March 09, 2018
XenMobile MAM now supports AppConfig Community standards, in addition to Citrix's proprietary MDX toolkit and Office 365 MAM through the Intune Graph API.
August 29, 2017
VMware's support for the Microsoft Graph API for Intune means Workspace One users can manage Office 365 mobile apps directly, without using a separate console.
May 16, 2017
Mobile app analytics and monitoring are the new "it" technologies in end-user computing. Two months after Cisco acquired AppDynamics, VMware has snapped up Apteligent. The deal will bring mobile ...
April 05, 2017
MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan.
MAM Get Started
Bring yourself up to speed with our introductory content
Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets. Continue Reading
Allowing employees to use their own devices for business purposes offers flexibility and convenience, but hospitals must take appropriate measures to secure health data. Continue Reading
Mobile device use in healthcare has created new challenges for hospital IT. Using tools like mobile device management can help secure health data. Continue Reading
Evaluate MAM Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
An assembly of EMM vendors and developers continue their quest to standardize mobile app configuration and management technology across iOS, Android and Windows platforms. Continue Reading
As enterprises expand their mobile footprint, the security risks to their data multiply: an unattended tablet, unsecured Wi-Fi network or malware from a third-party app is all it takes for data loss or a security breach to occur. Protecting just one of these aspects of mobility isn't enough. To address these vulnerabilities, IT executives are now taking a layered approach to mobile security and management. They protect the app layer, for example, with secure containers and the device layer with mobile device management.
In this SearchCIO handbook, Mary K. Pratt lists the tiers of tools and technologies that are increasingly being incorporated into organizations' mobile security strategies. In our second piece, CTO Niel Nickolaisen talks about how delivering good mobile security involves closely examining the risks before heaping on the rules. In our last piece, Features Writer Jason Sparapani catches up with Gartner's Dionisio Zumerle, who talks about how mobile security involves finding a balance between business and user needs.Continue Reading
Learn to apply best practices and optimize your operations.
Managing mobile devices just keeps getting harder. Devices and apps are proliferating. Every data breach seems to prompt new rules. We lay out the problem and a plan. Continue Reading
Hospitals can prevent cybersecurity breaches by managing healthcare assets such as MRI and CT scanners and requiring mobile devices to register with an MDM solution. Continue Reading
Virtual workspace products make employees' desktops, applications and data available to them in the office or remotely. But not every company is well-suited to reap benefits from workspace products. Continue Reading
Problem Solve MAM Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.
This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.
This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading
Better mobile app security in the enterprise starts with a few steps -- protect data confidentiality, integrity and access. Continue Reading
The standardization provided in iOS makes it easier to manage than Android, but Google is quickly catching up with new features such as Android for Work. Continue Reading