What is Mobile Application Management (MAM)? (2024)

By

  • Gary Olsen
  • Colin Steele

What is mobile application management?

Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.

MAM software allows IT administrators to apply and enforce corporate policies on mobile apps and limit the sharing of corporate data among apps. It also enables the separation of business apps and data from personal content on the same device. Other common MAM features and capabilities include software delivery (often through an enterprise app store), software license management, app configuration, inventory management and application lifecycle management.

Why mobile application management is important

Mobile application management provides IT administrators with a more granular way to control and secure corporate data, which is important in any mobile strategy, particularly in bring your own device (BYOD) programs.

Traditionally, IT departments relied on mobile device management (MDM) software, which provides device activation, enrollment and provisioning capabilities, remote wipe and other device-level functionality. This approach sufficed for scenarios where an organization purchased mobile devices for employees who used them only for work-related matters.

This article is part of

What is unified endpoint management (UEM)? A complete guide

  • Which also includes:
  • 7 key benefits of mobile device management for businesses
  • Compare capabilities of Office 365 MDM vs. Intune
  • How to successfully implement MDM for BYOD

But after Apple released the iPhone in 2007, followed by the release of Google Android-powered smartphones, more employees began using their personal devices for work. Many of these employees were reluctant to allow their IT departments to remote wipe their personal devices, blocklist certain apps or use other MDM capabilities. And as the workforce grew more tech-savvy, it became more difficult for organizations to completely block end users from doing work on personal devices. In addition, putting corporate data on personal phones was difficult to secure. As such, these devices and applications went unsecured, which created an enterprise risk.

MAM emerged to help solve this problem. As part of a larger mobile strategy, it allows IT administrators to apply and enforce policies only on specified apps that access corporate data, leaving personal apps and data untouched. Some of MAM's functionality is similar to MDM. With MAM, IT can remote wipe an app -- but not the whole device, as is the case with an MDM-managed device, for example.

How MAM works

There are several different approaches to mobile application management, including the following:

Software development kits (SDKs) and application wrapping. These methods involve additional code being added to an app, either during the use of SDKs or after (app wrapping) the development process. This code connects the app to back-end MAM software, enabling IT administrators to apply and enforce policies on the app and take other measures to protect its data.

Containerization. This approach, also known as application sandboxing, isolates an app or group of apps from other apps on a device. Data within this isolated area, known as a container, cannot leave, and apps within the container cannot interact with those on the outside. An extreme example of containerization is dual persona technology, which creates two separate user interfaces -- one for work and one for personal use -- on the same device.

Device-level MAM. Another method is the ability to control and secure apps through the MDM protocols built into mobile operating systems. Apple's Managed Open In feature, introduced in iOS 7, allows IT to control how apps share data. For example, an admin can prevent a user from downloading a document from their corporate email app and uploading it to a personal cloud storage app. Google Android uses sandboxing to create a secure, managed work profile containing corporate apps and personal data. Samsung offers similar capabilities on its Android devices through its Knox technology.

The major drawback to app wrapping, MAM SDKs and third-party containerization is that they do not always work across all mobile apps, operating systems and devices. The wrapping and SDK approaches require access to an app's source code, which is not always available -- especially for apps in a public app store. And Apple does not allow developers to abstract apps from iOS as containerization and dual persona require.

In response to this challenge, a group of enterprise mobility management (EMM) vendors formed the AppConfig Community in 2016. AppConfig defines tools and best practices that provide an open approach to configuring and securing mobile apps. This benefits users with a better out-of-the-box experience and businesses with secure apps that are easy to integrate. These are seamless to existing MAM systems in the popular unified endpoint management (UEM) products of this community. Members of the AppConfig Community include BlackBerry, SAP, IBM, VMware, Jamf Software, MobileIron, SOTI, Cisco and Meraki.

MAM challenges

While MAM has made great strides, the main challenges today are that MAM product solutions will vary greatly in features and capability. The challenge for IT admins and managers is determining which MAM product to use for their organization's needs. Organizations should consider the following:

  • Security. Mobile devices are spread across a broad footprint, making it easier for users to be vulnerable to phishing and malware attacks. Consider the following recommendations for MAM security solutions:
    • Third-party integration. If your organization has a third-party directory service such as Active Directory, G Suite or AWS, an MAM product must integrate with that service.
    • Mobile security policy. Configuring and managing security via global policies must be available and easily managed. This includes the ability to define and enforce custom rules and apply different rules to different classes of users.
    • Define and apply app-layer security. The user should be required to use secure authentication to access company data via an app. This will help prevent storing company data on a personal device or sharing data with unauthorized apps or users.
  • App containerization. Techniques can vary or may not exist at all. Microsoft's Intune, for example, uses Conditional Access policies rather than containerization. And Conditional Access is only available for Azure AD P1 and P2 licenses, which could affect a decision to use Intune.
  • App catalog delivery. While app catalog management is available in all major products, the implementation can vary. For example, Google Play and Apple's App Store have default public app stores and a custom catalog.
  • App volume license support. The right platform must be able to apply volume licensing and management for applications. While most major products provide this support, product versions may vary. For instance, ManageEngine's Endpoint Central has four editions, but only the Enterprise and UEM editions provide License Management.
  • Mobile operating system platforms. MAM products vary greatly in the mobile systems they support. It's critical for an organization to factor in what types of mobile operating systems it needs to manage.

MAM vs. MDM, EMM and UEM

Mobile application management was available as a standalone product from several vendors in the early days of the BYOD era. As the market matured, however, major enterprise software companies acquired standalone MDM and MAM vendors and began bundling their products. This collection of technologies became known as EMM.

What is Mobile Application Management (MAM)? (1)

The main components of EMM are MDM, MAM and identity and access management. Some vendors also include enterprise file sync and share in their offerings. Although there was some MAM vs. MDM debate initially, it's common for organizations to rely on a combination of them to meet their security and IT administration requirements. An IT department may use MDM to enforce basic security measures, such as using a device passcode, and then rely on MAM for app protection to prevent data leakage from business apps, for example.

UEM evolved from EMM products because organizations needed a way to manage all their endpoints -- including desktops and laptops -- from one tool. Most UEM platforms can manage Windows and macOS devices, smartphones and tablets. Many existing EMM vendors combined their products with other tools to allow for hybrid management of desktops and mobile devices or added desktop management to their mobility management offerings.

Major vendors and products

Despite the abundance of UEM products available today, a few have risen to the top, including Microsoft, VMware, Ivanti and IBM. Others, such as BlackBerry, Citrix and MobileIron, remain popular alternatives. While less common, some vendors focus solely on MAM or enterprise app stores, including Digital.ai App Management, Appaloosa and App47.

This was last updated in February 2023

Continue Reading About mobile application management (MAM)

  • Understand how UEM, EMM and MDM differ from one another
  • How to evaluate mobile application management software

Related Terms

iOS software development kit (iOS SDK)
The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system ...Seecompletedefinition
smartphone addiction (cellphone addiction)
Smartphone addiction (cellphone addiction) is a disorder involving compulsive overuse of mobile devices, usually quantified as ...Seecompletedefinition
technology addiction
Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...Seecompletedefinition

Dig Deeper on Mobile management

  • enterprise mobilityBy: ColinSteele
  • What is unified endpoint management (UEM)? A complete guideBy: NickSchmiedicker
  • Compare capabilities of Office 365 MDM vs. IntuneBy: Petervan der Woude
  • How to perform a remote wipe of Office 365 on a smartphoneBy: MichaelGoad
What is Mobile Application Management (MAM)? (2024)
Top Articles
How to Make Money Recycling eWaste - We Buy Used IT Equipment
What Is GUI? Graphical User Interfaces, Explained
$4,500,000 - 645 Matanzas CT, Fort Myers Beach, FL, 33931, William Raveis Real Estate, Mortgage, and Insurance
Rubratings Tampa
Yogabella Babysitter
St Petersburg Craigslist Pets
Craigslist Portales
Terraria Enchanting
Tap Tap Run Coupon Codes
سریال رویای شیرین جوانی قسمت 338
Www.paystubportal.com/7-11 Login
Fire Rescue 1 Login
How To Delete Bravodate Account
How Many Cc's Is A 96 Cubic Inch Engine
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Keniakoop
Springfield Mo Craiglist
272482061
Wal-Mart 140 Supercenter Products
Nesz_R Tanjiro
Craigslist Pinellas County Rentals
Morristown Daily Record Obituary
Drift Boss 911
How Taraswrld Leaks Exposed the Dark Side of TikTok Fame
Asteroid City Showtimes Near Violet Crown Charlottesville
Gilchrist Verband - Lumedis - Ihre Schulterspezialisten
Wrights Camper & Auto Sales Llc
Cfv Mychart
3 Ways to Drive Employee Engagement with Recognition Programs | UKG
Section 408 Allegiant Stadium
Eero Optimize For Conferencing And Gaming
47 Orchid Varieties: Different Types of Orchids (With Pictures)
O'reilly Auto Parts Ozark Distribution Center Stockton Photos
Southern Democrat vs. MAGA Republican: Why NC governor race is a defining contest for 2024
Pillowtalk Podcast Interview Turns Into 3Some
Marie Peppers Chronic Care Management
Ukg Dimensions Urmc
Boggle BrainBusters: Find 7 States | BOOMER Magazine
Dr Adj Redist Cadv Prin Amex Charge
Emerge Ortho Kronos
How to Print Tables in R with Examples Using table()
Lacy Soto Mechanic
Craigslist Malone New York
Craigslist Farm And Garden Reading Pa
Swoop Amazon S3
Professors Helpers Abbreviation
How to Connect Jabra Earbuds to an iPhone | Decortweaks
Mcoc Black Panther
Windy Bee Favor
Rheumatoid Arthritis Statpearls
Helpers Needed At Once Bug Fables
Optimal Perks Rs3
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6521

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.