But it isn't all roses. The growing proliferation of personal devices in the workplace is a bit of an albatross for IT administrators. And, as businesses grapple with complex mobility management challenges arising from the increasing number of smartphone models, conflicting platforms and operating system versions, mobile device management (MDM) and mobile application management (MAM) are emerging and evolving to enable secure smartphone and tablet use in the enterprise. Here we'll take a look at MDM, MAM and how companies can use them to address their IT security concerns - and users' needs.
Mobile Device Management (MDM): Complete Control ... but InvasiveMDM takes complete control of users' devices. It adopts a full-device approach aimed at securing smartphones and tablets. The user is required to provide a pass code to gain secure access to the device and sensitive data. You can remotely wipe a lost or stolen device, as well as track inventory and perform real-time monitoring and reporting. MDM tries to eliminate downtime and reduce costs as well as business risks by protecting the data and configuration settings of all mobile devices in the network.
MDM does not go over so well with employees, however, due to its intrusive nature.
Advantages of MDM:
- Provides the ability to remotely wipe devices for security
- Saves users from the hassle of updating devices and apps. Automatically updates without user permission.
- Controls devices remotely and helps troubleshoot problems
Challenges of MDM:
- Integrating mobile device management with existing IT infrastructures and third-party applications can be a daunting task.
- Needs specific enterprise terms that are acceptable to users
- MDM software and features require rigorous and specialized training.
Mobile Application Management: An Effortless Way to Manage Enterprise AppsMobile application management (MAM) is another option, and one that offers much more refined control. It enables IT administrators to manage and secure apps that were internally developed to be used in business settings on both company-provided and "bring your own" smartphones and tablet computers. For instance, employers can restrict access to the employee's corporate mails without meddling with personal information. MAM can also set limits or curb sharing of corporate data. However, MAM comes with its own set of challenges such as coding for each MAM product, as well as limited availability of apps for each specific platform.
How MAM and MDM Really DifferAuthentication, Network Usage & Support
MAM is not concerned with the device, but with the software that runs on the device. IT administrators can authorize employees with dedicated usernames and passwords, as well as limit app downloads and their use on employee devices.
MDM provides limited or restricted network access to registered devices by employing best practices and privacy control. It also minimizes downtime. MDM aims to provide robust functionality as well as optimum security for mobile networks.
Remote Lock and Wipe
Disgruntled employees can (and sometimes do) abuse corporate data. Not any more. MAM can remove apps from mobile devices, track enterprise applications and discontinue their use when employees leave a company or lose their mobile devices. This prevents indiscreet app usage and protects sensitive information.
With MDM, if a device is not available (in the case of hostile employee or device theft or loss of the mobile device), it can be remotely locked and wiped. (Learn more about discarding computer devices in The Data Security Gap Many Companies Overlook.)
Version Upgrade and Device Configuration
MAM saves you from the hassles of updates as it checks for application version updates. MAM is modified in the context of business function and tracks app versions. MDM adopts a different approach; it configures mobile devices with respect to location and provides access to cloud data if a device is authorized.