fitgap

Unisys Unified Endpoint Management

Features
Ease of use
Ease of management
Quality of support
Affordability
Market presence
Take the quiz to check if Unisys Unified Endpoint Management and its alternatives fit your requirements.
Pricing from
Contact the product provider
Free Trial unavailable
Free version unavailable
User corporate size
Small
Medium
Large
User industry
  1. Public sector and nonprofit organizations
  2. Transportation and logistics
  3. Manufacturing

What is Unisys Unified Endpoint Management

Unisys Unified Endpoint Management is an endpoint management offering used to administer and secure fleets of user devices across an organization. It supports common UEM use cases such as device enrollment, configuration policy enforcement, application distribution, and compliance reporting for enterprise endpoints. The product is typically used by IT operations and security teams that need centralized control over endpoints as part of broader workplace and infrastructure services. It is positioned as part of Unisys’ enterprise IT services and solutions portfolio rather than a standalone SMB-focused RMM tool.

pros

Centralized endpoint policy control

Provides a single administrative approach for enforcing configuration and compliance policies across managed endpoints. This helps standardize device settings and reduce manual configuration work. Centralized controls are useful for organizations managing multiple device types and user groups. It aligns with enterprise governance requirements where consistent policy enforcement is a priority.

Enterprise services alignment

Fits into Unisys’ broader enterprise IT and workplace services model, which can simplify procurement and operational ownership for customers already using Unisys. This can be beneficial when endpoint management is delivered as part of a managed service. It supports use cases where organizations prefer an integrated vendor relationship for endpoint operations. The approach can reduce the need to stitch together multiple providers for delivery and support.

Security and compliance use cases

Supports endpoint security administration needs commonly associated with UEM programs, such as compliance monitoring and policy-based controls. This is relevant for regulated environments that require auditable device posture and standardized configurations. It can help operationalize endpoint governance alongside IT operations. The focus is more on management and compliance workflows than on replacing dedicated endpoint detection tools.

cons

Limited public feature transparency

Publicly available documentation and detailed feature matrices are less comprehensive than many widely adopted endpoint management platforms. This can make it harder to validate OS coverage, integrations, and advanced capabilities during early-stage evaluation. Buyers may need direct vendor engagement to confirm requirements such as patching depth, scripting, and API access. It can slow down competitive comparisons and proof-of-concept planning.

Less SMB/RMM oriented

The product is not typically positioned as an all-in-one RMM platform for MSP-style workflows (e.g., PSA/ticketing tight coupling, technician-centric automation, or per-endpoint pricing transparency). Organizations seeking lightweight deployment and rapid self-service onboarding may find the model less aligned. It is generally better suited to enterprise IT and managed service delivery contexts. This can be a limitation for smaller teams prioritizing simplicity and quick time-to-value.

Endpoint protection scope unclear

While it addresses endpoint management and compliance controls, the extent of built-in endpoint protection capabilities (beyond policy enforcement) is not always clearly delineated in public materials. Organizations may still require separate tools for advanced threat detection and response, depending on their security requirements. This can introduce additional integration and operational overhead. Buyers should confirm how it complements existing security stacks and what telemetry or response actions are supported.

Plan & Pricing

Pricing model: Custom / Contact Unisys sales (no public list price found on vendor site)

Free plan/trial: No permanent free tier or time-limited free trial published on the product pages (see notes).

Notes:

  • Unisys Unified Endpoint Management is described as an enterprise-scale managed/consulting service; the website presents solution overview, benefits, client stories and analyst recognition but does not publish per-user or per-device pricing or public plan tiers.
  • Site invites customers to engage (assessments, contact us) for tailored engagements and pricing rather than offering self-serve subscription tiers.

Seller details

Unisys Corporation
Blue Bell, Pennsylvania, USA
1986
Public
https://www.unisys.com/
https://x.com/Unisys
https://www.linkedin.com/company/unisys/

Tools by Unisys Corporation

Unisys Digital Workplace Solutions
Unisys Data Transformation
Unisys Stealth(core)
Unisys Attack Surface Discovery
Unisys ClearPath AIS
Unisys ClearPath MCP
Unisys ClearPath OS 2200
Unisys ClearPath Visual IDE
Unisys Data Center Management
Unisys Data Exchange
Unisys Device Subscription Service (DSS)
Unisys Experience-as-a-Service (XaaS)
Unisys Next-Gen Service Desk
Unisys Stealth(identity)
Unisys Sustainable Workplace
Unisys Unified Endpoint Management
Unisys Workplace-as-s-Service

Popular categories

All categories