What is Mobile Device Management (MDM)? | Definition from TechTarget (2024)

By

  • Will Kelly
  • Erica Mixon
  • Colin Steele

What is mobile device management?

Mobile device management (MDM) software allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.

MDM is a core component of enterprise mobility management (EMM) and unified endpoint management (UEM), which aims to manage all endpoint devices with a single console. These platforms include mobile application management (MAM) tools, identity and access management, and enterprise file sync and share. The intent of MDM is to optimize the functionality and security of mobile devices within the enterprise while protecting the corporate network.

Modern enterprise mobility products support iOS and Android smartphones, tablets; Windows and macOS laptops, desktops; and even some internet of things (IoT) devices.

How mobile device management works

Mobile device management relies on endpoint software called an MDM agent and an MDM server that lives in the cloud.

IT administrators configure policies through the MDM server's management console, and the server then pushes those policies over the air to the MDM agent on the device. The agent applies the policies to the device by communicating with application programming interfaces (APIs) built directly into the device operating system.

This article is part of

What is unified endpoint management (UEM)? A complete guide

  • Which also includes:
  • 7 key benefits of mobile device management for businesses
  • Compare capabilities of Office 365 MDM vs. Intune
  • How to successfully implement MDM for BYOD

Similarly, IT administrators can deploy applications to managed devices through the MDM server.

What is Mobile Device Management (MDM)? | Definition from TechTarget (1)

BYOD mobile device management

Mobile device management software emerged in the early 2000s to control and secure the personal digital assistants and smartphones that business workers began to use. The consumer smartphone boom that started with the launch of the Apple iPhone in 2007 led to the bring your own device (BYOD) trend, which fueled further interest in MDM.

Deploying MDM in a BYOD environment introduces some challenges. Organizations must balance IT's need to secure corporate apps and data with the end user's need to maintain privacy. Users are often concerned with IT's ability to monitor their actions on a mobile device, but privacy settings can help alleviate those concerns.

Organizations can use other methods to maintain user privacy while deploying MDM for BYOD environments. Some MDM platforms offer app wrapping, which provides a secure wrapper on mobile apps and enables IT to enforce strong security controls. For Android devices, organizations can use Android Enterprise, Google's enterprise mobility program that integrates with leading MDM platforms. Android Enterprise offers separate work and personal profiles so end users can keep their personal data away from IT's control, and IT admins can secure corporate data and apps as needed.

Mobile device management features

The developers of mobile operating systems and manufacturers of mobile devices control what MDM software can and can't do on their devices through their APIs. As a result, mobile device management has become a commodity, with most vendors offering a similar set of core capabilities. MDM vendor differentiation comes by integrating mobile device management servers with other enterprise software.

Common mobile device management features include the following:

  • device enrollment for the onboarding of new devices and setting security policies;
  • predefined user profiles set by your MDM administrator for quicker onboarding;
  • device inventory and tracking with reporting throughout the entire mobile device lifecycle;
  • self-service features that enable end users to resolve common IT issues, such as security updates, without having to put in a service desk ticket;
  • app management, including distributing new apps, updating apps, removing unwanted apps or the use of an enterprise app store;
  • integration with mobile threat defense (MTD) or mobile threat intelligence solutions to prevent malware and other attacks that target mobile devices;
  • device hardware feature control enabling admins to restrict device camera usage and access to insecure public Wi-Fi networks;
  • content management to govern and secure organizational content, such as sales enablement content on mobile devices;
  • device location management via GPS and remote wipe to protect lost, stolen and otherwise compromised mobile devices;
  • password enforcement that admins can manage through policies;
  • reporting and analytics for tracking and reporting on device data and cellular usage, compliance and security;
  • app allowlisting and blocklisting; and
  • data encryption enforcement to help protect against malware and other data compromises.

7 best practices for mobile device management

  1. Develop a comprehensive mobile device policy as part of an overall cybersecurity strategy that outlines the organization's acceptable use of mobile devices, including device security, data protection and app usage guidelines. This policy should be regularly reviewed with IT, security and business stakeholders and regularly communicated to employees.
  2. Set usage policies as part of a comprehensive mobile device policy or as a standalone policy for corporate devices, starting with documented rules about data usage, roaming and international calling.
  3. Implement an MDM platform to manage and secure your corporate-owned and BYOD devices that will enable you to wipe lost or stolen devices remotely, monitor device usage, including cellular/data costs, and automate security updates and patches.
  4. Develop a secure configuration standard for corporate devices, including setting devices to receive security updates over the air (OTA). The device standard should also include strong passwords, encrypted storage for data security and automated device locking.
  5. Work with your mobile providers to choose the right corporate plan -- typically a shared data pool -- that offers your organization the most savings.
  6. Train employees on mobile device security, starting with best practices for securing their personal devices. The training should also cover the security of corporate-owned devices and the importance of securing corporate data, especially if the organization must meet industry compliance programs such as Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI-DSS) and Sarbanes-Oxley Act. The training must cover the consequences of noncompliance for the organization and the employee.
  7. Deliver BYOD-specific security training if the organization relies heavily on employees using their own devices to do their jobs. Such training should focus on how the organization protects corporate data on personal devices while not compromising the employee's personal data.

MDM vendor landscape

The MDM vendor landscape has changed significantly since its inception due to acquisitions of startups by larger firms seeking to add mobile device management functionality to their products and solutions portfolios.

Microsoft holds a dominant role in the market with its Enterprise Mobility Suite solution. Jamf has grown with its Jamf Pro product. A new generation of MDM startups, such as Esper, Fleet, Kandji, and Mosyle are jockeying for positions, especially with enterprises standardized on Apple devices. And device vendors like Apple are integrating MDM features into their device OSes.

SaaS is the current standard for MDM because of the increased flexibility and pay-as-you-go services model, making it easier for organizations to onboard and offboard devices. The pandemic and the rush to remote work showed that on-premises MDM systems are a relic of another age. SaaS-based MDM also offers potential customers a pilot or trial experience that's economical, dynamic and won't completely drain their internal IT staff on a one-off project.

The small and medium-sized business (SMB) market is a notable piece of the MDM landscape in 2023 compared to earlier years. Apple launched Apple Business Essentials in 2022 to help small businesses improve device management practices.

This was last updated in March 2023

Continue Reading About mobile device management (MDM)

  • BYOD and using MDM is still an important decision

Related Terms

iOS software development kit (iOS SDK)
The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple's mobile operating system ...Seecompletedefinition
smartphone addiction (cellphone addiction)
Smartphone addiction (cellphone addiction) is a disorder involving compulsive overuse of mobile devices, usually quantified as ...Seecompletedefinition
technology addiction
Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...Seecompletedefinition

Dig Deeper on Mobile management

  • What BYOD trends will take hold in the business world?By: WillKelly
  • 7 mobile device security best practices for businessesBy: MichaelGoad
  • 5 steps to ensure HIPAA compliance on mobile devicesBy: MichaelGoad
  • 5 steps to approach BYOD compliance policiesBy: WillKelly
What is Mobile Device Management (MDM)? | Definition from TechTarget (2024)
Top Articles
How to Use Apple Cider Vinegar to Remove Plantar Warts: Leonard Greenwald, DPM: Podiatrist
Does Cardano (ADA) Have Best Staking on Cryptocurrency Market?
Camera instructions (NEW)
Celebrity Extra
Mopaga Game
Otterbrook Goldens
Red Wing Care Guide | Fat Buddha Store
سریال رویای شیرین جوانی قسمت 338
Palace Pizza Joplin
Derpixon Kemono
Zoebaby222
Spelunking The Den Wow
Bros Movie Wiki
Pro Groom Prices – The Pet Centre
Summoner Class Calamity Guide
RBT Exam: What to Expect
Samsung Galaxy S24 Ultra Negru dual-sim, 256 GB, 12 GB RAM - Telefon mobil la pret avantajos - Abonament - In rate | Digi Romania S.A.
Price Of Gas At Sam's
Moviesda3.Com
60 X 60 Christmas Tablecloths
Extra Virgin Coconut Oil Walmart
Nick Pulos Height, Age, Net Worth, Girlfriend, Stunt Actor
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Bing Chilling Words Romanized
Energy Healing Conference Utah
Kcwi Tv Schedule
Great Clips Grandview Station Marion Reviews
Craigslist Apartments Baltimore
Munis Self Service Brockton
Walgreens Bunce Rd
Mta Bus Forums
Star Wars Armada Wikia
Grave Digger Wynncraft
In hunt for cartel hitmen, Texas Ranger's biggest obstacle may be the border itself (2024)
Log in or sign up to view
Basil Martusevich
Rund um die SIM-Karte | ALDI TALK
The Blackening Showtimes Near Regal Edwards Santa Maria & Rpx
Austin Automotive Buda
Hannibal Mo Craigslist Pets
Raisya Crow on LinkedIn: Breckie Hill Shower Video viral Cucumber Leaks VIDEO Click to watch full…
Academic important dates - University of Victoria
Craigslist Pets Huntsville Alabama
Orion Nebula: Facts about Earth’s nearest stellar nursery
Me Tv Quizzes
Best Restaurants Minocqua
Conan Exiles Armor Flexibility Kit
Secrets Exposed: How to Test for Mold Exposure in Your Blood!
Twizzlers Strawberry - 6 x 70 gram | bol
Billings City Landfill Hours
Kenmore Coldspot Model 106 Light Bulb Replacement
Noelleleyva Leaks
Latest Posts
Article information

Author: Tish Haag

Last Updated:

Views: 5768

Rating: 4.7 / 5 (47 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Tish Haag

Birthday: 1999-11-18

Address: 30256 Tara Expressway, Kutchburgh, VT 92892-0078

Phone: +4215847628708

Job: Internal Consulting Engineer

Hobby: Roller skating, Roller skating, Kayaking, Flying, Graffiti, Ghost hunting, scrapbook

Introduction: My name is Tish Haag, I am a excited, delightful, curious, beautiful, agreeable, enchanting, fancy person who loves writing and wants to share my knowledge and understanding with you.