What functionality does your MDM perform? (select all that apply)

Enforce consistent security management policies on devices28%

Update equipment, applications, functions, and policies41%

Track equipment and status (e.g., location, status, ownership, and activity)41%

Remotely wipe files28%

Encrypt email and files22%

Create separate and secured environments for work and personal device use44%

Monitor a device’s configuration and system parameters and look for suspicious activity42%

Detect network threats10%

Diagnose applications that may be “leaking” user data and detect potentially malicious apps5%

Flag phishing links4%

217 PARTICIPANTS
2.8k views

Content you might like

Ransomware / Malware / Phishing33%

Privacy27%

Cloud Security57%

Network Security34%

Zero Trust vs. VPN33%

Remote Workforce Security28%

Seamless User Experience16%

Legal and Regulatory Compliance8%

View Results

Yes - currently developing CBOM18%

We plan to do this in the next 1-2 years59%

No plans to develop CBOM23%

Something else/don’t know

View Results