KuppingerCole Report
By Matthias Reinwarth

Unified management and control of the digital workspace

Identity Management, Endpoint Security, Mobile Device Management and Access Management are typically considered to be isolated disciplines. This can make administration and governance in these areas complex. Having a holistic approach for the administration and supervision of all types of users, end user software and devices can foster efficiency, agility and security in many organizations.

Commissioned by VMware

1 Introduction

Agility and efficiency are key aspects for organisations in the digital transformation. Enabling the right people to access the right resources is a k ...

Login Get full Access

2 Highlights

  • Mobile and traditional user devices converge into a unified endpoint management infrastructure.
  • Application management across various OS ecosystem ...
Login Get full Access

3 Building blocks within the organisation

A lot of effort has already been spent on maintaining the information that is essential for delivering applications to end users within an organisatio ...

Login Get full Access

3.1 Strong identities for all types of users

Identity Management is typically not expected to take centre stage when it comes to implementing enterprise infrastructures. Many enterprise processes ...

The definition, implementation and execution of stable life-cycle management processes, facilitate the existence of strong online identities. These ca ...

Login Get full Access

3.2 Providing application infrastructure

Providing unified access to all required infrastructure and application frameworks available is another important area requiring an efficient applicat ...

It is a major technological challenge to provide different types of applications, which require alternative approaches regarding user interface design ...

Login Get full Access

3.3 Managing endpoints and devices

The landscape for end-user devices has dramatically changed in the last five to ten years. The days are over for the company managed desktop PC as the ...

Login Get full Access

3.4 Assigning and controlling access

The opportunity of designing and enforcing adequate policies for application access is one key benefit of an integrated, Unified Endpoint Management s ...

Login Get full Access

4 Assembling a unified application workspace approach

Modern approaches for the design of digital workspace environments combine the following into a single holistic infrastructure; identity management, a ...

Login Get full Access

4.1 The unified application workspace approach

Modern approaches combine current technologies with a strong cloud based infrastructure, to create a unified administration of applications, identitie ...

Login Get full Access

4.2 Application delivery beyond client server

There is a strong convergence between desktop and mobile computing, while at the same time a move away from traditional client-server paradigm to clou ...

Login Get full Access

4.3 Transforming business requirements and security demands into policies

There are no longer any traditional perimeters for business using cloud services, as mobile devices allow users to directly connect customers and part ...

The enrolment process for an individual device should make sure that all required components (from web browser via native apps to virtualisation clien ...

Login Get full Access

5 Workspace ONE: The VMware approach to identities, applications and endpoints

VMware has constantly and strategically transformed its overall approach to this complex topic from individually managed solutions to a unified, holis ...

Login Get full Access

5.1 Identity Management as the administrative glue

Originally Identity Management has been considered as a service on its own and a separate, but accessible infrastructure building block. VMware has ex ...

Login Get full Access

5.2 Any application on any device

By implementing abstraction layers between the application layer and the device, the cloud delivery and the application representation, VMware can del ...

Login Get full Access

5.3 Application delivery

The delivery of virtualized applications is implemented by using cloud-based and virtualized infrastructures, including:

  • Public clouds for differe ...
Login Get full Access

5.4 Policy-based authorization and authentication

Based on the valid authentication of a user, as associated with an end user device, VMware Workspace ONE can define and impose rules based on various ...

Login Get full Access

6 Migrating to a standardized yet tailored endpoint application delivery

The approach as described in this document, comes with the promise of improving end-user simplicity and enterprise security. It also implies the poten ...

Login Get full Access


©2021 KuppingerCole Analysts AG all rights reserved. Reproduction and distribution of this publication in any form is forbidden unless prior written permission. All conclusions, recommendations and predictions in this document represent KuppingerCole´s initial view. Through gathering more information and performing deep analysis, positions presented in this document will be subject to refinements or even major changes. KuppingerCole disclaim all warranties as to the completeness, accuracy and/or adequacy of this information. Even if KuppingerCole research documents may discuss legal issues related to information security and technology, KuppingerCole do not provide any legal services or advice and its publications shall not be used as such. KuppingerCole shall have no liability for errors or inadequacies in the information contained in this document. Any opinion expressed may be subject to change without notice. All product and company names are trademarks™ or registered® trademarks of their respective holders. Use of them does not imply any affiliation with or endorsement by them.

KuppingerCole Analysts support IT professionals with outstanding expertise in defining IT strategies and in relevant decision-making processes. As a leading analyst ompany, KuppingerCole provides first-hand vendor-neutral information. Our services allow you to feel comfortable and secure in taking decisions essential to your business.

KuppingerCole, founded in 2004, is a global, independent analyst organization headquartered in Europe. We specialize in providing vendor-neutral advice, expertise, thought leadership, and practical relevance in Cybersecurity, Digital Identity & IAM (Identity and Access Management), Cloud Risk and Security, and Artificial Intelligence, as well as for all technologies fostering Digital Transformation. We support companies, corporate users, integrators and software manufacturers in meeting both tactical and strategic challenges and make better decisions for the success of their business. Maintaining a balance between immediate implementation and long-term viability is at the heart of our philosophy.

For further information, please contact clients@kuppingercole.com.