The Avast Business Hub is a remote management and security platform for MSPs, a multi-tenant, cloud-based platform that allows MSPs and IT Service Providers to deliver layered security services to customers, protecting all aspects of their networks.
N/A
IBM MaaS360
Score 8.3 out of 10
N/A
IBM MaaS360 is a mobile security offering developed by Fiberlink, acquired and owned by IBM since early 2014.
It is mostly good in any area, since it allows you to have all your computers under supervision, displaying their status, the operating system they have, the status of their antivirus, when it was last reviewed, among more very complete functions for work teams in which there are several existing equipment in use
Enrolling bulk devices through the Device Enrollment Program (DEP) is simple, straightforward, and quick. Multiple methods for device enrollment are available, including barcode scanning, email, and manual entry via the platform. App synchronization between Apple Business Manager (ABM) and the MaaS360 platform occurs swiftly. Additionally, app distribution and removal are efficiently managed on the platform.
Show all the services that can be paid for and list them right there within the software to decide to add them and pay for them, instead of appearing from time to time or when an action is performed and saying that for better optimization pay for a service extra
MaaS360 with Watson has a lot of features and capabilities, which can sometimes make it difficult for us to navigate. Improving the user interface and making it friendly could help make the platform easier to use.
Expanding integrations with other systems to provide better support for a wider range of systems and platforms.
I'll gave it a 10, because we have not come across any negative point with MaaS360. In a real comparison with other UEMs / MDMs you will find out that other providers that claim to be "free" or "included" don't have the capeabilities that MaaS360 has. Some features are just not available and others would require you to pay for them. In that case the product would not be "free" anymore.
Having years of experience with MDM and experiencing the evolution of the granularity of the functionality MDM's have had to evolve, no MDM is ever "easy" to use. MaaS360 rises to the top however, because zero day changes are always ahead of the competition. A huge benefit with MaaS360 and IBM's approach to supporting these changes is that they seldom change configuration work flows. Competing Vendors always arbitrarily change workflows which requires a significnat ongoing learning curve in order to maintain technical competence
MaaS360's phone support has been decent the few times I have used it. In addition the person who on-boarded us has been available for additional questions after the process was over. However IBM could do a much better job in creating a user-friendly search engine and white-paper database to help people find topics. Right now finding info is more based on searching through white papers themselves.
To implement IBM Security MaaS360 with Watson, follow these steps: Set up the platform, enroll devices, configure policies and settings, monitor and manage devices. Implementing it can help organizations to securely manage and monitor the use of mobile devices and related resources in their networks, improving security and productivity for their users.
This to be able to keep everything safe and secure, so that the information is well, and thus it is easier to counteract against viruses that could be presented at the software level
Ease of use and management of mobile devices are easier and has protection against the Cyber threats. The security controls implementation on our devices are perfect and in one place. I love the responsiveness and prosctivenes of the support. Seamless integration with all security devices. The ability to wipe and control days remotely is perfect easy to control all our company information by locking down lost and stolen devices.
We worked with an IBM SE who was incredibly competent and extremely professional in handling our questions in addition to ensuring the Knowledge Transfer was completed properly
Help reduce the vulnerabilities of computers and keep them safe from the different viruses that could catch emails, websites, memories and other activities for which the organization uses computers