MAM) tool as an on-premises or SaaS tool specifically designed for the license management, distribution, securing and life cycle management of apps for mobile device platforms. Thus, MAM tools provide integration with public app store payment and licensing mechanisms (such as Apple's Volume Purchase Program [VPP]), an enterprise app store, and the ability to set policies related to security, usage and ongoing management for apps or groups of apps. At minimum, a MAM product supports native and HTML 5 apps. Many also support a variety of popular hybrid app architectures, which may be highly desirable based on a particular client's needs.
Mobile threat defense (MTD) products protect organizations from threats on iOS and Android devices. MTD products protect at the device, network and application levels and focus on countering malicious actions.
Gartner defines a unified endpoint management (UEM) tool as a software-based tool that provides agent and agentless management of computers and mobile devices through a single console. Modern UEM tools: Provide a user-centric view of devices across device platforms; Offer agent and/or agentless management through native Windows endpoint, macOS, Linux and Chrome OS controls. Offer agentless mobile management through native Apple iOS/iPad OS and Google Android controls; Aggregate telemetry and signals from identities, apps, connectivity and devices to inform policy and related actions; Aggregate and analyze technology performance and employee experience data; Integrate with identity, security and remote access tools to support zero-trust access and contextual authentication, vulnerability, policy, and configuration and data management; Manage nontraditional devices, including Internet of Things (IoT) devices, wearables and rugged handhelds.