{"id":119975,"date":"2022-08-22T09:00:00","date_gmt":"2022-08-22T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=119975"},"modified":"2025-06-19T06:36:25","modified_gmt":"2025-06-19T13:36:25","slug":"microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/","title":{"rendered":"Microsoft recognized as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Unified Endpoint Management Tools"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">This month, Microsoft has been <a href=\"https:\/\/www.gartner.com\/reprints\/?id=1-2AOBYKDE&amp;ct=220726&amp;st=sb\" target=\"_blank\" rel=\"noreferrer noopener\">recognized by Gartner\u00ae<\/a> as a Leader in the 2022 Magic Quadrant\u2122 for Unified Endpoint Management (UEM) Tools. This blog post outlines the \u201cso what\u201d for IT leaders, and why we believe this Gartner analysis deserves your focus right now.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">As you see in the Magic Quadrant\u2122 in Figure 1, Microsoft is positioned as a Leader in the 2022 Magic Quadrant\u2122 for Unified Endpoint Management Tools. You will also see that Microsoft is highest on the \u201cAbility to Execute\u201d axis. Microsoft was also recognized as a Leader in the 2021 Magic Quadrant\u2122 for Unified Endpoint Management Tools.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"980\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/Picture1-62fabcac96dc6-980x1024.png\" alt=\"The Gartner Magic Quadrant for Unified Endpoint Management Tools showed Microsoft as a Leader and highest on the Ability to Execute axis.\" class=\"wp-image-119990\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/Picture1-62fabcac96dc6-980x1024.png 980w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/Picture1-62fabcac96dc6-287x300.png 287w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/Picture1-62fabcac96dc6-768x803.png 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/Picture1-62fabcac96dc6.png 1065w\" sizes=\"auto, (max-width: 980px) 100vw, 980px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Figure 1. Magic Quadrant\u2122 for Unified Endpoint Management Tools<\/em>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"why-customers-choose-microsoft-for-uem\">Why customers choose Microsoft for UEM<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Let me summarize three reasons we hear from customers as to why they see Microsoft as a dependable and cost-effective solution for UEM.<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"wp-block-list-item\"><a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-endpoint-manager\">Microsoft Endpoint Manager<\/a> is the native Microsoft solution, providing deep integration with Microsoft 365 and Microsoft Azure to improve employee security and the IT administrator experience. Seamlessly integrating management, identity, and security with your employees\u2019 digital experience has two advantages. It improves employee satisfaction as their workplace tools don\u2019t need them to juggle multiple security add-ons. Further, it reduces the amount of platform integration your IT team needs to do, allowing IT to focus on higher-order priorities and save money. Microsoft 365 integration is an ongoing project for us: our <a href=\"https:\/\/aka.ms\/mem\/advmgtstarts\">advanced endpoint management strategy<\/a> means we are bringing more solutions into the Microsoft 365 platform, driving down the number of add-ons you need to integrate.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Customers like being in control of when they migrate to the cloud. The improvements we have made in tenant attach and hybrid Microsoft Azure Active Directory (Azure AD) mean that customers can have many choices in how to co-manage their devices. This puts the customer firmly in control. The accelerated shift to hybrid work in the past two years has taught us that there is no \u201cone size fits all\u201d for digital transformation. Some organizations are now fully remote and in the cloud; others have leaders that are very keen on a full return to the office. Many are in between. Microsoft Endpoint Manager capabilities accommodate all scenarios, leaving customers in control.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">Customers are reassured by Microsoft\u2019s ongoing investments in Endpoint Manager. We continue to improve the IT administrator experience and the experience for frontline workers, as well as integrate with Azure Virtual Desktop, Windows 365, and Microsoft Defender for Endpoint. Other recent innovations include new support for managing <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-endpoint-manager-blog\/microsoft-endpoint-manager-adds-management-and-compliance-checks\/ba-p\/2902346\" target=\"_blank\" rel=\"noreferrer noopener\">Linux desktops<\/a> (currently in preview), <a href=\"https:\/\/docs.microsoft.com\/mem\/intune\/apps\/lob-apps-macos-dmg\" target=\"_blank\" rel=\"noreferrer noopener\">macOS enhancements<\/a> such as support for DMG and other apps, <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-endpoint-manager-blog\/remote-help-enterprise-grade-assistance-tool-now-available\/ba-p\/3275792\" target=\"_blank\" rel=\"noreferrer noopener\">remote help<\/a>, and <a href=\"https:\/\/docs.microsoft.com\/mem\/analytics\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">Endpoint analytics<\/a> such as work-from-home readiness and other reports to power a hybrid workforce. We look forward to sharing further advances soon.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"continued-momentum-for-microsoft-endpoint-manager\">Continued momentum for Microsoft Endpoint Manager<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">Strong rationale from analysts and customers is backed up by metrics. As our Chief Executive Officer (CEO) Satya Nadella revealed on our Q3 2022 earnings call, \u201c<em>the number of Windows, Android, and iOS devices protected by [Microsoft] Intune grew over 60 percent year over year<\/em>.\u201d More broadly, \u201c<em>the number of customers who trust our security solutions grew nearly 50 percent year over year to 785,000<\/em>.\u201d We work with our industry-leading more than 15,000 partners to analyze 24 trillion threat signals a day to keep customers like Domino\u2019s Pizza, Fujitsu, Heineken, and Petronas safe.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">So, I would encourage you to read the <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2AOBYKDE&amp;ct=220726&amp;st=sb\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner\u00ae report<\/a> and explore what actions you should take. Specifically, customers looking for a dependable, cost-effective solution in three specific situations may find it particularly relevant:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"wp-block-list-item\">If you are spending too much time managing third-party security plug-ins. Simplifying your endpoint management vendors could free up your time for other priorities.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If your security, identity, or management software vendors are influencing the timing of your migration to the cloud. The ability to migrate at your own pace remains critical.<\/li>\n\n\n\n<li class=\"wp-block-list-item\">If you selected your UEM vendor prior to the shift to hybrid work. The pandemic changed requirements for many customers and initiated deep investments to meet those new needs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">You are invited to read the&nbsp;full <a href=\"https:\/\/www.gartner.com\/doc\/reprints?id=1-2AOBYKDE&amp;ct=220726&amp;st=sb\" target=\"_blank\" rel=\"noreferrer noopener\">2022 Magic Quadrant\u2122 for Unified Endpoint Management Tools report<\/a>.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We believe any recognition from independent external analysts is an important milestone in building the best product we can; we thank our customers and partners for being on this journey with us.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"wp-block-paragraph\">Gartner, Magic Quadrant for Unified Endpoint Management Tools, Tom Cipolla, Dan Wilson, Chris Silva, Craig Fisler. August 1, 2022.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Gartner and Magic Quadrant are registered trademarks and service marks of Gartner, Inc. and\/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Microsoft. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools. This blog post outlines the \u201cso what\u201d for IT leaders, and why we believe this Gartner analysis deserves your focus right now.<\/p>\n","protected":false},"author":162,"featured_media":120155,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","ms-ems-related-posts":[],"footnotes":""},"post_tag":[3769],"threat-intelligence":[],"content-type":[3662],"job-role":[],"product":[3690,3694],"topic":[3665,3672],"coauthors":[2700],"class_list":["post-119975","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","tag-gartner-magic-quadrant","content-type-news","product-microsoft-defender","product-microsoft-defender-for-endpoint","topic-analyst-reports","topic-endpoint-security","review-flag-1694638265-576","review-flag-1-1694638265-354","review-flag-and-o-1694638265-458","review-flag-gartn-1694638272-278","review-flag-integ-1694638263-281","review-flag-new-1694638263-340","review-flag-percent"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-22T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-19T13:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michael Wallent\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Wallent\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/michael-wallent\/\",\"@type\":\"Person\",\"@name\":\"Michael Wallent\"}],\"headline\":\"Microsoft recognized as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Unified Endpoint Management Tools\",\"datePublished\":\"2022-08-22T16:00:00+00:00\",\"dateModified\":\"2025-06-19T13:36:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\",\"keywords\":[\"Gartner Magic Quadrant\"],\"articleSection\":[\"Cybersecurity\",\"Endpoint security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\",\"name\":\"Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\",\"datePublished\":\"2022-08-22T16:00:00+00:00\",\"dateModified\":\"2025-06-19T13:36:25+00:00\",\"description\":\"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png\",\"width\":1200,\"height\":900,\"caption\":\"Two people looking at a computer monitor of Microsoft Endpoint Manager.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft recognized as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Unified Endpoint Management Tools\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b\",\"name\":\"Christine Barrett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g\",\"caption\":\"Christine Barrett\"},\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog","description":"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog","og_description":"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/","og_site_name":"Microsoft Security Blog","article_published_time":"2022-08-22T16:00:00+00:00","article_modified_time":"2025-06-19T13:36:25+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","type":"image\/png"}],"author":"Michael Wallent","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","twitter_misc":{"Written by":"Michael Wallent","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/michael-wallent\/","@type":"Person","@name":"Michael Wallent"}],"headline":"Microsoft recognized as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Unified Endpoint Management Tools","datePublished":"2022-08-22T16:00:00+00:00","dateModified":"2025-06-19T13:36:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/"},"wordCount":923,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","keywords":["Gartner Magic Quadrant"],"articleSection":["Cybersecurity","Endpoint security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/","name":"Microsoft is a Leader in 2022 Gartner Magic Quadrant for UEM | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","datePublished":"2022-08-22T16:00:00+00:00","dateModified":"2025-06-19T13:36:25+00:00","description":"This month, Microsoft has been recognized by Gartner as a Leader in the 2022 Magic Quadrant for Unified Endpoint Management Tools.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2022\/08\/1200x900.png","width":1200,"height":900,"caption":"Two people looking at a computer monitor of Microsoft Endpoint Manager."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/08\/22\/microsoft-recognized-as-a-leader-in-the-2022-gartner-magic-quadrant-for-unified-endpoint-management-tools\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft recognized as a Leader in the 2022 Gartner\u00ae Magic Quadrant\u2122 for Unified Endpoint Management Tools"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/person\/2ff2415cead9cfdb4ed02f46f3584c8b","name":"Christine Barrett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g83aac17c934e01fa04078f828a81e7db","url":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b728cebb84f75806ceab2b73f36f13d6472995e75fce66ebee75df4e6e5c0f85?s=96&d=microsoft&r=g","caption":"Christine Barrett"},"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/christinebarrett\/"}]}},"bloginabox_animated_featured_image":null,"bloginabox_display_generated_audio":false,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/119975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=119975"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/119975\/revisions"}],"predecessor-version":[{"id":139656,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/119975\/revisions\/139656"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/120155"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=119975"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/post_tag?post=119975"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=119975"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=119975"},{"taxonomy":"job-role","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/job-role?post=119975"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/product?post=119975"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=119975"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=119975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}