Mobile application management (MAM) has put MDM in its place

05.06.2012

The bottom line is, the interests of the user, the application developer and the IT manager have been changed, fundamentally and permanently, by mobility and the ubiquity and unconscious portability of mobile devices. Core business processes -- and business itself -- have been transformed by , tablets and their applications, and by movements like the consumerization of IT and (bring your own device).

Consumer technology has leapfrogged business IT, and that's not going to change anytime soon. BYOD underscores the uniquely personal nature of these tools: the fact that the users' spouse or kids gave them that mobile device on their birthday -- that they customize it themselves and it's uniquely theirs -- only makes those devices more integrated into, and more useful for, their work lives.

I won't argue with the assertions that corporate data and IT assets must be protected from -- whether from hackers, former employees, or the physical loss of the device -- nor that issues like , authorization control, compliance reporting, etc., aren't fundamental to a successful enterprise mobile infrastructure.

And it's obvious that certain environments -- military, financial services and applications come to mind -- almost always demand an uncompromising commitment to a purely secure approach, whether MDM or MAM+MDM. In addition, places where the risk of device theft or loss is high -- like the used at store kiosks -- demand features like device wipe to keep corporate data and apps from being jeopardized.