Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

white paper

Enterprise Mobility Management


Solution to Manage, Analyze and Control the Mobile Devices,
Applications and Content

Abstract
This paper highlights what is the need of Enterprise Mobility Management
for enterprises, and how an enterprise can choose right Solution to Manage,
Analyse and Control their Device, Application and Content based on business
requirements.
Need for Enterprise Mobility Mobilize business
Next question is what if only ‘D’, ‘A’ or ‘C’
matters for business requirement? Answer
Management apps to increase
productivity is complex and objective now.
The challenge
There are 4 main flavors of EMM solutions
The mobile device is fast becoming Multiplicity of in market viz.
the preferred medium of accessing Mobile Platforms
• Mobile Device Management
the internet, enterprise data and also
personalized information. According to App provisioning, • Mobile Application management
governance &

Consumer
Gartner in their report titled: “Tablet Market

Business
support • Mobile Content management
And Smartphones Market: Global Database
& Forecast (2010 – 2015),” by 2014, 1.3 • Bring your own device (BYOD)
billion smartphone & tablet devices would Right users, Right
apps, Right data It is up to enterprise to evaluate which
be sold worldwide. solution to choose out of this A (MAM), B
The deluge of devices and apps written (BYOD), C (MCM) & D (MDM).
Statistics & Reports
for them is fast becoming a nightmare for for Business
Enterprise IT to manage and maintain. The Roadmap
devices also bring in security and access
related issues with them. Operational & M
Maintenance Cost M

DM
MA
For example, when users are bringing
their personal devices to work, they
are also bringing in their own network. To manage the plethora of devices,
Through personal devices, employees information, applications in their
can create a wireless hotspot, and by enterprise, companies need to Manage,

BY
tethering their mobile devices to laptops Analyze, and Control (MAC) the Devices, O

M
D
Application, and Content (DAC). In short MC
or other corporate devices they can put
corporate data and information at risk. The their policies should rotate around
usage of corporate data and applications enabling, managing, controlling and
usage on such ad hoc networks cannot securing the DAC.
be monitored. This means that IT policies
should be framed for network access
The solution
also. If this is done then the mobile
devices become part of security issue for The solution to the problem lies in ability to
enterprises. manage Devices, application and content Device
within the enterprise. Such solutions are
The diagram below shows some challenges
commonly available under the banner of
faced by enterprises, IT departments and
Enterprise Mobility management (EMM)
end users in industry Apps
However as each business is unique, so are
Mobilize the
its needs for mobile enablement.. While
business for wider
reach certain businesses would require stringent
control on Device, Application and Content
Content, for others, control on Application
Strategize Mobility
Consumer
Business

Roadmap and Content would suffice.

Depending on the specific nature of


Control & manage requirements, the enterprise will need to
application tailor its EMM Solution.

Cost of Ownership

External Document © 2015 Infosys Limited


The following sections will look at each of • In addition to device procurement cost, Mobile Iron, Good technology, Citrix, Air
the solution in detail. the operational and capital cost for Watch, Kony, BoxTone etc…
MDM solution deployment does not
make it cost effective.
MDM MDM Research
• MDM (Mobile Device Management) As per Gartner and Forrester reports on
MDM Solution vendors
is about controlling the device to MDM, here is their recommendation and
manage, secure and control the Some of the popular MDM solutions evaluation for top MDM service providers
devices. available in the market include SAP Afaria, in the world.

• MDM Capabilities usually include


security management, device
configuration management, policy
management, enterprise network
integration, remote data wipe,
blacklisting/whitelisting of apps/
devices and many more but mainly at
device level.

• MDM solutions create agent on the


device which runs as a daemon and
monitors under all enterprise policies.
To access native platform offerings, in
some cases, MDM vendors may have
to get devices preconfigured through
OEMs also.

When it is not perfect EMM solution?


• Employees have to carry two devices –
personal and professional, in order to
Challengers Leaders
ensure segregation between enterprise
and personal data.

• MDM is mainly suitable for enterprise


AirWatch
owned devices as it controls the device MobileIron
as a whole which may not be accepted Citrix
for BYOD (Bring your own device) as
SAP
Ability to execute

well as for B2C where users own their Good Technology


Fiberlink
own devices for corporate work also.
BoxTone
• MDM can execute intelligence based McAfee Sophos
Soti
BlackBerry Trend Micro
on the enterprise policies configured Symentac
Tangoe Absolute Software IBM
at the device level. It is not suited for
LANDesk Kaspersky Lab
scenarios where enterprise policy or
rule has to be applied on selective
applications or to application specific
data. Since the agent runs as a daemon
process at device level, it cannot Niche Players Visionaries
control and monitor health and
performance of each application at Completeness of vision As of May 2013
individual level.

External Document © 2015 Infosys Limited


BYOD BYOD solution Vendors: and BYOD strategies. It is the solution
to manage the lifecycle of a mobile
• BYOD (Bring your own Device) is a new MobileIron, GOOD, AirWatch, Kony, AmTel,
application.
popular concept in enterprise mobility Symantec, Citrix (Zenprise), Cisco, Juniper,
management where enterprises allow etc… • MAM is the EMM solution which can
employees to bring their own devices rightly fit the enterprise MAC (manage,
to work. This enables enterprises to analyze & control) needs in B2C, B2B
MCM/MIM or B2E industry segments unlike MDM
mobilize their business in a more cost
effective manner by not doing any • MCM (Mobile Content Management)/ which is preferably most likely to be
device procurement at all. MIM (Mobile Information Management) the solution for B2E apps for corporate
is analogous to a bank locker where owned devices.
enterprises can safely deposit their
When it is not perfect EMM solution? • When MAM has to offer the solution at
secure and sensitive data. Irrespective
application level, it still has more power
• BYOD secures the number of of MDM, MAM or BYOD, the main
to offer more at enterprise policy and
applications for enterprise mainly concern of the enterprises or end users
configuration management at each
by providing container approach boils down to data security.
application level. Thereby it offers more
within which all enterprise apps can
• User authentication, data access/ integrity with app specific data and its
work. However, most of the time,
wipe as per Policy configuration, security.
transitioning out of this container to
Data security over the air and data
personal space of device becomes a
at rest, data sharing protection, data
problem as policies don’t allow using When MAM is not a perfect EMM
version update, and data modification
both spaces of device at the same time. solution?
detection and sync content between
• End user uses the same device for device-server are the main features of • Unique policy management and
professional and personal use, which MCM solution. IT specific configuration cannot be
implies that there is always a security offered at device level unless the
threat to the corporate data, as it containerization approach is followed.
When it is not perfect EMM solution?
can be shared across personal apps, • Control can be at container or
until comprehensive BYOD strategy is • From technical perspective, it has to
individual app level only.
implemented by IT department. do with persistent memory of a device
which is accessible only through native • Version upgrade for the agent or
• Enterprises that support BYOD would SDK becomes difficult since this is
APIs. Hence, native mobile apps are
need to create applications on multiple bundled along with application. Entire
must to implement MCM/MIM.
platforms each of which need to be application has to be upgraded to
enterprise approved. • Limited platform support. E.g. iOS and
support an agent or SDK upgrade.
android only are supported by MIM
• In scenarios where, organizations have However, this is only in case of
solutions,
to contend with user’s privacy concerns container based approach.
by letting them allow private apps like • Solution focus is around corporate
• Validation and certification of private
contacts, emails while allowing them data only. Hence, does not manage or
applications to detect the malicious
access to corporate data at the same control devices or applications.
code and malware third party app/
time, puts this sensitive info on security • Very few vendors support the MIM / code integration is complex task. This
risk, MCM. is similar to deployment process which
• In BYOD, all the applications have to has to be followed before uploading
be run under same enterprise policies an application to public app stores like
MCM Solution Vendors:
irrespective of the app security level. apple app store.
Air Watch
• BYOD is trend which is getting popular
and on high demand by enterprise in MAM Solution Vendors
mobility. However, unlike hundreds of
MAM
Afaria, Good, MobileIron, Mocana,
vendors in MDM, BYOD is still evolving. • MAM (Mobile Application Apperian, AirWatch, Kony, AppBlade,
Management) is glue between MDM BoxTone etc…

External Document © 2015 Infosys Limited


What should Enterprise look for in EMM Offerings? Geo/Location based authentication
A good EMM solution will have multiple features. These include • Allowing or disallowing application or
data access based on user’s location is a
good feature for enterprises that want
to track their employees’ location for on
field operations.
cy ment Ma A
na p
e g
na li
Ma Po

p ment
Push Notifications

Analytics
g

e
Da

• Dashboard or portal operators can


ta

n
W

ti o
push the data or event notifications
ip

ra
e/

gu
like version updates, remote data
En

nfi
cry

Co
wipe, configuration updates or policy
pt
io

updates to application when the app is


n

not connected to the server.


Authentication DAC App Provisioning

Data Security
Ve

• Data protection policies should be


r
n

sio
io
at

configured to secure any sensitive data.


n
riz

M
Notifications

an
ho

ag

• DAR (data at rest) should be in


t
Au

em

encrypted mode using a dynamic


en

t
en
Ma

se
t

ge i c e
U g

encryption key.
m

r v
na

em D e na
en a • Disable any data sharing applications
t M
or utilities on device e.g. personal
email, messenger apps, camera,
Bluetooth, 3rd party apps integration
etc…

Application Deployment • Registration of the users on valid • Confidential documents to be deleted


devices based on multi factor from device based on “time to live”
• For B2E & B2B, applications are
authentication like OTP ( One Time certificates.
provided through enterprise app-
Passcode).
stores. As a part of EMM, enterprise • Provide data security in transport layer
app stores define the process like with encrypted data communication
app validation, certification and User Authorization on top of SSL protocol offerings.
provisioning the same to valid users on • Application access and usage for users • Provide transport layer security by
allowed devices. based on the status of enterprise implementing asymmetric encryption
• App stores developed as a part of registration, location or defined key algorithms.
EMM solution assure the accessibility policies.
of certified applications to valid users
on authorized devices which is not the Version Control Management
case with public app stores.
• Application version upgrades
notification based on the device OS
Device Authentication compatibility check.
• Device identification and validation • Disabling the app access in case of
to check if the device is owned by mandatory upgrade to address security
enterprise or end user. flaws.

External Document © 2015 Infosys Limited


Statistics & Reports • Full data wipe in case of blacklisted
device or user.
• Real time customized reports to
help enterprises plan and revise • Block particular version of an
their mobile strategies. For example, application based on security flaw or
reports like application usage vs. major bug found.
platform, app vs. platform versions • Push notification for version update
(especially for android platform), to be sent to executive or privileged
application vs. device OEMs (in case customers first.
of B2C), application vs. locations, apps
• Restriction on number of login
distribution vs. enterprise etc… can be
attempts in offline mode & disable app
good measurement parameters.
access if it exceeds.

• Disable device or app access unless lost


Dashboard
or stolen device is recovered.
• Login management and Role based
• Disable app access in case device
access to web console operators.
operating in offline mode since N days
• Configuration of policies at enterprise
and application level dynamically.
Remote Data Wipe
• Generate statistics and reports on
• In case of device gets lost or stolen or
predefined and customized types.
gets blacklisted due to any enterprise • Enterprise apps installed within
• Accessibility to block/unblock, defined policy, wipe the data at secured data container will be
deregister, data wipe, version update application or container level. Data removed along with all associated
feature injection through web console wipe should be supported in offline data. Again the option is offered
at device, user or app level. mode. “ as Full or Partial data wipe where
• Easy and effective user interface to partial wipe is offered either at user
• Types of remote data wipe which can
provide Support activities. profile level or at personal-official
be preferable for MDM/MAM/BYOD
data partitioning on the device.
based on enterprise requirement
Policy Management • Selective Application wipe ---
• Factory reset ---- MDM
MAM
• Policy can be static or dynamic and is • Removes all the downloaded apps,
a set of rules applied at user, device • Uninstallation of application
personal data, settings and all the
or application level based in many from device along with data,
changes user has made to device
conditions. Few examples are: configurations, and settings wipe
after purchase. Device resets to
for that app only.
• App provisioning only to certified new handset state.
OEMs devices. • Enterprise Device wipe --- MDM/
Solution Integration Effort
• Blacklist malware apps installation or BYOD
usage on any device. • After evaluating for the features
• Wipe only enterprise email account
offering by EMM vendors, next
• Disallow jailbreak or rooting the and profiles, messages, corporate
biggest challenge is deployment and
devices which are owned by contacts, policy configuration.
integration effort to adapt the solution
enterprises. • This option does not affect personal to the needs of the enterprise.
• Allow enterprise app access only data like Gmail account mails,
• How much code repacking needed,
during working hours public apps, media files or personal
whether it is different per platform,
downloaded data.
• Disable application access in case of version upgrade for enterprise private
unauthorized location. • Container wipe --- MAM/BYOD apps vs. version updates in vendors
device agents are important factors.
• Selective data wipe in case of multi
users accessing same device.

External Document © 2015 Infosys Limited


EMM Solution Approaches
1. Device Centric Approach:
• Solution runs as a daemon process
in device. This would be native
application.

• Mainly an MDM approach which


controls and monitors at device level

• Vendors: Sybase Afaria, McAffee,


Symantec etc…

2. Containerization with SDK:


• Solution is provided through SDK/
library which should be integrated with
mobile application.
• There can be some limitations with devices (either laptop or handheld or
• Many MAM and BYOD go with this this approach like advanced features any other non-telephonic devices) and
approach due to more control and like allowed data sharing between users.
security at app and data level. enterprise apps, supporting multi user
• It runs more on network measurement
profiles, scenario based authorization
• There are containerization approaches and instrumentation out of IP packets
etc… may not be possible.
where multiple applications are traversing on network between device
executed in single container • Vendors: Good Dynamics, Mocana MAP and enterprise server wall.
environment to create virtual data & all partners like BoxTone, Apperian.
• This provides security framework for
partitioning between personal and
any wireless devices, desktops or even
enterprise apps on device.
4. Remote Streaming: wired/wireless peripheral devices
• Advanced features like data sharing like printers since they detect data at
• This approach creates virtually separate
between enterprise apps, persona network layer like SSL/VPN/WLAN.
space on mobile for application where
based app and data management,
app is isolated from device specific • Limitation lies in the fact that approach
custom app specific policies etc.. is
settings, configurations and interaction has huge dependency on the
possible.
with other apps in any means. infrastructure.
• Vendors: Mobile Iron, Good, Sybase
• Solution delivers applications on users’ • Vendors: Cisco, IF-MAP, Juniper Junos
Afaria, Kony, AirWatch, Zenprise,
devices through application streaming Pulse
Symantec etc…
from hosting servers in the datacenter.

3. Containerization without SDK:


• This solution is more generic in terms EMM Deployment
of device types (handheld devices, Architecture
• Solution is to wrap the application with desktops, printers & other peripherals),
secured container without any code There are two distinct approaches available
operating system/platform type or
integration or source code changes to deploy Enterprise Mobility Management
nature of an application (native or thin
which is the main advantage of this solutions viz.
client).
approach. 1. On-premise deployment
• Vendors: Citrix XenApp
• Many MAM and BYOD solution 2. Hosted on secure cloud data center.
providers prefer this approach.
5. Network Based: Following is on-premise deployment view
• Executable of mobile application just
of most of the solution providers in mobile
needs to be deployed at the vendor’s • This unique approach gathers the real-
management space. It can change based
on-premise enterprise network or on a time contextual information from the
on enterprise backend infrastructure and
secure cloud environment. network,
deployment requirement.

External Document © 2015 Infosys Limited


MM Deployment Architecture (genric)

Web Browser

Client Tier
Multiple loaded with External Internal Admin
multiple apps Firewall Router Firewall Dashboard/Support
Console

Application Server

Middle Tier
Multi platform Internet
devices from
Tablets/smartphones Enterprise App
Server + Email
Server
Mobile Management
Server with DB Database server

Database Tier
Single Device,
Multiple Users Active Directory

Enterprise
Public IP DMZ
Network

Infosys Mobile Application


Management (iMAM)
Solution
Infosys offers a comprehensive mobile
application management solution to meet
the needs of enterprises to manage their
mobile app deployments.

• With the explosion of B2C mobile


apps, there is a strong need in the
market for Enterprises to control the
application version, security, data, etc.
This is particularly needed in case of
applications like Banking, Payments,
Loyalty, where critical personal
information/data is being stored/
transacted from the Mobile device.

External Document © 2015 Infosys Limited


• The main challenge with B2C mobile
application is posed when the device • Add app
on which the app installation is to be • Validate app
• Certify for deployment
done is not owned or Controlled by the • Pilot/Alpha release
enterprise. The architecture and pricing • Configure rule engine
of other MAM solutions in market is mit
• Deregister Sub
such that it is not suitable for large • Remote wipe

De
• Decommission

plo
scale deployments in B2C context.

y
• Infosys MAM Solution is light weight
• OTA install/Upgrades

Retire
Mobile Management solution which • Device compatibility
allows enterprises to have accessibility, check

manageability and control over the

io n
applications for right users on right

v is
o
devices. • Control Pr
• Monitor Go
ver n
• Infosys Mobile Application • Secure
Management Solution helps
enterprises manage their mobile
application’s life cycle in the following
way:

External Document © 2015 Infosys Limited


Conclusion
More than 100 solutions in the market to manage more than 1 billion mobile
devices loaded with millions of public-private apps. There is no one size fits all
solution.

• Employee personal device UX better • Complete monitoring & control of


• Enhances business productivity enterprise device possible
• Reduces enterprise infrastructure cost
• Limited choice of devices
• Security threat for enterprise data • UX is very poor for end user
• IT process modifications must BYOD MDM • Factory resets the device
• It is BYOD, Not BAD • Costly for enterprises
• Heavy on employee pocket

• No interference to UX
• Secure content locker • MM solution for B2C & B2B
• Auto/manual Data sync • Application level control
• Worth deploying only for B2E MCM MAM • Mobile OS agnostic solution
• IT rule modifications not needed
• Secures mainly data/content • Perfect glue between MDM & BYOD
• Achievable with effective data
manage module of other MM • No device level control
solutions also • Portioning can affect application
performance

External Document © 2015 Infosys Limited


Finally organizations who need to get • Both MDM and MAM can resolve BYOD • Operation management for device
mobility management should decide upon issues. What level of control required? procurement or reimbursement for
a solution based on: data
• Does enterprise already have one MDM
• What is main business objective? Target in place? Both MAM and MDM can • Platform and Device Diversity support
users are B2C or B2E? coexist.
• Cost & Support provided by vendor.
• Who owns the device?? BYOD or COPE • Least cost of Ownership and easy to
(Corporate owned personally enabled)? use / deploy.

• Are there public or private • Is solution meeting NFRs on scalability,


applications? availability, multi tenancy, multi device-
multi user mapping?

About the Author

Payal Patel
is a Senior Technology Architect with Infosys. She has over 9 years of experience in Mobile related
technologies and her interests and expertise include Mobile Management technologies.

External Document © 2015 Infosys Limited


For more information, contact askus@infosys.com

© 2015 Infosys Limited, Bangalore, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to change without notice. Infosys
acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Except as expressly permitted, neither this
documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing, photocopying, recording or otherwise, without the
prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.

Stay Connected

You might also like