Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

What's the difference between MDM, MAM, EMM and UEM?

Lucas Mearian | July 11, 2017
Here's how to manage corporate PCs, laptops, smartphones and tablets, whether they're company owned or not

The difference between mobile management policies and technologies may come down to degrees of control, but deploying the wrong strategy can cost companies monetarily and kill employee morale.

When bring-your-own-device (BYOD) strategies first emerged several years ago, many corporations made device wiping a key goal; after all, the ability to delete data from an employee's smartphone or tablet appeared, on the surface, to be the best way to stop leaks or the misuse of sensitive information.

So, as employees, particularly senior-level workers, began demanding mobile devices for business use, IT often turned to either company-owned hardware or restrictive mobile device management (MDM) software.

 

Mobile Device Management

MDM allows IT to remotely enroll an employee or corporate-issued cell phone, tablet or other device and then track it, manage it and secure it through a profile specific to that employee and their tasks.

MDM lets a company provision and configure Wi-Fi access, install and manage enterprise apps such as email, and address any problems that arise on a device. It also allows IT to enforce device security, which can include locking out a device and wiping data if it's lost or an employee leaves a company.

mobile device management 
Click for larger image. Credit: Gartner

(MDM policies typically involve having an employee sign an agreement allowing  the company to delete data under those circumstances.)

One hitch in that scenario: Most employees are happier using their own mobile devices and don't like the idea of all their data, including personal photos and messages, being deleted.

Not only can MDM be overly invasive, it can also be wasteful. Many companies often over buy MDM software, expecting to use licenses for all employees. But they end up  using licenses for a far smaller percentage of workers, according to research firm Gartner.

 

Mobile Application Management

There's a more targeted solution: mobile application management (MAM). This strategy locks down enterprise applications and the data associated with them -- not the devices themselves.

In short, MAM allows a company to control access to business applications and the content associated with them without controlling the entire physical device.

 mobile device management
Click for larger image. Credit: Gartner

While corporate email is the most widely deployed form of MAM, employees may also be given secure access to a menu of applications, such as sales support, cloud storage or collaboration tools. Features such as copy and paste can also be limited, preventing employees from sharing corporate data with unapproved applications.

MAM allows IT to control just the access to and features of applications. That way, if an employee loses a device or leaves the company, the access to applications and business data can be removed from the smartphone, tablet or laptop, leaving  personal data intact. MAM also allows applications to be remotely updated with new features and patches, making it easier to address new security threats quickly.

 

1  2  Next Page 

Sign up for MIS Asia eNewsletters.