It can seem like everyone is speaking a different language when talking to companies offering enterprise mobility security solutions. Some companies will recommend a full EMM or Enterprise Mobility Management suite, others will recommend MDM or mobile device management, and yet others may tell you MAM or mobile application management is just what you need.
Understanding the difference between MDM and MAM is not as confusing as it may seem. By keeping things simple, you can determine which is best for your business and then start to narrow down your choices of software providers.
MAM is for Applications
There are really two levels of security on any mobile device. One is the device itself, and the other is the use of the specific apps on the device. MAM, as the name implies, focuses in on the security of the applications or apps on the device.
One of the most common uses in any business for an end-user is to be able to get to their business email. With MAM, a policy can be set around the security of the access to that email account that runs automatically no matter where or from what device the end-user accesses the system.
The company has their own internal app that the employee accesses from the device to get to the email server. This removes the need to also use a VPN (Virtual Private Network) and can even be set up with rules for the ability to forward an email, share attachments or to have full encryption on the email.
MAM doesn’t run on any app. However, there are an increasing number of MAM applications that are already available for use, with more arriving on the market. Additionally, companies can create their own in-house apps which feature MAM services.
MDM is for Devices
Mobile device management offers the big picture security and management of the device itself. Through the use of MDM policies for use can be set up for endpoints, which is the technical term for the devices such as smartphones and tablets or even laptops and desktops.
The use of MDM allows a company to set policies for use of the endpoints to be in compliance with company regulations or industry standards for accessing or retrieving data and information.
The mobile device management also offers additional features such as passwords for devices, the ability to wipe and lock a device remotely if lost or stolen or if there is a breach on the device, and to even track devices and user access to data through the system. This software can be used to encrypt an entire device, or perhaps specific files and folders, allowing maximum flexibility and security.