Infographic: When to use MDM, MAM, and other EMM techniques
Ever since I wrote my book (all the way back in 2013!),
it’s been my goal to help IT pros understand the world of enterprise mobility management. These days there are a lot of different technologies out there, and plenty of buzzwords.
You can read my articles on topics like mobile app management, Android enterprise, Samsung Knox, iOS mobile device management, the extended enterprise, mobile threat defense, and BYOD, and you can look over my list of EMM resources, but in this infographic, it’s my goal to lay everything out in one easy to read, information-rich table.
Note that this infographic is a pre-1.0 version. If you have suggestions, or want to argue a point that I made, or hopefully want to tell me that you found it to be useful, feel free to comment and let me know—I’d love your feedback!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
What’s in the chart? There are four main categories of use cases:
- Work only: Kiosks and embedded devices, and locked-down corporate devices.
- Mixed work and personal devices, enrolled in MDM: Corporate-owned, personally-enabled (COPE) devices enrolled in MDM, and BYOD devices enrolled in MDM.
- Mixed usage devices, not enrolled: COPE without MDM (yes, it happens a lot, especially by accident!), and BYOD without MDM. Sometimes these are known as MAM-only.
- Extended enterprise: Contractors, gig workers, and consumers.
There are several categories of technologies. First, there are EMM features built into devices:
- Android enterprise: Corporate-owned, single use (COSU), Android work devices, and Android work Profiles.
- Samsung Knox: Knox platform capabilities (like all the hardening and hardware-level stuff), Knox containers, and Knox Configuration and Customization
- Apple: iOS MDM, Device Enrollment Program, and Supervised mode.
Then there are EMM features built into apps, including third-party email clients, MAM SDKs, and app wrapping technologies.
Under mobile threat defense, I’ve included mobile app reputation services (MARS) and using it to blacklist apps; as well as mobile threat defense itself and device attestation.
Finally, the infographic considers scenarios where IT gets to determine hardware requirements and choose devices, and scenarios where IT has to deal with anything that walks in the door.