Professional Documents
Culture Documents
Enterprise Mobility Management
Enterprise Mobility Management
Abstract
This paper highlights what is the need of Enterprise Mobility Management
for enterprises, and how an enterprise can choose right Solution to Manage,
Analyse and Control their Device, Application and Content based on business
requirements.
Need for Enterprise Mobility Mobilize business
Next question is what if only ‘D’, ‘A’ or ‘C’
matters for business requirement? Answer
Management apps to increase
productivity is complex and objective now.
The challenge
There are 4 main flavors of EMM solutions
The mobile device is fast becoming Multiplicity of in market viz.
the preferred medium of accessing Mobile Platforms
• Mobile Device Management
the internet, enterprise data and also
personalized information. According to App provisioning, • Mobile Application management
governance &
Consumer
Gartner in their report titled: “Tablet Market
Business
support • Mobile Content management
And Smartphones Market: Global Database
& Forecast (2010 – 2015),” by 2014, 1.3 • Bring your own device (BYOD)
billion smartphone & tablet devices would Right users, Right
apps, Right data It is up to enterprise to evaluate which
be sold worldwide. solution to choose out of this A (MAM), B
The deluge of devices and apps written (BYOD), C (MCM) & D (MDM).
Statistics & Reports
for them is fast becoming a nightmare for for Business
Enterprise IT to manage and maintain. The Roadmap
devices also bring in security and access
related issues with them. Operational & M
Maintenance Cost M
DM
MA
For example, when users are bringing
their personal devices to work, they
are also bringing in their own network. To manage the plethora of devices,
Through personal devices, employees information, applications in their
can create a wireless hotspot, and by enterprise, companies need to Manage,
BY
tethering their mobile devices to laptops Analyze, and Control (MAC) the Devices, O
M
D
Application, and Content (DAC). In short MC
or other corporate devices they can put
corporate data and information at risk. The their policies should rotate around
usage of corporate data and applications enabling, managing, controlling and
usage on such ad hoc networks cannot securing the DAC.
be monitored. This means that IT policies
should be framed for network access
The solution
also. If this is done then the mobile
devices become part of security issue for The solution to the problem lies in ability to
enterprises. manage Devices, application and content Device
within the enterprise. Such solutions are
The diagram below shows some challenges
commonly available under the banner of
faced by enterprises, IT departments and
Enterprise Mobility management (EMM)
end users in industry Apps
However as each business is unique, so are
Mobilize the
its needs for mobile enablement.. While
business for wider
reach certain businesses would require stringent
control on Device, Application and Content
Content, for others, control on Application
Strategize Mobility
Consumer
Business
Cost of Ownership
p ment
Push Notifications
Analytics
g
e
Da
n
W
ti o
push the data or event notifications
ip
ra
e/
gu
like version updates, remote data
En
nfi
cry
Co
wipe, configuration updates or policy
pt
io
Data Security
Ve
sio
io
at
M
Notifications
an
ho
ag
em
t
en
Ma
se
t
ge i c e
U g
encryption key.
m
r v
na
em D e na
en a • Disable any data sharing applications
t M
or utilities on device e.g. personal
email, messenger apps, camera,
Bluetooth, 3rd party apps integration
etc…
Web Browser
Client Tier
Multiple loaded with External Internal Admin
multiple apps Firewall Router Firewall Dashboard/Support
Console
Application Server
Middle Tier
Multi platform Internet
devices from
Tablets/smartphones Enterprise App
Server + Email
Server
Mobile Management
Server with DB Database server
Database Tier
Single Device,
Multiple Users Active Directory
Enterprise
Public IP DMZ
Network
De
• Decommission
plo
scale deployments in B2C context.
y
• Infosys MAM Solution is light weight
• OTA install/Upgrades
Retire
Mobile Management solution which • Device compatibility
allows enterprises to have accessibility, check
io n
applications for right users on right
v is
o
devices. • Control Pr
• Monitor Go
ver n
• Infosys Mobile Application • Secure
Management Solution helps
enterprises manage their mobile
application’s life cycle in the following
way:
• No interference to UX
• Secure content locker • MM solution for B2C & B2B
• Auto/manual Data sync • Application level control
• Worth deploying only for B2E MCM MAM • Mobile OS agnostic solution
• IT rule modifications not needed
• Secures mainly data/content • Perfect glue between MDM & BYOD
• Achievable with effective data
manage module of other MM • No device level control
solutions also • Portioning can affect application
performance
Payal Patel
is a Senior Technology Architect with Infosys. She has over 9 years of experience in Mobile related
technologies and her interests and expertise include Mobile Management technologies.
© 2015 Infosys Limited, Bangalore, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.
Stay Connected