IBM MaaS360 Features
What are the features of IBM MaaS360?
Operating System
- Multi-Systems Support
- Apple Support
- Android Support
Management
- Applicatons Management
- Applications Consolidation
- Whitelist
- Blacklist
- Usage Information
- Applicatons Management
- Whitelist
Security
- Remote Wipe
- Security
- Device Management
Platform - Mobile Device Management (MDM)
- Regulation Compliant
Platform
- Device Enrollment
IBM Security MaaS360 Categories on G2
Filter for Features
Operating System
Multi-Systems Support | Based on 62 IBM MaaS360 reviews. Supports differing operating systems and mobile devices | 87% (Based on 62 reviews) | |
Apple Support | Based on 60 IBM MaaS360 reviews. Supports Apple devices | 84% (Based on 60 reviews) | |
Android Support | Support Android devices This feature was mentioned in 62 IBM MaaS360 reviews. | 85% (Based on 62 reviews) | |
Multiple Mobile Operating System Support | As reported in 31 IBM MaaS360 reviews. Supports differing operating systems and mobile devices | 87% (Based on 31 reviews) | |
Apple Support | Based on 29 IBM MaaS360 reviews. Supports Apple devices | 89% (Based on 29 reviews) | |
Android Support | As reported in 31 IBM MaaS360 reviews. Support Android devices | 93% (Based on 31 reviews) |
Management
Applicatons Management | Centrally manages, configures, and oversees applications on employees' mobile devices 67 reviewers of IBM MaaS360 have provided feedback on this feature. | 85% (Based on 67 reviews) | |
Applications Consolidation | Separates work apps and data from personal apps and data 60 reviewers of IBM MaaS360 have provided feedback on this feature. | 87% (Based on 60 reviews) | |
Whitelist | Implements whitelist policy to easily and securely deploy recommended or required applications This feature was mentioned in 60 IBM MaaS360 reviews. | 86% (Based on 60 reviews) | |
Blacklist | Based on 55 IBM MaaS360 reviews. Implements blacklist policy to block unwanted or suspicious applications | 88% (Based on 55 reviews) | |
Usage Information | Offers visibility into employee mobile device activity 62 reviewers of IBM MaaS360 have provided feedback on this feature. | 80% (Based on 62 reviews) | |
Applicatons Management | Centrally manages, configures, and oversees applications on employees' mobile devices This feature was mentioned in 35 IBM MaaS360 reviews. | 90% (Based on 35 reviews) | |
Applications Consolidation | Separates work apps and data from personal apps and data This feature was mentioned in 33 IBM MaaS360 reviews. | 91% (Based on 33 reviews) | |
Whitelist | Based on 34 IBM MaaS360 reviews. Implements whitelist policy to easily and securely deploy recommended or required applications | 92% (Based on 34 reviews) | |
Blacklist | Based on 32 IBM MaaS360 reviews. Implements blacklist policy to block unwanted or suspicious applications | 92% (Based on 32 reviews) | |
Usage Information | Based on 33 IBM MaaS360 reviews. Offers visibility into employee mobile device activity | 84% (Based on 33 reviews) | |
Device Enrollment | Registers employee-owned or company-distributed devices for IT access. This feature was mentioned in 20 IBM MaaS360 reviews. | 89% (Based on 20 reviews) | |
Device Configuration | As reported in 20 IBM MaaS360 reviews. Configures devices to seamlessly work with business-required applications, WiFi, VPN, etc. | 88% (Based on 20 reviews) | |
Device Compliance | Based on 20 IBM MaaS360 reviews. Ensures that employee devices are compliant with business regulations and requirements. | 85% (Based on 20 reviews) | |
Usage Information | Offers visibility into employee device activity. 19 reviewers of IBM MaaS360 have provided feedback on this feature. | 81% (Based on 19 reviews) | |
Data Separation | Separates personal data on devices from business-specific data. 19 reviewers of IBM MaaS360 have provided feedback on this feature. | 82% (Based on 19 reviews) |
Security
Remote Wipe | Enable the remote locking down and encryption of employee mobile devices 66 reviewers of IBM MaaS360 have provided feedback on this feature. | 89% (Based on 66 reviews) | |
Security | Protects employee, company, and data from potential vulnerabilities or malware This feature was mentioned in 65 IBM MaaS360 reviews. | 91% (Based on 65 reviews) | |
Device Management | As reported in 35 IBM MaaS360 reviews. Unifies endpoint management of employee devices | 93% (Based on 35 reviews) | |
Custom Alerts | Creates custom reports and alerts about existing or upcoming software licenses and security updates This feature was mentioned in 29 IBM MaaS360 reviews. | 91% (Based on 29 reviews) | |
Security | Protects employee, company, and data from potential vulnerabilities or malware 34 reviewers of IBM MaaS360 have provided feedback on this feature. | 91% (Based on 34 reviews) | |
Reporting and Alerts | Based on 17 IBM MaaS360 reviews. Creates custom reports and alerts about security updates, existing or upcoming software licenses, data access, and more. | 92% (Based on 17 reviews) | |
Endpoint Protection | As reported in 19 IBM MaaS360 reviews. Protects employee, company, and data from potential vulnerabilities or malware. | 81% (Based on 19 reviews) | |
Remote Wiping | Based on 18 IBM MaaS360 reviews. Remotely clears all data from compromised devices. | 95% (Based on 18 reviews) |
Platform - Mobile Device Management (MDM)
Regulation Compliant | Ensures that employees mobile devices are compliant with business regulations and requirements This feature was mentioned in 63 IBM MaaS360 reviews. | 87% (Based on 63 reviews) |
Platform
Regulation Compliant | Based on 32 IBM MaaS360 reviews. Ensures that employees mobile devices are compliant with business regulations and requirements | 90% (Based on 32 reviews) | |
Device Enrollment | As reported in 34 IBM MaaS360 reviews. Registers employee-owned or company-distributed mobile devices for IT access | 89% (Based on 34 reviews) | |
Device Configuration | Configures mobile devices to seamlessly work with business-required applications, WiFi, VPN, etc. 34 reviewers of IBM MaaS360 have provided feedback on this feature. | 89% (Based on 34 reviews) |
Scope
Endpoint Inclusiveness | Manages numerous endpoint types, including mobile, desktop, IoT, and wearable. 17 reviewers of IBM MaaS360 have provided feedback on this feature. | 87% (Based on 17 reviews) | |
Multi-OS Support | As reported in 18 IBM MaaS360 reviews. Supports diverse operating systems across several endpoint types. | 86% (Based on 18 reviews) |
Administration
Compliance | Monitors assets and enforces security policies to audit assets and infrastructure security. | Not enough data | |
Web Control | Filters websites and manages whitelisting to enforce compliance protocols for users accessing the internet within the network. | Not enough data | |
Application Control | Blocks endpoint users from accessing restricted applications. | Not enough data | |
Asset Management | Keeps records of each network asset and its activity. Discovers new assets accessing the network. | Not enough data | |
Device Control | Manages user network accessibility on laptops and mobile devices. | Not enough data |
Functionality
System Isolation | Cuts off network connection or temporarily inactivate applications until incidents are remedied. | Not enough data | |
Firewall | Protects endpoint devices from a variety of attacks and malware threats. | Not enough data | |
Endpoint Intelligence | Analysis for users to examine threat intelligence data specific to their endpoint devices. | Not enough data | |
Malware Detection | Provides multiple techniques and information sources to alert users of malware occurrences. | Not enough data |
Analysis
Automated Remediation | Reduces time spent remedying issues manually. Resolves common network security incidents quickly. | Not enough data | |
Incident Reports | Produces reports detailing trends and vulnerabilities related to their network and infrastructure. | Not enough data | |
Behavioral Analysis | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators. | Not enough data |
Monitoring
Investigate | Investigate identity threats with contextual user information. | Not enough data | |
Monitoring | Monitor & detect malicous identity and privileges activity | Not enough data | |
Misconfigurations | Identify identity-related misconfigurations. | Not enough data | |
Integrate | Offers integrations to identity store providers. | Not enough data | |
Visability | Provide full coverage of identity estate with granular detail. | Not enough data |
Remediation
Remediation | Remove unauthorized accounts and excessive privileges | Not enough data | |
Audit | Provides full audit trail with notifications, ticketing, and compliance information. | Not enough data |
Generative AI
AI Text Summarization | As reported in 21 IBM MaaS360 reviews. Condenses long documents or text into a brief summary. | 87% (Based on 21 reviews) |
Agentic AI - Mobile Device Management (MDM)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Natural Language Interaction | Engages in human-like conversation for task delegation | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Agentic AI - Enterprise Mobility Management
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Natural Language Interaction | Engages in human-like conversation for task delegation | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Agentic AI - Unified Endpoint Management (UEM)
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Natural Language Interaction | Engages in human-like conversation for task delegation | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |
Agentic AI - Mobile Application Management
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Adaptive Learning | Improves performance based on feedback and experience | Not enough data | |
Natural Language Interaction | Engages in human-like conversation for task delegation | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data | |
Decision Making | Makes informed choices based on available data and objectives | Not enough data |