KuppingerCole Report
Whitepaper
By Matthias Reinwarth

Unified management and control of the digital workspace

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.

Commissioned by VMware

1 Introduction

Agility and efficiency are key aspects for organisations in the digital transformation. Enabling the right people to access the right resources is a k ...

Login Free 30-day Select Access Get full Access

2 Highlights

  • Mobile and traditional user devices converge into a unified endpoint management infrastructure.
  • Application management across various OS ecosystem ...
Login Free 30-day Select Access Get full Access

3 Building blocks within the organisation

A lot of effort has already been spent on maintaining the information that is essential for delivering applications to end users within an organisatio ...

Login Free 30-day Select Access Get full Access

3.1 Strong identities for all types of users

Identity Management is typically not expected to take centre stage when it comes to implementing enterprise infrastructures. Many enterprise processes ...

The definition, implementation and execution of stable life-cycle management processes, facilitate the existence of strong online identities. These ca ...

Login Free 30-day Select Access Get full Access

3.2 Providing application infrastructure

Providing unified access to all required infrastructure and application frameworks available is another important area requiring an efficient applicat ...

It is a major technological challenge to provide different types of applications, which require alternative approaches regarding user interface design ...

Login Free 30-day Select Access Get full Access

3.3 Managing endpoints and devices

The landscape for end-user devices has dramatically changed in the last five to ten years. The days are over for the company managed desktop PC as the ...

Login Free 30-day Select Access Get full Access

3.4 Assigning and controlling access

The opportunity of designing and enforcing adequate policies for application access is one key benefit of an integrated, Unified Endpoint Management s ...

Login Free 30-day Select Access Get full Access

4 Assembling a unified application workspace approach

Modern approaches for the design of digital workspace environments combine the following into a single holistic infrastructure; identity management, a ...

Login Free 30-day Select Access Get full Access

4.1 The unified application workspace approach

Modern approaches combine current technologies with a strong cloud based infrastructure, to create a unified administration of applications, identitie ...

Login Free 30-day Select Access Get full Access

4.2 Application delivery beyond client server

There is a strong convergence between desktop and mobile computing, while at the same time a move away from traditional client-server paradigm to clou ...

Login Free 30-day Select Access Get full Access

4.3 Transforming business requirements and security demands into policies

There are no longer any traditional perimeters for business using cloud services, as mobile devices allow users to directly connect customers and part ...

The enrolment process for an individual device should make sure that all required components (from web browser via native apps to virtualisation clien ...

Login Free 30-day Select Access Get full Access

5 Workspace ONE: The VMware approach to identities, applications and endpoints

VMware has constantly and strategically transformed its overall approach to this complex topic from individually managed solutions to a unified, holis ...

Login Free 30-day Select Access Get full Access

5.1 Identity Management as the administrative glue

Originally Identity Management has been considered as a service on its own and a separate, but accessible infrastructure building block. VMware has ex ...

Login Free 30-day Select Access Get full Access

5.2 Any application on any device

By implementing abstraction layers between the application layer and the device, the cloud delivery and the application representation, VMware can del ...

Login Free 30-day Select Access Get full Access

5.3 Application delivery

The delivery of virtualized applications is implemented by using cloud-based and virtualized infrastructures, including:

  • Public clouds for differe ...
Login Free 30-day Select Access Get full Access

5.4 Policy-based authorization and authentication

Based on the valid authentication of a user, as associated with an end user device, VMware Workspace ONE can define and impose rules based on various ...

Login Free 30-day Select Access Get full Access

6 Migrating to a standardized yet tailored endpoint application delivery

The approach as described in this document, comes with the promise of improving end-user simplicity and enterprise security. It also implies the poten ...

Login Free 30-day Select Access Get full Access

Copyright

©2020 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarksTM or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole Analysts, founded in 2004, is a global analyst company headquartered in Europe focusing on Information Security and Identity and Access Management (IAM). KuppingerCole stands for expertise, thought leadership, outstanding practical relevance, and a vendor-neutral view on the information security market segments, covering all relevant aspects like: Identity and Access Management (IAM), Governance & Auditing Tools, Cloud and Virtualization Security, Information Protection, Mobile as well as Software Security, System and Network Security, Security Monitoring, Analytics & Reporting, Governance, and Organization & Policies.

For further information, please contact clients@kuppingercole.com.

top