9 Enterprise Mobility Management Tools For IT Pros

...

Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. These nine options were featured in Gartner's 2016 Magic Quadrant for Enterprise Mobility Management Suites and serve as a starting point to help you find the right tools for your IT needs.

Enterprise mobility management software (EMM) provides companies with a way to control how smartphones and tablets interact with enterprise infrastructure. Such oversight is essential for ensuring the security of corporate information.

In its 2016 Magic Quadrant for Enterprise Mobility Management Suites, released in June, Gartner identified several key capabilities to look for in EMM suites. These include mobile device management, mobile application management, and mobile content management.

Mobile device management (MDM) offers a way to manage devices, such as mobile phones and tablets, over their lifecycles. It includes features such as inventory tracking, operating system configuration management, provisioning, deprovisioning, remote wiping, and remote control.

Mobile application management (MAM) allows administrators to control apps on devices, app updates, and app policies. The importance of MAM rises when companies have a significant number of internal apps they need to maintain. Also, organizations dealing with a large number of employee-owned devices may find managing applications to be more palatable to employees than giving IT control of their devices.

[ How can you keep your data safe? Read 10 Hot Security Technologies Enterprises Need Now. ]

Mobile content management (MCM) is a bit more specific than the other two categories, allowing administrators to define rules governing how corporate content gets distributed and handled in order to meet compliance policies.

EMM suites may have mobile identity and access management (IAM) capabilities as well, to facilitate the installation of certificates for users and devices, for app code signing, and for enforcing security controls through contextual data.

Some vendors approach EMM through containerization – isolating corporate data in a secure area – while others rely on policy controls, a method which tends to provide a better user experience.

Choosing the right EMM suite requires IT organizations to understand their needs and the capabilities of the various options. EMM software may, for example, require integration of vendor-specific APIs, which may not appeal to every company.

IT organizations should start by asking questions about things like device ownership, mobile operating system support, the kinds of applications supported, and whether different users require different access rights and capabilities.

Security should receive special consideration. While EMM, as the abbreviation suggests, is about management, the purpose of management tools isn't merely to save IT teams from onerous repetitive provisioning work. It's to protect valuable corporate data and brand reputation. IT personnel should make sure their organization's data-protection requirements align with capabilities of their EMM software.

What follows are nine EMM vendors singled out by Gartner for leadership and vision. IT professionals using EMM suites may have different ideas about what works for them. For example, the handful of IT professionals reviewing Cisco Meraki Systems Manager through Gartner Peer Reviews gave the software a higher average score (4.6 out of 5) than EMM suites placed at better positions in Gartner's Magic Quadrant. So, consider Gartner's advice as a starting point, rather than an answer to all your organization's mobility management challenges. There's no substitute for due diligence.

Once you've reviewed the options here, tell us about your own enterprise mobility management experiences. Have you tried any of these tools? Are there other solutions -- either technological or cultural -- that have worked in your organization? Share your experiences in the comments section below.

Categories
APPLICATIONS
0 Comment

Leave a Reply

Captcha image


RELATED BY

  • 5300c769af79e

    KeepSolid VPN Unlimited (for Android)

    The KeepSolid VPN Unlimited app secures your Android from prying eyes looking at your Internet traffic and offers several advanced tools to keep you safe.A feature of the KeepSolid's pricing that I really like is the week-long Vacation plan for $1.
  • 5300c769af79e

    Play Video in Background With Chrome Beta for Android

    The latest Chrome Beta for Android lets users play Web videos in the background.Simply open the mobile Chrome browser, start playing a Web video, and return to the phone's home screen or open another application without losing audio.
  • 5300c769af79e

    US Pushes Cybersecurity Acquisition Tools as Contracts Flow

    While those requirements remain in force, federal agencies, especially the General Services Administration, are trying to improve the processing of cyberprotection acquisitions through expansions or enhancements to various federal procurement vehicles.The administration last month revealed it had engaged Adobe for a "new, government-wide enterprise software acquisition agreement for best-in-class, data-centric security and electronic signature solutions.
  • 5300c769af79e

    Congress Eyes Regulations for Stingray Phone Trackers

    Not the fish, but the bulky devices that let law enforcement agencies imitate cell phone towers to intercept communications, sometimes without the need for court permission.If a suspect's phone connects to a stingray, it can capture geolocation data and other information, according to the report.