May 16, 2017
Mobile app analytics and monitoring are the new "it" technologies in end-user computing. Two months after Cisco acquired AppDynamics, VMware has snapped up Apteligent. The deal will bring mobile ...
April 05, 2017
MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan.
January 16, 2017
Citrix XenMobile mobile device management policies, features and mobile apps will soon be available to Microsoft shops as an Intune add-on.
January 11, 2017
Mobile application management vendor Apperian will operate as a subsidiary of Arxan Technologies following its acquisition. The companies today announced the deal, which SearchMobileComputing ...
MAM Get Started
Bring yourself up to speed with our introductory content
Managing mobile devices just keeps getting harder. Devices and apps are proliferating. Every data breach seems to prompt new rules. We lay out the problem and a plan. Continue Reading
SAP HANA Cloud Platform, mobile service for app and device management (formerly known as SAP Mobile Secure) is a mobile management tool for security. Continue Reading
As enterprises expand their mobile footprint, the security risks to their data multiply: an unattended tablet, unsecured Wi-Fi network or malware from a third-party app is all it takes for data loss or a security breach to occur. Protecting just one of these aspects of mobility isn't enough. To address these vulnerabilities, IT executives are now taking a layered approach to mobile security and management. They protect the app layer, for example, with secure containers and the device layer with mobile device management.
In this SearchCIO handbook, Mary K. Pratt lists the tiers of tools and technologies that are increasingly being incorporated into organizations' mobile security strategies. In our second piece, CTO Niel Nickolaisen talks about how delivering good mobile security involves closely examining the risks before heaping on the rules. In our last piece, Features Writer Jason Sparapani catches up with Gartner's Dionisio Zumerle, who talks about how mobile security involves finding a balance between business and user needs.Continue Reading
Evaluate MAM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
An assembly of EMM vendors and developers continue their quest to standardize mobile app configuration and management technology across iOS, Android and Windows platforms. Continue Reading
Having more diverse devices in your organization calls for a unified endpoint management approach. Vendors from BlackBerry to Citrix now offer UEM tools. Continue Reading
Learn to apply best practices and optimize your operations.
Hospitals can prevent cybersecurity breaches by managing healthcare assets such as MRI and CT scanners and requiring mobile devices to register with an MDM solution. Continue Reading
Virtual workspace products make employees' desktops, applications and data available to them in the office or remotely. But not every company is well-suited to reap benefits from workspace products. Continue Reading
Other vendors get more attention, but Amazon has quietly built a large portfolio of enterprise mobility services. This issue’s cover story looks at how the cloud-computing giant could make waves with its management, data synchronization and app development tools. Experts say its popular infrastructure services will be a big draw for customers looking to go mobile.
This month's columns explain why infrastructure admins need to get on board with enterprise mobility and when IT should think about outsourcing mobile support tasks. Jack Madden takes a deep dive into the choice between native, Web and hybrid apps. And in the wake of IBM InterConnect and Mobile World Congress, our editors take a look at what Big Blue is up to in the mobile market.Continue Reading
Problem Solve MAM Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.
This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.
This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading
Better mobile app security in the enterprise starts with a few steps -- protect data confidentiality, integrity and access. Continue Reading
The standardization provided in iOS makes it easier to manage than Android, but Google is quickly catching up with new features such as Android for Work. Continue Reading