Mobile Application Management

November 9, 2012

Keeping aside all the debate going around MAM, MDM & BYOD, let us understand little more in detail what each of these solutions mean and how interrelated all of them are.

To begin with, this post covers Mobile Application Management (MAM) solution. Mobile enablement of organizations has led to the development of mobile applications at a rapid pace. The apps are either developed in house or done through a mobile solution provider. Deployment, monitoring, management and analysis of mobile applications on corporate & personal devices, without compromising the security of the enterprise and user data is the major task for IT departments/ organizations providing this solution.

Mobile Application Management Features

Unified App Management Control: A central control helps apps to be updated, tracked and integrated through a unified control. Application security, policy usage and updates with analytics can be controlled with this unified system.

Enterprise App Store: An app store will provide users and administrators access apps easily. The store has to be designed so that policy changes can be applied dynamically with minimal errors & delays.

Notification Management: A proper notification management has to be in place for the administrators to notify users about app version upgrades, additions or deletions in the app store. Without a notification system, users may end up using obsolete apps.

Security Management: Data is always the king in enterprises. Security of this data is thus of high priority. The security management of a MAM solution has to account for offline access, on device data protection, authentication, document sharing, access restriction among apps and data encryption.

Analytics & Reporting: The analytics is important for the administrators to monitor the usage of apps/ devices in a mobile environment. Standard reports can be configured apart from customized reports based on unique requirements. For example reports based on installed apps user wise, by device type, policy violations, downloads based on user/device/platform can be generated.