The Evolution of Enterprise Mobility Management
A good article to understand MDM, MAM and MCM. There are different ways to protect apps and data. You can either use one of the mentioned solutions and build app containers, or use MDM capabilities to deploy the OS-based app management that is available on iOS and Android (Android for Work capable devices). Of course, it restricts you to these two OSs and you need an MDM agent on the device which is not always wanted for BYOD scenarios. Please contact me if you would like to know more.
Before the days of smartphones and tablets, IT departments had full control of the authorized devices that connected to enterprise networks. They set policies for which types of computers could be used in the workplace, how they could connect to the network and what types of protections they needed to remain secure.
That control was upended by the mobile revolution. Enterprise devices were connecting to the network alongside the personal devices of users and visitors, presenting varying degrees of security. While users loved the new capabilities their smartphones and tablets offered, this change created a nightmare for IT staff to manage.
As the precursor to enterprise mobility management (EMM), mobile device management brought calm to the chaos. With MDM software, IT departments were able to monitor and secure devices, whether they were organization- or user-owned. They could establish policies that users had to comply with before connecting devices to the network. They could…
Read the entire article from BizTech here: The Evolution of Enterprise Mobility Management