Tactical Advice

Review: IBM Endpoint Manager for Mobile Devices

Gain the upper hand on managing the profusion of devices common in today’s workplace.
This story appears in the Summer 2013 issue of BizTech Magazine.
Product Review: IBM Endpoint Manager for Mobile Devices
Credit: RunPhoto/Getty Images

For many businesses, a more mobile workforce means staff can be productive almost anywhere they need to work. For the IT team, it usually means an explosion of devices to support and secure.

IBM Endpoint Manager for Mobile Devices, a component of the IBM Tivoli Endpoint Manager platform, provides a solution by centralizing management of a variety of portable endpoints: iOS, Android Symbian and Windows Phone mobile devices; notebook PCs running Windows; Apple notebooks; and port­able systems running Linux.

Endpoint Manager uses the same console and server as do other parts of the suite. It supports basic control of devices using an email-based management feature and an agent installed on each mobile device for more advanced tasks.

The email portion of the system works with Lotus Traveler or Microsoft Exchange 2007 or 2010. Relay servers process information from each mobile device and send it to the Tivoli Endpoint Manager Server.

The TEM Server allows for control of mobile apps on users’ devices. It also allows the IT department to remotely ­handle most day-to-day mobile device management (MDM) needs for those ­devices: ­installing approved apps, blocking unwanted ones, remotely wiping lost or ­stolen devices, pushing out security patches to protect against malware, enforcing ­device use policies, ensuring that software is updated and verifying security policy compliance.


The beauty of TEM integration is that businesses can establish a single program for granular control of all endpoints, not just mobile devices but PCs as well. The suite centralizes patch management, provides software use analyses, ensures security compliance, supports power management services and enables lifecycle management enterprisewide.

Using TEM, a business’s IT staff can deploy apps to mobile devices, ensure that software updates occur in a timely fashion, ensure that security policies are set and complied with, remotely wipe data from devices, and deploy configurations of virtual private network software.

Why It Works for IT

From the perspective of optimizing and ensuring appropriate app use, Endpoint Manager provides regular inventories of the installed apps on devices and reports about device settings. Armed with this expense management information, IT managers can improve their return on investment in mobile tools using the TEM data to license apps only to those users who need and make use of them.

From a security perspective, the IT department can make sure that users are not installing any apps that may circumvent corporate security policies. The IT team can also establish and enforce policies that restrict which devices can carry backed-up corporate data. As users increasingly work on multiple platforms, this means a worker can’t inadvertently store corporate data on a home system, for instance, or upload sensitive files to a cloud storage provider if that’s prohibited.

Additionally, the TEM Server allows for push notification to devices so that users don’t have to check regularly for updates. It supports a variety of mobile devices, and includes specialized functions such as location tracking and data usage tracking, which lets administrators closely monitor mobile device usage patterns.

What’s more, systems administrators can establish profiles through the console to manage users individually or in groups.


IBM acquired the software from BigFix, but distributes it under the Tivoli brand. The documentation and system help variously refers to BigFix, Tivoli and IBM, which could be confusing for some users.

Finally, it’s worth noting that because this is a modular component of a broad system, the program is more complex (albeit more flexible) than a single-use platform. For example, possible tasks shown under the MDM console include many applicable not to mobile devices but to PCs or notebooks using other TEM modules.

Sign up for our e-newsletter

About the Author

Logan Harbaugh

Logan G. Harbaugh

Logan Harbaugh is a longtime technology journalist, with experience in reviewing a wide range of IT products including network operating systems, clustering, load balancing, NAS and SAN systems, traffic simulation, network management and server hardware.


Heartbleed: What Should Your... |
One of the biggest security vulnerabilities has almost every user and every industry...
Why Businesses Need a Next-G... |
Devices investigate patterns that could indicate malicious activity.
Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....


The New Backup Utility Proce... |
Just getting used to the Windows 8 workflow? Prepare for a change.
How to Perform Traditional W... |
With previous versions going unused, Microsoft radically reimagined the backup utility in...
5 Easy Ways to Build a Bette... |
While large enterprises have the resources of an entire IT department behind them, these...

Infrastructure Optimization

Businesses Must Step Careful... |
Slow and steady wins the race as businesses migrate IT operations to service providers,...
Why Cloud Security Is More E... |
Cloud protection services enable companies to keep up with security threats while...
Ensure Uptime Is in Your Dat... |
Power and cooling solutions support disaster recovery and create cost savings and...


Securing the Internet of Thi... |
As excitement around the connected-device future grows, technology vendors seek ways to...
How to Maximize WAN Bandwidt... |
Understand six common problems that plague wide area networks — and how to address them.
Linksys Makes a Comeback in... |
The networking vendor introduced several new Smart Switch products at Interop this week.

Mobile & Wireless

Mobility: A Foundational Pie... |
Other technologies rely on mobile computing, which has the power to change lives, Lextech...
Now that Office for iPad Is... |
After waiting awhile for Microsoft’s productivity suite to arrive, professionals who use...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.

Hardware & Software

Review: HP TippingPoint S105... |
Next-generation firewall can easily replace a stand-alone intrusion prevention system....
New Challenges in Software M... |
IT trends such as cloud, virtualization and BYOD pose serious hurdles for software...
Visualization Can Help Busin... |
Companies need to put their data in formats that make it consumable anytime, anywhere.