<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>VMware End-User Computing Blog</title>
	<atom:link href="https://blogs.vmware.com/euc/feed" rel="self" type="application/rss+xml" />
	<link>https://blogs.vmware.com/euc/</link>
	<description>Bringing you the latest VMware EUC news, trends and product innovations.</description>
	<lastBuildDate>Wed, 03 Jul 2024 21:30:03 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
<site xmlns="com-wordpress:feed-additions:1">240671492</site>	<item>
		<title>Introducing Omnissa, the former VMware End-User Computing business</title>
		<link>https://blogs.vmware.com/euc/2024/04/introducing-omnissa-the-former-vmware-end-user-computing-business.html</link>
		
		<dc:creator><![CDATA[Renu Upadhyay]]></dc:creator>
		<pubDate>Thu, 25 Apr 2024 18:23:56 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[Employee Experience]]></category>
		<category><![CDATA[VMware Horizon]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[End-User Computing]]></category>
		<category><![CDATA[Omnissa]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34621</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Smiling businesswoman working from home" style="margin-bottom: 10px;" decoding="async" fetchpriority="high" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-600x400.jpeg 600w" sizes="(max-width: 300px) 100vw, 300px" /></div>
<p>As a marketing leader, one of the most exhilarating and rewarding undertakings is to define and activate a new brand. And it’s a rare opportunity to define a brand for an established business with industry-leading solutions. I’m privileged to have the opportunity to do both as the End-User Computing Division (EUC) prepares to be divested &#8230; <a href="https://blogs.vmware.com/euc/2024/04/introducing-omnissa-the-former-vmware-end-user-computing-business.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/04/introducing-omnissa-the-former-vmware-end-user-computing-business.html">Introducing Omnissa, the former VMware End-User Computing business</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Smiling businesswoman working from home" style="margin-bottom: 10px;" decoding="async" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_586495688-scaled-e1713985583781-600x400.jpeg 600w" sizes="(max-width: 300px) 100vw, 300px" /></div><p>As a marketing leader, one of the most exhilarating and rewarding undertakings is to define and activate a new brand. And it’s a rare opportunity to define a brand for an established business with industry-leading solutions. I’m privileged to have the opportunity to do both as the End-User Computing Division (EUC) prepares to be divested from Broadcom and become a standalone business under KKR ownership.</p>



<p>I’m thrilled to introduce you to <strong>Omnissa</strong> — the future name of EUC. While we remain part of Broadcom until the KKR acquisition closes later this year, we are previewing our new brand at <a href="http://www.omnissa.com" target="_blank" rel="noreferrer noopener">www.omnissa.com</a> from May 6, and I want to share the story of what it stands for.</p>



<p>The name Omnissa originated from a rigorous process that included our employees, customers, and partners. We asked these stakeholders to describe EUC and built our brand on this foundation.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large"><img decoding="async" height="576" width="1024" src="https://blogs.vmware.com/wp-content/uploads/sites/9/2024/04/Omnissa_WordCloud-1024x576.jpg" alt="Omnissa attributes word cloud" class="wp-image-34630"/></figure></div>


<p>Omnissa speaks to the central role our platform plays in making digital work better for everyone. We sought a name that aligned to our company purpose, was memorable, and could be easily pronounced. Omnissa (pronounced ahm-NISS-uh) is inspired by a vision of empowerment. It draws from a blend of ideas that suggest the comprehensive nature of our platform&#8217;s capabilities and usefulness. It conveys a sense of working calmly, with all the knowledge and insight you need, no matter what you’re doing or where you are.</p>



<p>The name is new, but our purpose remains unchanged — to empower employees to do their best work from anywhere through smart, seamless, and secure experiences.&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<h2 class="wp-block-heading" id="h-we-are-omnissa"><strong>We Are Omnissa</strong></h2>



<p>​We are Omnissa.</p>



<p>​We make digital work work, for businesses <em>and</em> their people.&nbsp;</p>



<p>No painful IT processes or productivity trade-offs. Instead, a seamlessly delivered digital employee experience that simplifies work.&nbsp;</p>



<p>Our comprehensive digital work platform enables IT teams to provide secure, personalized experiences for every employee, on any device. Omnissa unifies, automates, and efficiently scales the digital workspace.&nbsp;</p>



<p>By empowering employees to do their best work anywhere, we help workforces everywhere unlock exponential business value.&nbsp;</p>
</blockquote>



<p>We plan to launch the Omnissa brand more broadly once the acquisition of our business by KKR has closed. In the meantime, we continue to prepare for the transition with a strong focus on our go-to-market relationships with customers and partners.</p>



<ol class="wp-block-list" type="1" start="1">
<li>We remain committed to our comprehensive digital workspace platform that includes Workspace ONE and Horizon, and the autonomous workspace vision powered by data and intelligence.</li>



<li>We are investing in our global partner ecosystem.</li>



<li>We are bolstering our dedicated sales, services, and support functions in preparation for becoming a standalone business.</li>
</ol>



<p>As our SVP and GM Shankar Iyer shared in his recent <a href="https://blogs.vmware.com/euc/2024/02/broadcoms-euc-division-embraces-its-future-as-a-standalone-business.html" target="_blank" rel="noreferrer noopener">blog</a>, we are entering an exciting new chapter for the EUC business and for our customers and partners. I look forward to sharing more about our new brand, Omnissa, when we take the next step in our acquisition journey.</p>



<p><a id="_msocom_1"></a></p>



<p></p><p>The post <a href="https://blogs.vmware.com/euc/2024/04/introducing-omnissa-the-former-vmware-end-user-computing-business.html">Introducing Omnissa, the former VMware End-User Computing business</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34621</post-id>	</item>
		<item>
		<title>Conditional access with Workspace ONE integrates seamlessly with Microsoft Entra ID and Google’s Context-Aware Access for macOS</title>
		<link>https://blogs.vmware.com/euc/2024/04/conditional-access-with-workspace-one-integrates-seamlessly-with-microsoft-entra-id-and-googles-beyondcorp.html</link>
		
		<dc:creator><![CDATA[Chris Morelock and Paul Mounkes]]></dc:creator>
		<pubDate>Tue, 16 Apr 2024 15:37:15 +0000</pubDate>
				<category><![CDATA[Apple Device Management]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE Unified Endpoint Management]]></category>
		<category><![CDATA[conditional access]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34609</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Woman using her Mac" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>As cyber threats become more complex, it&#8217;s crucial for organizations to implement robust security measures. In today&#8217;s treacherous digital landscape, securing users’ access to organizational resources is critical. Workspace ONE Unified Endpoint Management (UEM) includes conditional access security capabilities that are beneficial for macOS admins and users. Conditional access in Workspace ONE allows organizations to &#8230; <a href="https://blogs.vmware.com/euc/2024/04/conditional-access-with-workspace-one-integrates-seamlessly-with-microsoft-entra-id-and-googles-beyondcorp.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/04/conditional-access-with-workspace-one-integrates-seamlessly-with-microsoft-entra-id-and-googles-beyondcorp.html">Conditional access with Workspace ONE integrates seamlessly with Microsoft Entra ID and Google’s Context-Aware Access for macOS</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Woman using her Mac" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_425749743-scaled-e1712677959831-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>As cyber threats become more complex, it&#8217;s crucial for organizations to implement robust security measures. In today&#8217;s treacherous digital landscape, securing users’ access to organizational resources is critical. Workspace ONE Unified Endpoint Management (UEM) includes conditional access security capabilities that are beneficial for macOS admins and users.</p>



<p>Conditional access in Workspace ONE allows organizations to define specific access policies based on a variety of conditions. This capability then considers the context of both the device and the user at the moment of access to assess their security status. For example, conditional access may note that a user is logging in from an uncommon location, or there has been an unusual spike in download activity. A variety of actions can be taken based on the results of this analysis, such as granting full access to corporate resources, enforcing multi-factor authentication (MFA), or auto-remediating configuration issues.</p>



<p>This dynamic security capability enables admins to ensure that only trusted devices and users can access sensitive information and applications. Let&#8217;s explore how conditional access can be leveraged within Workspace ONE for macOS.</p>



<h2 class="wp-block-heading" id="h-integration-with-workspace-one-uem-enrollment-status"><strong>Integration with Workspace ONE UEM enrollment status</strong></h2>



<p>One of the key features of conditional access is its integration with Workspace ONE enrollment status. This allows admins to use the enrollment status of devices as a condition for access policies, which can enhance the security of macOS environments.</p>



<h3 class="wp-block-heading"><strong>Per-app conditional access policies</strong></h3>



<p>Workspace ONE enables admins to define per-app conditional access policies for macOS devices so access to specific apps can be restricted based on factors like device compliance, user identity, and network location. For example, admins can create policies that require MFA for access to sensitive applications, adding an extra layer of security.</p>



<h2 class="wp-block-heading"><strong>Integration with Microsoft Entra Conditional Access</strong></h2>



<p>Workspace ONE enrollment and compliance status for macOS can be integrated with Microsoft Entra Conditional Access policies (formerly Azure AD) to enhance security and compliance. This integration allows organizations to enforce policies based on the enrollment and compliance status of macOS devices managed by Workspace ONE. By utilizing Microsoft Entra Conditional Access policies, organizations can ensure that only compliant and enrolled devices can access corporate resources, reducing the risk of unauthorized access and data breaches.</p>



<h2 class="wp-block-heading"><strong>Integration with Google’s Context-Aware Access</strong></h2>



<p>We’ve enhanced Workspace ONE for macOS by integrating Google Chrome Enterprise (formerly BeyondCorp) context-aware policies, boosting security and identity management. This integration with Google enables authentication for Google Workspace apps based on device compliance in Workspace ONE. Workspace ONE communicates with Google through an API to relay compliance status, ensuring macOS devices that meet security standards gain access to necessary resources.</p>



<h2 class="wp-block-heading"><strong>Benefits of using conditional access in Workspace ONE for macOS</strong></h2>



<p>Here are three benefits macOS admins can achieve with conditional access in Workspace ONE:</p>



<ul class="wp-block-list">
<li><strong>Enhanced security:</strong> By enforcing access policies based on device enrollment status and other factors, organizations can improve the security posture of their macOS environments.</li>



<li><strong>Improved compliance:</strong> Conditional access in Workspace ONE helps organizations comply with regulatory requirements by ensuring that only authorized devices and users can access sensitive information.</li>



<li><strong>Increased control:</strong> Admins have greater control over access to applications and data, allowing them to enforce policies that align with organizational security requirements.</li>
</ul>



<h2 class="wp-block-heading"><strong>Additional resources</strong></h2>



<p>Find more information here:</p>



<ul class="wp-block-list">
<li>Learn more about the integration with Google Context-Aware Access here: <strong><a href="https://docs.omnissa.com/bundle/Integrating-Workspace-ONE-UEM-with-your-Directory-ServicesVSaaS/page/DirSvcUseComplianceDataGoogleBeyondCorp.html" target="_blank" rel="noreferrer noopener">Use Compliance Data in Google BeyondCorp Context-Aware Access</a></strong>. </li>



<li>Learn more about the integration with Entra ID here: <strong><a href="https://docs.omnissa.com/bundle/Integrating-Workspace-ONE-UEM-with-your-Directory-ServicesVSaaS/page/DirSvcUseComplianceDataInAzureConditionalAccessPolicies.html" target="_blank" rel="noreferrer noopener">Use Compliance Data in Azure AD Conditional Access Policies</a></strong>. </li>
</ul><p>The post <a href="https://blogs.vmware.com/euc/2024/04/conditional-access-with-workspace-one-integrates-seamlessly-with-microsoft-entra-id-and-googles-beyondcorp.html">Conditional access with Workspace ONE integrates seamlessly with Microsoft Entra ID and Google’s Context-Aware Access for macOS</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34609</post-id>	</item>
		<item>
		<title>Preparing for the digital evolution: Insights from the 2024 Gartner Digital Workplace Summit</title>
		<link>https://blogs.vmware.com/euc/2024/04/insights-from-the-2024-gartner-digital-workplace-summit.html</link>
		
		<dc:creator><![CDATA[Bryan Vest]]></dc:creator>
		<pubDate>Fri, 05 Apr 2024 16:55:56 +0000</pubDate>
				<category><![CDATA[Employee Experience]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[VMware Horizon]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Gartner Digital Workplace Summit]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE UEM]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34593</guid>

					<description><![CDATA[<div><img width="300" height="216" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567.jpg?w=300" class="attachment-medium size-medium wp-post-image" alt="Marshall Anne Busbee presenting at GartnerDWP 2024" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567.jpg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-300x216.jpg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-1024x737.jpg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-768x553.jpg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-600x432.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Representatives from the Broadcom End-User Computing (EUC) Division had the privilege of attending the Gartner Digital Workplace Summit March 18–19, 2024, in Grapevine, Texas. More than 900 attendees comprising digital workplace leaders, architects, and IT execs came from around the globe to learn about trends, tools, and techniques to prepare for the evolving digital landscape. &#8230; <a href="https://blogs.vmware.com/euc/2024/04/insights-from-the-2024-gartner-digital-workplace-summit.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/04/insights-from-the-2024-gartner-digital-workplace-summit.html">Preparing for the digital evolution: Insights from the 2024 Gartner Digital Workplace Summit</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="216" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567.jpg?w=300" class="attachment-medium size-medium wp-post-image" alt="Marshall Anne Busbee presenting at GartnerDWP 2024" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567.jpg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-300x216.jpg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-1024x737.jpg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-768x553.jpg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/MA-Title-Slide_Stage-scaled-e1712254865567-600x432.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>Representatives from the Broadcom End-User Computing (EUC) Division had the privilege of attending the Gartner Digital Workplace Summit March 18–19, 2024, in Grapevine, Texas. More than 900 attendees comprising digital workplace leaders, architects, and IT execs came from around the globe to learn about trends, tools, and techniques to prepare for the evolving digital landscape. Attendees had access to industry experts who presented a vision for <a href="https://techzone.vmware.com/digital-employee-experience-solution-architecture" target="_blank" rel="noreferrer noopener">the future of digital employee experience</a> (DEX) and ways organizations can leverage the tech. The summit served as a platform to dive into future trends, contemporary tools, and the essence of delivering exceptional DEX.</p>



<h2 class="wp-block-heading" id="h-euc-division-of-broadcom-at-dws-2024">EUC Division of Broadcom at DWS 2024</h2>



<p>As a Platinum sponsor of the summit, we hosted a thought-provoking presentation on the second day. Marshall Anne Busbee, Director of Product Marketing for End-User Computing, shed light on the use cases and tangible ROI of DEX in her session titled “Unlocking Seamless Experiences with Digital Employee Experience (DEX).” This discourse proved timely as attendees sought insights into leveraging digital employee experiences to address challenges associated with hybrid and frontline work models.<br><br>During our session, we underscored the pivotal benefits offered by our EUC solution, including holistic visibility into employee experiences, cost savings through reduced support ticket resolution times, optimization of hardware planning, and enhanced employee perception of IT services. Additionally, Marshall Anne gave great insight from recent Fortune 500 CIO roundtable meetings. Just six months ago, CIOs gave VMware* EUC leaders the feedback that they needed a tool to help them <em>monitor</em> the productivity of employees. Fast forward a few months and the sentiments from CIOs were more focused on ensuring that employees have <em>tools to be productive —</em> quite a progression in a relatively short period of time. If you missed it, please review the <a href="https://ent.box.com/s/ifdh3pd5d0gi3o26sz08m2zes38t4gw2" target="_blank" rel="noreferrer noopener">conference materials</a> for our thought-leadership session, “Unlocking Seamless Experiences with Digital Employee Experience (DEX).”</p>



<p>During the EUC Division session, we discussed the challenges of enabling hybrid work, the evolution to a human-centric DEX model, and our approach to delivering a world-class DEX solution. We also showcased several use cases and enhancements to our platform:&nbsp;</p>



<ul class="wp-block-list">
<li>How data science and context-driven automation drives evolution to the human-centric DEX model: <a href="https://www.vmware.com/solutions/modern-endpoint-management.html" target="_blank" rel="noreferrer noopener">single platform</a>, <a href="https://via.vmw.com/tchzmno51675565" target="_blank" rel="noreferrer noopener">common framework for detecting anomalies</a>, remediation recommendations and steps for faster resolution with our <a href="https://www.youtube.com/watch?v=qSa7ek-E-Qg" target="_blank" rel="noreferrer noopener">guided root cause analysis</a> (you <em>have to</em> check out this click-through RCA demo <a href="https://techzone.vmware.com/?share=demo5766&amp;title=demo-using-the-guided-root-cause-analysis-tool-in-workspace-one-experience-management" target="_blank" rel="noreferrer noopener">here</a>).</li>



<li>How companies leverage Workspace ONE to reduce MTTR for top inbound support tickets: device health score/alerts, AI-driven insights, timelines, and device profile view, and intelligent self-service via ITSM portals. Learn more <a href="https://via.vmw.com/tchzmno5664" target="_blank" rel="noreferrer noopener">here</a>.</li>



<li>Enhancements of DEX for Horizon: the new console and navigation, plus additional capabilities like measuring the Wi-Fi signal strength of the endpoint device to its connected Wi-Fi source. Check out this great <a href="https://youtu.be/EtzVPMtLN5I?si=PYBREs87SIOLsopk" target="_blank" rel="noreferrer noopener">new video</a> on Intelligence for Horizon.</li>



<li>Application license optimization and unused software removal, with unified app ID across mobile, web, and virtual with true usage indicators. Read more in this <a href="https://blogs.vmware.com/euc/2022/11/how-to-use-workspace-one-intelligence-to-manage-app-licenses-and-reduce-costs.html" target="_blank" rel="noreferrer noopener">blog</a>.</li>



<li>Critical application availability monitoring leverages synthetic URL testing for both internal and external services and how to leverage Freestyle Orchestrator to automate communications.</li>
</ul>



<p>These innovations demonstrate our dedication to providing a complete DEX solution that boosts productivity, offers quicker issue resolution, and enhances employee engagement. Learn how the EUC digital employee experience (DEX) solution can help your organization:&nbsp;&nbsp;&nbsp;</p>



<ul class="wp-block-list">
<li>Deliver scalable platform support for a diverse set of use cases</li>



<li>Offer tangible ROI through data-driven Experience Management</li>



<li>Allow IT to remediate more issues and “shift left”&nbsp;</li>
</ul>



<h2 class="wp-block-heading">Key takeaways and interactions from DWS 2024</h2>



<p>Interacting with attendees at our booth during the summit provided invaluable insights into the prevailing sentiments and interests regarding DEX solutions.<br><br>Attendees expressed excitement regarding our DEX capabilities, with many seeking further information immediately following Marshall Anne’s session. Our “Enable Proactive IT” message resonated well, by highlighting features such as proactive alerts and providing ways organizations can reduce their top inbound service desk tickets. There was significant interest in our demos of the ITSM Connector with ServiceNow, which showed how we empower service desks with streamlined access to experience data and remediation actions. First-time encounters with Workspace ONE Intelligent Hub impressed business leaders, as they recognized its value as a centralized hub for end-user experiences. Last but not the least, we had several Horizon admins stop by to learn how we support virtual deployments in addition to physical device deployments.</p>



<h2 class="wp-block-heading">Looking ahead</h2>



<p>In tandem with the Digital Workplace Summit, we announced several new capabilities for the Workspace ONE digital employee experience solution, further underscoring our commitment to driving DEX innovations. Inside this <a href="https://blogs.vmware.com/euc/2024/02/workspace-one-capabilities-aligned-to-2023-gartner-market-guide-for-dex.html" target="_blank" rel="noreferrer noopener">blog</a>, you can continue your voyage toward enhancing digital employee experiences by accessing the <a href="https://www.vmware.com/learn/2383676_REG.html?CID=701Hr000002A0Z9IAK" target="_blank" rel="noreferrer noopener">2023 Gartner® Market Guide for DEX Tools</a>. Arm your organization with the insights and tactics detailed in this fantastic report, elevate your hybrid work paradigm to unprecedented levels, and transform your workplace into a nucleus of innovation, cooperation, and unmatched DEX.</p>



<p>As organizations are transitioning to the holistic “human-centric” approach, consider a single platform that measures both qualitative and quantitative aspects, and balances the data derived from all types of devices and all the ways that employees do their work.</p>



<p>For more insights and updates, stay connected with the latest announcements and innovations from the End-User Computing Division team through our <a href="https://blogs.vmware.com/euc/" target="_blank" rel="noreferrer noopener">End-User Computing Blog</a>, and explore our <a href="https://techzone.vmware.com/digital-employee-experience-solution-architecture" target="_blank" rel="noreferrer noopener">DEX solution page</a> to discover how we support organizations in offering seamless and secure digital employee experiences across diverse environments.</p>



<h5 class="wp-block-heading"><em>*Broadcom acquired VMware as of November 23, 2023, and on December 7, 2023, expressed intent to divest EUC. </em><a href="https://blogs.vmware.com/euc/2023/12/an-exciting-new-era-for-end-user-computing.html"><strong><em>Read more</em></strong></a><em> from Shankar Iyer, SVP &amp; GM, End-User Computing Division, Broadcom.</em></h5><p>The post <a href="https://blogs.vmware.com/euc/2024/04/insights-from-the-2024-gartner-digital-workplace-summit.html">Preparing for the digital evolution: Insights from the 2024 Gartner Digital Workplace Summit</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34593</post-id>	</item>
		<item>
		<title>Creating custom macOS security baselines with the macOS Security Compliance Project and Workspace ONE</title>
		<link>https://blogs.vmware.com/euc/2024/04/creating-custom-macos-security-baselines-with-the-macos-security-compliance-project-and-workspace-one.html</link>
		
		<dc:creator><![CDATA[Chris Morelock and Paul Mounkes]]></dc:creator>
		<pubDate>Tue, 02 Apr 2024 18:57:07 +0000</pubDate>
				<category><![CDATA[Apple Device Management]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[mSCP]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34584</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Female knowledge worker using laptop in office." style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Specific types of organizations are required to configure their endpoint security protocols in accordance with designated standards and benchmarks, such as those established by the National Institute of Standards and Technology (NIST) or the Center for Internet Security (CIS). Some organizations choose to align with these standards simply because it’s good practice. The macOS Security &#8230; <a href="https://blogs.vmware.com/euc/2024/04/creating-custom-macos-security-baselines-with-the-macos-security-compliance-project-and-workspace-one.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/04/creating-custom-macos-security-baselines-with-the-macos-security-compliance-project-and-workspace-one.html">Creating custom macOS security baselines with the macOS Security Compliance Project and Workspace ONE</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Female knowledge worker using laptop in office." style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/04/AdobeStock_657263753-scaled-e1712083726444-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>Specific types of organizations are required to configure their endpoint security protocols in accordance with designated standards and benchmarks, such as those established by the National Institute of Standards and Technology (NIST) or the Center for Internet Security (CIS). Some organizations choose to align with these standards simply because it’s good practice.</p>



<p>The macOS Security Compliance Project (mSCP) is an open-source tool that allows admins to create security profiles based on these well-defined standards, customize them based on their organization’s specific needs, and import them into Workspace ONE. By leveraging this integration, admins can streamline the deployment and management of their security profiles, solidifying the overall security posture of their macOS fleet.</p>



<h2 class="wp-block-heading" id="h-benefits-of-using-mscp"><strong>Benefits of using mSCP</strong></h2>



<p>mSCP provides a comprehensive set of security guidelines based on the combined wisdom of industry best practices and Apple’s own security documentation. The tool includes supported baselines from organizations including the aforementioned NIST and CIS, plus the Defense Information Systems Agency (DISA) and the Committee on National Security Systems Instruction (CNSSI). By using mSCP, organizations can establish a baseline security configuration that aligns with the standards that these institutions have carefully constructed to protect their macOS devices against threats and vulnerabilities.</p>



<p>Some of the key benefits of mSCP are flexibility and reliability. Because admins can customize the baseline settings, it’s relatively easy for admins to strike the right balance between higher levels of security and usability for their specific company’s needs. In terms of reliability, mSCP is regularly updated to reflect the latest security guidance from Apple, helping organizations stay ahead of emerging threats.</p>



<h2 class="wp-block-heading"><strong>Enhancing deployment with Workspace ONE</strong></h2>



<p>Workspace ONE offers a seamless way to deploy and manage security profiles generated by mSCP. The profile upload functionality in Workspace ONE allows admins to upload the mSCP .mobileconfig profiles directly into the Workspace ONE console.</p>



<p>This integration simplifies the deployment process, allowing admins to apply security configurations to their macOS devices quickly and efficiently. Furthermore, Workspace ONE provides robust management capabilities, such as compliance checks and remote wipe capabilities, ensuring that devices remain secure throughout their lifecycle.</p>



<p>If you want to get started with this process right away, we have a resource on Tech Zone that can help you: <a href="https://techzone.vmware.com/resource/enforcing-macos-security-compliance-project-baselines-workspace-one-operational-tutorial#overview">Enforcing macOS Security Compliance Project Baselines: Workspace ONE Operational Tutorial</a>.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" height="434" width="1024" src="https://blogs.vmware.com/wp-content/uploads/sites/9/2024/04/Screenshot-2024-04-02-at-10.01.13 AM-1024x434.png" alt="Workspace ONE mobileconfig Importer" class="wp-image-34581"/><figcaption class="wp-element-caption">Importing the .mobileconfig file</figcaption></figure>



<h2 class="wp-block-heading"><strong>Conclusion</strong></h2>



<p>In conclusion, leveraging the mSCP in conjunction with Workspace ONE can significantly enhance the security of your macOS fleet. By creating a security baseline based on industry best practices and seamlessly deploying it using Workspace ONE, organizations can better protect their macOS devices against a wide range of threats.</p>



<h2 class="wp-block-heading"><strong>Additional resources</strong></h2>



<ul class="wp-block-list">
<li>Visit our <a href="https://techzone.vmware.com/resource/enforcing-macos-security-compliance-project-baselines-workspace-one-operational-tutorial#overview" target="_blank" rel="noreferrer noopener">Tech Zone tutorial</a>.</li>



<li>Visit Apple’s web page for the <a href="https://support.apple.com/guide/certifications/macos-security-compliance-project-apc322685bb2/web" target="_blank" rel="noreferrer noopener">macOS Security Compliance Project</a>.</li>



<li>Visit the mSCP on <a href="https://github.com/usnistgov/macos_security#readme" target="_blank" rel="noreferrer noopener">GitHub</a>.</li>
</ul><p>The post <a href="https://blogs.vmware.com/euc/2024/04/creating-custom-macos-security-baselines-with-the-macos-security-compliance-project-and-workspace-one.html">Creating custom macOS security baselines with the macOS Security Compliance Project and Workspace ONE</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34584</post-id>	</item>
		<item>
		<title>Introducing enhanced integration between Cisco ISE and Workspace ONE Unified Endpoint Management</title>
		<link>https://blogs.vmware.com/euc/2024/03/introducing-enhanced-integration-between-cisco-ise-and-workspace-one-unified-endpoint-management.html</link>
		
		<dc:creator><![CDATA[Sivapratap Reddy Chintam]]></dc:creator>
		<pubDate>Thu, 28 Mar 2024 02:19:55 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE Unified Endpoint Management]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE UEM]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34569</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Two young IT admins" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>We’re thrilled to announce the limited availability of Cisco Identity Services Engine (ISE) v3.1+ and Workspace ONE Unified Endpoint Management (UEM) integration with the Workspace ONE UEM 2402 release. This integration ensures that your end user’s devices can safely and securely connect and access network resources, even when their MAC addresses are randomized, or in &#8230; <a href="https://blogs.vmware.com/euc/2024/03/introducing-enhanced-integration-between-cisco-ise-and-workspace-one-unified-endpoint-management.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/introducing-enhanced-integration-between-cisco-ise-and-workspace-one-unified-endpoint-management.html">Introducing enhanced integration between Cisco ISE and Workspace ONE Unified Endpoint Management</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Two young IT admins" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_485642628-scaled-e1707785569403-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>We’re thrilled to announce the limited availability of Cisco Identity Services Engine (ISE) v3.1+ and Workspace ONE Unified Endpoint Management (UEM) integration with the Workspace ONE UEM 2402 release. This integration ensures that your end user’s devices can safely and securely connect and access network resources, even when their MAC addresses are randomized, or in scenarios where they are connected through multiple network interfaces, dongles, or docking stations.</p>



<h2 class="wp-block-heading"><strong>A bit of history on Workspace ONE UEM and Cisco ISE integration&nbsp;</strong></h2>



<p>For a significant part of the past decade, Workspace ONE UEM (formerly AirWatch) and Cisco ISE have integrated to enhance network security for organizations. By combining Workspace ONE UEM’s robust unified endpoint management capabilities, which ensure data and device integrity, with Cisco ISE’s advanced network access control features, organizations can establish a cohesive security framework that ensures compliance and effectively mitigates security risks. By leveraging Workspace ONE UEM’s device management insights, Cisco ISE can dynamically enforce access policies based on information such as device compliance status. This strengthens the organization’s security posture and helps safeguard against unauthorized access attempts.</p>



<p>Prior to version 3.1, Cisco ISE software leveraged MAC addresses to uniquely identify devices within Workspace ONE UEM and query compliance information.</p>



<p>Depending on the compliance status, Cisco ISE can then either permit the device to access the network or prompt the user to register the device with Cisco ISE and enroll it in Workspace ONE UEM. Conversely, if a device violates an active compliance policy, access to the network is promptly restricted, and the end user is directed to remediate the compliance issues.</p>



<h2 class="wp-block-heading"><strong>The challenge with the rise of MAC address randomization</strong></h2>



<p>For years now, major operating systems like iOS 8+ and Android 8+ have integrated some form of media access control (MAC) address randomization. This was aimed at strengthening user privacy by preventing attempts to track devices using their genuine MAC address. Initially, these operating systems only randomized MAC addresses during Wi-Fi network scans but maintained the use of a static, genuine MAC address when actually connecting to networks.</p>



<p>However, this shifted with the introduction of Android 10 by Google in late 2019. This update made MAC address randomization the default behavior even during network connections. Following suit, iOS devices with the release of iOS 14 not only began employing randomized MAC addresses by default for connecting to networks but also introduced a “Private MAC Address” feature. This feature rotates MAC addresses every 24 hours post network connection, further enhancing user privacy. Similarly, Windows 10 by Microsoft incorporated MAC address randomization, extending these privacy benefits to Windows users.</p>



<p>While MAC address randomization offered substantial privacy advantages, it posed challenges for integrations reliant on consistent MAC address for device identification. This is particularly evident in scenarios involving Cisco ISE and Workspace ONE UEM, where devices may present different MAC addresses based on the SSID used, the network connection type (wired, wireless, or VPN), or when connected through dongles or docking stations. Consequently, when Cisco ISE communicates with Workspace ONE UEM using MAC address, Workspace ONE UEM may fail to see the MAC address as belonging to any valid device. This can result in the device not being able to authenticate or gain access to network resources.</p>



<h2 class="wp-block-heading"><strong>Introducing enhanced integration: Harnessing the power of GUIDs</strong></h2>



<p>To overcome the challenges posed by MAC address dependencies stated above, Cisco ISE and Workspace ONE UEM will now leverage globally unique identifiers (GUIDs) for unique device identification. Unlike MAC addresses, which can vary, GUIDs offer a stable and consistent means of device identification across various networks and SSIDs.</p>



<p>When a device enrolls in Workspace ONE UEM, an administrator can configure a certificate containing the device UUID, which serves as the Workspace ONE UEM-generated GUID value, to be delivered to the device. This certificate, with the GUID, when utilized by the device for authentication into the network, can be used by Cisco ISE to look up the device uniquely within Workspace ONE UEM. All communications between Cisco ISE and Workspace ONE UEM are seamlessly streamlined through the utilization of GUIDs.</p>



<h2 class="wp-block-heading" id="h-want-to-learn-more"><strong>Want to learn more?</strong></h2>



<p>To delve deeper into implementing this enhancement and unlocking the full potential of your network security infrastructure, refer to our detailed Tech Zone article&nbsp;“<a href="https://techzone.vmware.com/resource/integrating-workspace-one-uem-and-cisco-ise-v31-and-beyond">Integrating Workspace ONE UEM and Cisco ISE v3.1 and Beyond</a>.”</p>



<p>Don’t let MAC address randomization disrupt your end user’s access to the network. Enhance your network security and management efficiency now with the advanced integration of Cisco ISE and Workspace ONE UEM. Get in touch with your account manager to enable this feature.</p><p>The post <a href="https://blogs.vmware.com/euc/2024/03/introducing-enhanced-integration-between-cisco-ise-and-workspace-one-unified-endpoint-management.html">Introducing enhanced integration between Cisco ISE and Workspace ONE Unified Endpoint Management</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34569</post-id>	</item>
		<item>
		<title>New management capabilities now available for macOS Activation Lock in Workspace ONE</title>
		<link>https://blogs.vmware.com/euc/2024/03/new-management-capabilities-now-available-for-macos-activation-lock-in-workspace-one.html</link>
		
		<dc:creator><![CDATA[Paul Mounkes]]></dc:creator>
		<pubDate>Wed, 27 Mar 2024 19:12:13 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[Apple Device Management]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Activation Lock]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34567</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man using a laptop and smartphone in coffee shop" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Anyone who has had a laptop stolen knows the great frustration that comes with losing not only an expensive piece of tech but also the precious work and personal information, photos, and everything else that’s stored on it. Apple understands this, and long ago introduced a feature designed to make would-be thieves think twice about &#8230; <a href="https://blogs.vmware.com/euc/2024/03/new-management-capabilities-now-available-for-macos-activation-lock-in-workspace-one.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/new-management-capabilities-now-available-for-macos-activation-lock-in-workspace-one.html">New management capabilities now available for macOS Activation Lock in Workspace ONE</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man using a laptop and smartphone in coffee shop" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_296311243-scaled-e1711554439402-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>Anyone who has had a laptop stolen knows the great frustration that comes with losing not only an expensive piece of tech but also the precious work and personal information, photos, and everything else that’s stored on it. Apple understands this, and long ago introduced a feature designed to make would-be thieves think twice about stealing Apple hardware.</p>



<p>Activation Lock is a security mechanism for macOS and iOS devices that ensures a device, even if it has been factory-reset — <em>even if an admin has erased the device remotely</em> — can never be accessed by anyone except the original owner (or, at least, someone with their credentials).</p>



<h2 class="wp-block-heading">Theft deterrent</h2>



<p>If a MacBook was stolen and a factory reset performed with Activation Lock enabled, the device would still ask for existing authorization codes at next startup. Without the authorization codes, the only way to gain access would be to contact Apple support, provide proof of purchase, and have them clear the Activation Lock. So, with this function enabled, no thief can ever use or resell a stolen Apple device (to a happy customer at least), nor can identity theft or corporate espionage take place, as all files and resources remain securely locked away even after a reset. Thus, there’s simply no reason to take whatever risks may be involved in stealing an Apple device in the first place. It’s an elegant solution to an ugly problem.</p>



<h2 class="wp-block-heading">Potential challenges in business</h2>



<p>In business, however, Activation Lock can sometimes become an obstacle. Specifically, an employee who has left the company may run a factory reset on a device to wipe personal information before returning it to IT, with Activation Lock still enabled. Because IT doesn’t have the user’s credentials, in the absence of some kind of MDM-based workaround, the only recourse would be a time-consuming search for proof of purchase and a subsequent call to Apple support to get Activation Lock cleared.</p>



<h2 class="wp-block-heading"><strong>The solution in Workspace ONE</strong></h2>



<p>With the launch of Workspace ONE version 2402, Workspace ONE now provides the ability both to enable and to clear Activation Lock on supervised Macs. To enable Activation Lock, admins can use the “All Settings” capability to set global policy enabling Activation Lock on all Macs, or by Smart Groups. By contrast, the “Details View” allows you to manage individual devices. Options for bypassing and clearing are more detailed and flexible.</p>



<h2 class="wp-block-heading">How to disable Activation Lock</h2>



<p>You can disable Activation Lock on all Macs or set policy by Smart Groups or by individual device, in the same way you enable the functionality as noted above.</p>



<p>However, if Activation Lock was left enabled and is an obstacle to re-assigning a used device, there are several options:</p>



<ul class="wp-block-list">
<li><strong>Clear Activation Lock in the console:</strong> Admins can clear it on a specific Mac through the console in the “Device Details” view with a simple mouse click.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Enter a bypass code:</strong> Workspace ONE provides a code you can enter during Setup Assistant to bypass Activation Lock.</li>
</ul>



<ul class="wp-block-list">
<li><strong>Wipe the device via Workspace ONE:</strong> Simply perform a wipe using Workspace ONE. Doing so will give you the option to disable the Activation Lock function.</li>
</ul>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" height="706" width="1024" src="https://blogs.vmware.com/wp-content/uploads/sites/9/2024/03/Screenshot-2024-03-26-at-9.48.27 AM-e1711473808852-1024x706.png" alt="Activation Lock" class="wp-image-34561"/></figure>



<p></p>



<p>For the sake of clarification, we should note this only works on supervised devices. Workspace ONE admins will not be able to clear Activation Lock from BYOD or any other type of unmanaged device.</p>



<h2 class="wp-block-heading" id="h-in-conclusion"><strong>In conclusion … </strong></h2>



<p>We can see that with this new functionality in the console, Activation Lock on macOS becomes what it was always meant to be for Workspace ONE customers: all good in terms of accomplishing security through deterrence, with none of the obstacles.</p>



<h2 class="wp-block-heading"><strong>Additional resources</strong></h2>



<ul class="wp-block-list">
<li>Please review our Activation Lock tutorial on <a href="https://techzone.vmware.com/blog/managing-activation-lock-macos-devices-workspace-one-uem" target="_blank" rel="noreferrer noopener">Tech Zone</a>.</li>



<li>Review <a href="https://support.apple.com/en-us/108794" target="_blank" rel="noreferrer noopener">Apple’s web page</a> for more details about Activation Lock.</li>
</ul><p>The post <a href="https://blogs.vmware.com/euc/2024/03/new-management-capabilities-now-available-for-macos-activation-lock-in-workspace-one.html">New management capabilities now available for macOS Activation Lock in Workspace ONE</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34567</post-id>	</item>
		<item>
		<title>Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victims</title>
		<link>https://blogs.vmware.com/euc/2024/03/beware-of-cryptochameleon-the-new-phishing-threat-that-uses-social-engineering-to-trick-victims.html</link>
		
		<dc:creator><![CDATA[Wendy Leung]]></dc:creator>
		<pubDate>Tue, 26 Mar 2024 15:01:25 +0000</pubDate>
				<category><![CDATA[Mobile]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE Mobile Threat Defense]]></category>
		<category><![CDATA[Workspace Security]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34554</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man in suit using mobile device" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>In the ever-evolving landscape of cyber threats, the CryptoChameleon phishing attack has emerged as a new example of how cybercriminals use advanced social engineering to gain access to victim’s accounts. Like a chameleon, the hackers camouflage themselves, but as trusted authorities, to blend in and stay hidden. This makes these attacks tough to spot and &#8230; <a href="https://blogs.vmware.com/euc/2024/03/beware-of-cryptochameleon-the-new-phishing-threat-that-uses-social-engineering-to-trick-victims.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/beware-of-cryptochameleon-the-new-phishing-threat-that-uses-social-engineering-to-trick-victims.html">Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victims</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man in suit using mobile device" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_301163164-scaled-e1709175218657-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>In the ever-evolving landscape of cyber threats, the CryptoChameleon phishing attack has emerged as a new example of how cybercriminals use advanced social engineering to gain access to victim’s accounts. Like a chameleon, the hackers camouflage themselves, but as trusted authorities, to blend in and stay hidden. This makes these attacks tough to spot and stop, especially for companies trying to keep their data safe. CryptoChameleon targeted the Federal Communications Commission (FCC), Binance, Coinbase, and other cryptocurrency platforms.</p>



<p>The victims of the recent CryptoChameleon phishing attacks shared usernames, passwords, password reset URLs, and even photo IDs. Our Workspace ONE Mobile Threat Defense technology partner, Lookout, uncovered this <a href="https://www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phishing-kit" target="_blank" rel="noreferrer noopener">advanced phishing kit</a>. CryptoChameleon is just one example of a sophisticated social engineering campaign, whereby attackers use information and awareness of human behaviors to infiltrate organizations. Thanks to the automated protections of Lookout, Workspace ONE Mobile Threat Defense customers with <a href="https://via.vmw.com/tchzmno50635392" target="_blank" rel="noreferrer noopener">phishing and content protection</a> enabled are protected from CryptoChameleon. Let&#8217;s dive into what makes CryptoChameleon so different from other phishing tactics.</p>



<h2 class="wp-block-heading" id="h-why-was-cryptochameleon-successful"><strong>Why was CryptoChameleon successful?</strong></h2>



<p>The phishing campaign looked and felt legitimate. The cybercriminals did their homework and built a very advanced phishing kit with carbon copies of single sign-on (SSO) pages to capture credentials. For example, the domain in question was fcc-okta[.]com, which is only a single character different from the legitimate FCC Okta Single Sign-On (SSO) page. On a mobile device, it’s not easy to spot a very good replica.</p>



<p>Furthermore, the fake page had a built-in captcha, a very clever tactic that made the page appear more legitimate and stopped web page crawling, which prevented automatic evaluation of the phishing site by security teams. Victims entered their login details and were presented with a verification code page. After using the fake verification, the victims were sent to a fake waiting page while the login was utilized. Finally, a live person in the form of a well-spoken operator supported the phishing kit. The operator answered a fake help line and then used a combination of email, SMS, and voice phishing to trick the victims into sharing usernames, passwords, password reset URLs, and photo IDs. The threat actor would tell victims that their accounts were under review and to attempt a log in later. Then, the victims would get an unsolicited phone call that spoofed the organization’s customer support line. The threat actor would inform victims that their account had been hacked, but that the victimized caller would help them recover the account. While the victims were on the phone with the threat actor, they would receive a text message that linked to a login page set up to mimic the organization’s legitimate Okta page. In the meantime, the cyber criminals would access the victim’s accounts with the access they had unwittingly provided.</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" height="1024" width="468" src="https://blogs.vmware.com/wp-content/uploads/sites/9/2024/03/Screenshot-2024-03-25-at-4.38.28 PM-468x1024.png" alt="" class="wp-image-34558"/><figcaption class="wp-element-caption">Spoofed Okta page created by the CryptoChameleon threat actors.</figcaption></figure>



<h2 class="wp-block-heading"><strong>How can organizations defend against CryptoChameleon?</strong></h2>



<p>Protecting against advanced phishing kits employing social engineering requires deep defense tactics. Here are a few key ways to secure your organization:</p>



<ol class="wp-block-list" type="1" start="1">
<li><strong>Increase education and awareness.</strong> Regularly train employees and users to recognize social engineering tactics and be cautious about sharing sensitive information. Notify and keep employees engaged by delivering the latest news, tips and tricks directly to their digital workspace with <a href="https://www.vmware.com/products/workspace-one/intelligent-hub.html" target="_blank" rel="noreferrer noopener">Workspace ONE Intelligent Hub</a>.&nbsp;&nbsp;</li>



<li><strong>Use multi-factor authentication</strong> Implement additional layers of security, such as multi-factor authentication (MFA), to mitigate the impact of compromised credentials. MFA should be one part of an overall zero trust security approach that includes conditional access and <a href="https://techzone.vmware.com/resource/zero-trust-secure-access-traditional-applications-vmware#introduction-what-is-zero-trust" target="_blank" rel="noreferrer noopener">zero-trust access</a> to applications and resources.&nbsp;</li>



<li><strong>Deploy advanced mobile security.</strong> <a href="https://www.vmware.com/products/mobile-threat-defense.html" target="_blank" rel="noreferrer noopener">Workspace ONE Mobile Threat Defense</a> has multiple layers of defenses, including phishing and content protection, to detect and prevent social engineering attacks. Workspace ONE Mobile Threat Defense protects against malicious links at the URL level, and it also ties in with Workspace ONE Unified Endpoint Management (UEM) so you can respond to threats automatically and share status across IT and security teams.</li>
</ol>



<h2 class="wp-block-heading"><strong>In conclusion</strong></h2>



<p>CryptoChameleon is an example of a very sophisticated social engineering <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a" target="_blank" rel="noreferrer noopener">campaign</a> organizations encounter today.Powered by Lookout, Workspace ONE Mobile Threat Defense provides customers with comprehensive mobile security that includes phishing and content protection. With Workspace ONE Mobile Threat Defense, activation of mobile security is simplified, and automations and remediations can happen via security integration with Workspace ONE UEM.</p>



<p>Fortify your defenses by staying vigilant and informed and protect what matters most. See Mobile Threat Defense in action in our upcoming technical webinar <a href="https://www.lookout.com/community/webinars/see-mobile-threat-defense-in-action" target="_blank" rel="noreferrer noopener">here</a> or contact your sales representative for a <a href="https://www.vmware.com/company/contact_sales.html" target="_blank" rel="noreferrer noopener">free trial</a>.</p><p>The post <a href="https://blogs.vmware.com/euc/2024/03/beware-of-cryptochameleon-the-new-phishing-threat-that-uses-social-engineering-to-trick-victims.html">Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victims</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34554</post-id>	</item>
		<item>
		<title>ViVE 2024: Why healthcare interoperability is key, and how we’re championing it</title>
		<link>https://blogs.vmware.com/euc/2024/03/why-healthcare-interoperability-is-key-vive-2024.html</link>
		
		<dc:creator><![CDATA[Amy Young]]></dc:creator>
		<pubDate>Tue, 19 Mar 2024 22:54:11 +0000</pubDate>
				<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[VMware Horizon]]></category>
		<category><![CDATA[healthcare]]></category>
		<category><![CDATA[Horizon]]></category>
		<category><![CDATA[interoperability]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34536</guid>

					<description><![CDATA[<div><img width="300" height="205" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545.jpg?w=300" class="attachment-medium size-medium wp-post-image" alt="Farid presenting at ViVE 2024" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545.jpg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-300x205.jpg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-1024x700.jpg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-768x525.jpg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-600x410.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>Unmanaged devices. A mix of traditional and cloud-based applications. Data scattered across different cloud environments. This complexity in the healthcare environment can create a nightmare for data security, compliance, and efficient care delivery. Each separate tool adds another layer of chaos. So, what do we do about it? The answer lies in embracing this diverse &#8230; <a href="https://blogs.vmware.com/euc/2024/03/why-healthcare-interoperability-is-key-vive-2024.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/why-healthcare-interoperability-is-key-vive-2024.html">ViVE 2024: Why healthcare interoperability is key, and how we’re championing it</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="205" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545.jpg?w=300" class="attachment-medium size-medium wp-post-image" alt="Farid presenting at ViVE 2024" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545.jpg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-300x205.jpg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-1024x700.jpg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-768x525.jpg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Farid-Session-scaled-e1710886935545-600x410.jpg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>Unmanaged devices. A mix of traditional and cloud-based applications. Data scattered across different cloud environments. This complexity in the healthcare environment can create a nightmare for data security, compliance, and efficient care delivery. Each separate tool adds another layer of chaos.</p>



<p>So, what do we do about it?</p>



<p>The answer lies in embracing this diverse technology landscape while keeping the entire ecosystem secure. We need a solution that fosters collaboration between different technologies, safeguards data, and ensures robust system security. In short, we need to enable healthcare <em>interoperability</em><strong>.</strong></p>



<p>That’s why the End-User Computing (EUC) Division of Broadcom was proud to be a sponsor of the <a href="https://www.viveevent.com/2023event/interopnow" target="_blank" rel="noreferrer noopener">InteropNow! pavilion</a> at the recent <a href="https://www.viveevent.com/" target="_blank" rel="noreferrer noopener">ViVE trade show</a>. This sponsorship reflects our dedication to fostering discussions and showcasing how technology, like our suite of solutions including <a href="https://www.vmware.com/products/horizon.html" target="_blank" rel="noreferrer noopener">Horizon</a> and <a href="https://www.vmware.com/products/workspace-one.html" target="_blank" rel="noreferrer noopener">Workspace ONE</a>, can bridge the gaps in healthcare data.&nbsp;</p>



<h2 class="wp-block-heading" id="h-the-emr-revolution-and-beyond"><strong>The EMR revolution and beyond</strong></h2>



<p>Electronic medical records/electronic health records (EMRs/EHRs) have revolutionized healthcare. Today, most healthcare organizations have implemented one. But technology keeps evolving, and so should our end-user computing strategies.</p>



<p>A traditional healthcare IT model relies on physical desktops loaded with applications. However, healthcare organizations are increasingly moving away from legacy EMRs toward more advanced platforms. This shift often coincides with a desire for <strong>data virtualization</strong> — which can be realized by switching from on-device data storage to virtual desktops in secure data centers, or in the cloud.</p>



<p>Here&#8217;s how end-user computing plays a crucial role in achieving interoperability:</p>



<ul class="wp-block-list">
<li><strong>Virtual desktops (VDI) with Horizon.</strong> VDI allows healthcare professionals to securely access their virtual workspace and applications from any device, regardless of the underlying operating system. The desktop “follows” them wherever they go, empowering them to work seamlessly across different departments and hospitals, accessing patient data from various sources.</li>



<li><strong>Unified endpoint management (UEM) with Workspace ONE.</strong> Solutions like Workspace ONE Unified Endpoint Management can manage and secure a vast array of devices and applications used in healthcare. With Workspace ONE, end users can get passwordless single sign-on to a catalog that provides them access to virtually any app. This ensures consistent access to healthcare apps — from any device — while maintaining robust security protocols for sensitive patient data.</li>
</ul>



<p>To summarize, healthcare interoperability ensures that healthcare data flows freely between systems, and EUC solutions like Horizon and Workspace ONE provide the tools and platform for secure access and management within this connected environment.&nbsp;</p>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" height="768" width="1024" src="https://blogs.vmware.com/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692-1024x768.jpg" alt="Speaker session at ViVE 2024" class="wp-image-34543" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692-1024x768.jpg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692-300x225.jpg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692-768x576.jpg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692-600x450.jpg 600w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/Amy-and-Josh-session-scaled-e1710887187692.jpg 1280w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>It was great to connect with our customers and partners at ViVE to discuss the current state of healthcare end-user computing — and the vast possibilities that lie ahead.&nbsp;</p>



<p>Are you ready to navigate the complexities of healthcare interoperability and unlock its potential? Let&#8217;s work together to create a connected healthcare ecosystem that puts patient data at the center, paving the way for a healthier future. Learn how we helped Hartford HealthCare, <a href="https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/customers/vmware-hartford-healthcare-case-study.pdf." target="_blank" rel="noreferrer noopener">here</a>.</p><p>The post <a href="https://blogs.vmware.com/euc/2024/03/why-healthcare-interoperability-is-key-vive-2024.html">ViVE 2024: Why healthcare interoperability is key, and how we’re championing it</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34536</post-id>	</item>
		<item>
		<title>Apple iOS 17.4 introduces updates, including alternative app stores and payment methods</title>
		<link>https://blogs.vmware.com/euc/2024/03/apple-ios-17-4-introduces-updates-including-alternative-app-stores-and-payment-methods.html</link>
		
		<dc:creator><![CDATA[Adam Henry and Paul Mounkes]]></dc:creator>
		<pubDate>Tue, 12 Mar 2024 20:58:17 +0000</pubDate>
				<category><![CDATA[Apple Device Management]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE Unified Endpoint Management]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple device management]]></category>
		<category><![CDATA[iOS 17.4]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE UEM]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34519</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Woman on iPhone" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>In 2022, European Union (EU) watchdogs, the European Commission (EC), launched an ambitious project aimed at “ensuring fair and open digital markets.” Essentially, the goal of the Digital Markets Act (DMA) is to limit the power of designated technology “gatekeepers” and ensure they behave “in a fair way online.” These are the six online platforms &#8230; <a href="https://blogs.vmware.com/euc/2024/03/apple-ios-17-4-introduces-updates-including-alternative-app-stores-and-payment-methods.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/apple-ios-17-4-introduces-updates-including-alternative-app-stores-and-payment-methods.html">Apple iOS 17.4 introduces updates, including alternative app stores and payment methods</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Woman on iPhone" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/03/AdobeStock_619390193-scaled-e1710276821374-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>In 2022, European Union (EU) watchdogs, the European Commission (EC), launched an ambitious project aimed at “ensuring fair and open digital markets.” Essentially, the goal of the <a href="https://commission.europa.eu/strategy-and-policy/priorities-2019-2024/europe-fit-digital-age/digital-markets-act-ensuring-fair-and-open-digital-markets_en" target="_blank" rel="noreferrer noopener">Digital Markets Act</a> (DMA) is to limit the power of designated technology “gatekeepers” and ensure they behave “in a fair way online.” These are the six online platforms designated gatekeepers:</p>



<ul class="wp-block-list">
<li>Alphabet</li>



<li>Amazon</li>



<li><strong>Apple</strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</li>



<li>ByteDance</li>



<li>Meta</li>



<li>Microsoft</li>
</ul>



<p>For these select few, the EC laid out a set of business practices they’d need to change over the coming years to comply with the DMA. In the case of Apple, the EC deemed that the App Store, Safari, and Apple Pay are considered “core platform services,” and that competing developers must be allowed to offer alternative solutions to iPhone and iPad customers. As a result, iOS 17.4 includes multiple changes that will greatly affect users in the EU over time.</p>



<h2 class="wp-block-heading"><strong>Alternative contactless payment systems</strong></h2>



<p>Companies are now able to develop solutions that make use of Apple’s Near-Field Communication (NFC) technology in a seamless and convenient way to create alternative tap-and-go payment systems that compete directly with Apple Pay in the EU. A developer entitlement is required for companies that decide to take advantage of the opportunity to compete with Apple Pay. The entitlement process allows Apple to ensure that:</p>



<ol class="wp-block-list">
<li>Developers will incur fees to piggyback on the NFC tech that Apple spent valuable time and resources creating.</li>



<li>Competitors must, of course, be licensed with the proper authorities to provide payment services in the European Economic Area (EEA)&nbsp;</li>



<li>Developers will comply with Apple’s minimal design guidelines.&nbsp;</li>
</ol>



<h3 class="wp-block-heading"><strong>Options for Workspace ONE customers</strong></h3>



<p>If you are a Workspace ONE customer and have concerns about alternative payments systems running on corporate devices, you can simply block apps from being downloaded. With mobile device management (MDM), you can also use the Restrictions profile to remove the App Store. To hide individual apps and prevent these apps from running, you can use the “Hide App” functionality in the Restrictions profile. For more ways to block apps on corporate devices with Workspace ONE, <a href="https://techzone.vmware.com/resource/blocking-unwanted-apps-managed-ios-devices" target="_blank" rel="noreferrer noopener">review the tutoria</a>l on Tech Zone.</p>



<h2 class="wp-block-heading"><strong>Alternative app marketplaces</strong></h2>



<p>Since the inception of the iPhone, millions of iOS customers have had one single place to download applications — the App Store. As such, it’s likely that the most impactful change in iOS 17.4 is the introduction of alternative app marketplaces that compete directly with the App Store in the EU. App developers may also use alternative (non-Apple) payment service providers (PSPs) to power in-app purchases or link users to out-of-app websites to conduct transactions. They can also, of course, use Apple’s own payment processing for a 3% fee (a typical cost for processing).</p>



<p>Apple has warned that any new marketplaces or alternative payment methods could introduce elements of risk in the form of privacy, security, and fraud threats, as Apple will have very little control over these entities. Constrained as they are by the DMA, Apple is taking what steps they can to mitigate these risks.&nbsp;</p>



<h3 class="wp-block-heading">Requirements for third-party marketplace developers</h3>



<p>As mentioned, Apple now provides new APIs, allowing third-party developers to create and manage their own application distribution platforms (which will be available for download on their own organizations’ websites). Each aspiring marketplace developer is required to attain the proper developer authorization, through which Apple will ensure that they are adhering to certain requirements:</p>



<ul class="wp-block-list">
<li>Labeling that lets users know the app they’re downloading uses non-Apple payment processing</li>



<li>In-app notifications telling users they’re about to transact using non-Apple payment processing</li>



<li>Expanded data portability for users allowing them to export data about their app usage</li>
</ul>



<h3 class="wp-block-heading">Requirements for app developers</h3>



<p>In addition to these requirements for marketplace developers, Apple has also implemented a notarization process for the applications they’ll be distributing. (Note: Historically, apps distributed through the App Store have always undergone a level of scrutiny by Apple to ensure integrity.) Notarization involves a set of “automated checks and human review” designed as a minimum guard against security and fraud risk. Apple has also implemented new protections that prevent apps from opening if they contain malware. Still, for apps that use alternative payment processing, Apple warns that the company will be unable to issue refunds and will have limited customer support capability.&nbsp;</p>



<p>The message about alternative app marketplaces and payment services is clear: Swim at your own risk, EU!</p>



<p>App developers now also incur fees from Apple, and additional controversy surrounds a new one called the Core Technology Fee (CTF). The CTF kicks in only after an app has been downloaded 1 million times — so for the vast majority of apps it will never come into play. But in rare types of situations, it could prove costly. Apple has provided a convenient <a href="https://developer.apple.com/support/fee-calculator-for-apps-in-the-eu/" target="_blank" rel="noreferrer noopener">fee calculator</a> to help developers quickly understand the cost of their app on an alternative marketplace.</p>



<h3 class="wp-block-heading">Options for Workspace ONE customers</h3>



<p>If Workspace ONE customers have concerns about alternative app marketplaces running on corporate devices, Apple has introduced a new Restrictions key available to block these from running on supervised devices. This Restrictions key will be supported in our next Workspace ONE Unified Endpoint Management (UEM) console release. In the meantime, you can also easily deploy this Restriction as a Custom Settings profile using the below XML:&nbsp;</p>



<p>&lt;dict&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;allowMarketplaceAppInstallation&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;false/&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadDisplayName&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;string&gt;Restrictions&lt;/string&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadDescription&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;string&gt;Block Third-Party App Marketplaces&lt;/string&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadOrganization&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;string&gt;&lt;/string&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadType&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;string&gt;com.apple.applicationaccess&lt;/string&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadUUID&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;string&gt;a9f1b84e-6695-4f47-bcfa-e6334228bce1&lt;/string&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadVersion&lt;/key&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;integer&gt;1&lt;/integer&gt;</p>



<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;key&gt;PayloadIdentifier&lt;/key&gt;</p>



<p>&nbsp;&lt;string&gt;786da36c-8283-48cd-9a23-91dde10cf4d3.Restrictions&lt;/string&gt;</p>



<p>&lt;/dict&gt;</p>



<p></p>



<p>For more information on how we implement new profile keys, please see our End-User Computing Blog post introducing the <a href="https://blogs.vmware.com/euc/2022/11/data-driven-ui-in-workspace-one-uem-is-now-coming-for-ios.html" target="_blank" rel="noreferrer noopener">data-driven UI for iOS profiles</a>.&nbsp;</p>



<p>Likewise, the Restrictions profile can be used to remove any suspicious applications from supervised devices via the “Hide Apps” functionality. For more information on ways to block apps on corporate devices with Workspace ONE, <a href="https://techzone.vmware.com/resource/blocking-unwanted-apps-managed-ios-devices" target="_blank" rel="noreferrer noopener">review the tutorial</a> on Tech Zone.</p>



<h2 class="wp-block-heading"><strong>Browser apps and alternative web browser engines in the EU</strong></h2>



<p>iOS 17.4 introduces a new, user-friendly experience for selecting default browsers. Upon first launching Safari on an iOS 17.4 device, users will be prompted to select their default browser from a list of main browser applications available in their market. Apple is also allowing app developers to embed alternative browser engines in their applications, no longer requiring the use of WebKit. In order to leverage an alternative web browser engine, a special developer entitlement is required, along with adherence to extensive security requirements.</p>



<h2 class="wp-block-heading"><strong>Default app controls and expanded interoperability</strong></h2>



<p>To complement these changes, Apple is allowing users to set default app marketplaces and default contactless payment apps. Additionally, Apple has also exposed more than 250,000 developer APIs to provide third-party applications access to core platform technologies, such as device Bluetooth radios, the camera, and the microphone. An interoperability request form must be completed and approved by Apple to access this large swath of APIs.&nbsp;</p>



<h2 class="wp-block-heading"><strong>More changes may be coming</strong></h2>



<p>As things currently stand, Apple has submitted these changes to the EC as their answer to the issues. The EC is assessing the proposals and eliciting feedback from stakeholders. The final solutions that are ultimately implemented could look different from what’s been reported here, and we will endeavor to update you when the final settlement has occurred.</p>



<h2 class="wp-block-heading"><strong>iOS 17.4&nbsp;is available now</strong></h2>



<p>This is just a short summary of all the new technologies and application capabilities available in iOS 17.4. For more in-depth information, please visit Apple’s developer support article, &#8220;<a href="https://developer.apple.com/support/dma-and-apps-in-the-eu/" target="_blank" rel="noreferrer noopener">Update on Apps Distributed in the European Union.</a>&#8220;</p>



<h2 class="wp-block-heading" id="h-additional-resources"><strong>Additional resources&nbsp;&nbsp;</strong></h2>



<p>Read more about these topics:&nbsp;</p>



<ul class="wp-block-list">
<li>Announcement from Apple:&nbsp;<a href="https://www.apple.com/newsroom/2024/01/apple-announces-changes-to-ios-safari-and-the-app-store-in-the-european-union/" target="_blank" rel="noreferrer noopener">&#8220;Apple Announces Changes to iOS, Safari, and the App Store in the European Union&#8221;</a></li>



<li>Reuters article:&nbsp; &#8220;<a href="https://www.reuters.com/technology/apple-offers-settle-eu-antitrust-charges-apple-pay-sources-say-2023-12-12/" target="_blank" rel="noreferrer noopener">Apple Offers to Let Rivals Access Tap-and-Go Tech in EU Antitrust Case</a>&#8220;</li>



<li>Reuters article:&nbsp; &#8220;<a href="Apple Faces 'Strong Action' If App Store Changes Fall Short, EU's Breton Says" target="_blank" rel="noreferrer noopener">Exclusive: Apple Faces &#8216;Strong Action&#8217; If App Store Changes Fall Short, EU&#8217;s Breton Says</a>&#8220;</li>
</ul><p>The post <a href="https://blogs.vmware.com/euc/2024/03/apple-ios-17-4-introduces-updates-including-alternative-app-stores-and-payment-methods.html">Apple iOS 17.4 introduces updates, including alternative app stores and payment methods</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34519</post-id>	</item>
		<item>
		<title>Workspace ONE continues to lead the charts in unified endpoint management</title>
		<link>https://blogs.vmware.com/euc/2024/03/workspace-one-continues-to-lead-the-charts-in-unified-endpoint-management.html</link>
		
		<dc:creator><![CDATA[Aditya Kunduri]]></dc:creator>
		<pubDate>Fri, 08 Mar 2024 02:55:57 +0000</pubDate>
				<category><![CDATA[Announcements]]></category>
		<category><![CDATA[Employee Experience]]></category>
		<category><![CDATA[VMware Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE Unified Endpoint Management]]></category>
		<category><![CDATA[Computerworld]]></category>
		<category><![CDATA[Workspace ONE]]></category>
		<category><![CDATA[Workspace ONE UEM]]></category>
		<guid isPermaLink="false">https://blogs.vmware.com/euc/?p=34457</guid>

					<description><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man using laptop and mobile phone" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div>
<p>In a rapidly evolving digital landscape, managing endpoints effectively has become paramount for enterprises worldwide. With the proliferation of diverse devices and the need for seamless connectivity, organizations are seeking robust solutions to streamline their endpoint management processes. VMware* Workspace ONE, an industry-leading solution within the Broadcom End-User Computing portfolio, continues to be a frontrunner &#8230; <a href="https://blogs.vmware.com/euc/2024/03/workspace-one-continues-to-lead-the-charts-in-unified-endpoint-management.html">Continued</a></p>
<p>The post <a href="https://blogs.vmware.com/euc/2024/03/workspace-one-continues-to-lead-the-charts-in-unified-endpoint-management.html">Workspace ONE continues to lead the charts in unified endpoint management</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div><img width="300" height="200" src="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397.jpeg?w=300" class="attachment-medium size-medium wp-post-image" alt="Man using laptop and mobile phone" style="margin-bottom: 10px;" decoding="async" loading="lazy" srcset="https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397.jpeg 1280w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-300x200.jpeg 300w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-1024x683.jpeg 1024w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-768x512.jpeg 768w, https://blogs.vmware.com/euc/wp-content/uploads/sites/9/2024/02/AdobeStock_537752086-scaled-e1709866162397-600x400.jpeg 600w" sizes="auto, (max-width: 300px) 100vw, 300px" /></div><p>In a rapidly evolving digital landscape, managing endpoints effectively has become paramount for enterprises worldwide. With the proliferation of diverse devices and the need for seamless connectivity, organizations are seeking robust solutions to streamline their endpoint management processes. VMware<sup>*</sup> Workspace ONE, an industry-leading solution within the Broadcom End-User Computing portfolio, continues to be a frontrunner in the unified endpoint management (UEM) domain, offering a comprehensive suite of tools designed to address the complexities of modern IT environments.</p>



<p>The recent industry update by Computerworld sheds light on the emerging trends of enterprise mobility and endpoint management. It highlights the increasing importance of UEM solutions in empowering organizations to navigate the challenges posed by remote work, device diversity, and security threats. Among the various players in the market, Workspace ONE stands out for its innovative approach and comprehensive feature set.</p>



<p>One of Workspace ONE’s key strengths lies in its emphasis on artificial intelligence-driven capabilities. By harnessing the power of AI and machine learning, Workspace ONE delivers predictive analytics, plus intelligent automation and workflows, that enable IT teams to proactively identify and address potential issues before they escalate and impact employee productivity. This predictive approach not only enhances IT efficiency but also strengthens security by preemptively mitigating risks. Recently, Workspace ONE previewed the use of <a href="https://blogs.vmware.com/euc/2023/12/workspace-one-adds-generative-ai-powered-scripting-capabilities-now-available-in-tech-preview.html" target="_blank" rel="noreferrer noopener">GenAI-based scripting capabilities</a>, which significantly reduce the burden on IT.</p>



<p>The UEM vendor comparison chart provided by Computerworld further underscores Workspace ONE’s leadership position in the market. Workspace ONE excels across various parameters, including security features, integration capabilities, and device support. Its robust security framework, encompassing features such as conditional access, encryption, and threat detection, ensures comprehensive endpoint protection and secure application access without compromising user experience. Furthermore, Workspace ONE’s seamless integration with existing IT infrastructure and third-party applications facilitates smooth implementation and interoperability. Whether managing mobile devices, desktops, or IoT endpoints, Workspace ONE provides flexibility and scalability for holistic endpoint management, eliminates costs across silos, and enhances visibility. These capabilities allow IT administrators to manage endpoints and user experiences effectively from one unified solution. With Workspace ONE’s <a href="https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmware-which-cloud-based-management-rises-above-the-rest.pdf" target="_blank" rel="noreferrer noopener">cloud-native platform</a>, Windows PCs can be managed via a modern approach with real-time updates and dashboards, which are critical in a time of remote work and increasing cyberattacks.</p>



<p>VMware Workspace ONE continues to lead the way as a standout performer in the realm of unified endpoint management. With its modern, AI-driven approach, comprehensive feature set, and broad support across all categories, Workspace ONE empowers organizations to embrace digital transformation with confidence. Here, at the End-User Computing Division, we are excited to be your trusted partner in driving efficiency, security, and innovation in the digital era.</p>



<p>Check out the Computerworld article and the vendor comparison charts below:&nbsp;</p>



<ul class="wp-block-list">
<li><a href="https://www.computerworld.com/article/3202649/enterprise-mobility-industry-update.html" target="_blank" rel="noreferrer noopener">Enterprise mobility 2024: Welcome, genAI</a></li>



<li><a href="https://www.computerworld.com/article/3408656/download-uem-vendor-comparison-chart-unified-endpoint-management.html" target="_blank" rel="noreferrer noopener">Download: UEM vendor comparison chart</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>* <em>The End-User Computing (EUC) Workspace ONE solution is referred to by Computerworld as “VMware.” However, Broadcom acquired VMware as of November 23, 2023, and on December 7, 2023, expressed intent to divest EUC. Read more in <a href="https://blogs.vmware.com/euc/2023/12/an-exciting-new-era-for-end-user-computing.html" target="_blank" rel="noreferrer noopener">this post</a> by Shankar Iyer, SVP &amp; GM, End-User Computing Division, Broadcom.</em></p><p>The post <a href="https://blogs.vmware.com/euc/2024/03/workspace-one-continues-to-lead-the-charts-in-unified-endpoint-management.html">Workspace ONE continues to lead the charts in unified endpoint management</a> appeared first on <a href="https://blogs.vmware.com/euc">VMware End-User Computing Blog</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">34457</post-id>	</item>
	</channel>
</rss>
