V-Soft's Corporate Headquarters

101 Bullitt Lane, Suite #205
Louisville, KY 40222

TOLL FREE: 844.425.8425
FAX: 502.412.5869

Denver, Colorado

6400 South Fiddlers Green Circle Suite #1150
Greenwood Village, CO 80111

TOLL FREE: 844.425.8425

Chicago, Illinois

208 N. Green Street, #302, Chicago, IL 60607

TOLL FREE: 844.425.8425

Madison, Wisconsin

2810 Crossroads Drive, Ste. 4000
Madison, WI 53718

TOLL FREE: 844.425.8425

Atlanta, Georgia

1255 Peachtree Parkway Suite #4201
Cumming, GA 30041

TOLL FREE: 844.425.8425

Cincinnati, Ohio

Spectrum Office Tower 11260
Chester Road Suite 350
Cincinnati, OH 45246

Phone: 513.771.0050

Raritan, New Jersey

216 Route 206 Suite 22 Hillsborough Raritan, NJ 08844

Phone: 513.771.0050

Toronto, Canada

1 St. Clair Ave W Suite #902, Toronto, Ontario, M4V 1K6

Phone: 416.663.0900

Hyderabad, India

Incor 9, 3rd Floor, Kavuri Hills
Madhapur, Hyderabad – 500033 India

PHONE: 040-48482789

Noida, India

H-110 - Sector 63 ,
NOIDA , Gautham Budh Nagar ,
UP – 201301

BYOD in the Workplace: The Difference Between MDM and MAM

The option to bring your own personal device to work is very convenient. You have access to your own comforts, don’t have to learn a new system, and you are able to choose what it is that you want to utilize. However, your company will still need to protect sensitive data. Here are a few examples of ways a company is able to allow their employees to use their own devices while still maintaining high levels of security.

Bring Your Own Device

New research indicates the average amount of devices the average person carries could reach 4.3 per person by 2020, and those devices are more powerful than ever. Think about it: what do you have with you right now? A smartphone, tablet, laptop? What about a smartwatch? With today’s increasing technology, they are all becoming much more relevant: we can often do just as much on a smartphone as we can on a laptop. The data each device can store is also significant, and often times very sensitive – things like financials, customer contact information, and trade secrets.

When considering a BYOD policy, the first question every enterprise must ask is: “How do we want to manage the user-owned devices connecting to our resources?” The answer to this question is critical in deciding which way to lean towards. Each level of involvement in managing user-owned devices has its own benefits and consequences.

BYOD Mobile Device Management including tablet mobile and laptop

Mobile Device Management

The most common form of BYOD management to date is Mobile Device Management (MDM). MDM is the administration of mobile devices, such as dealing with deploying, securing, monitoring, integrating, and managing those mobile devices in the workplace. It is considered a feasible method to both deliver applications to user-owned devices and secure the corporate apps and data on them.

MDM is designed as a way to ensure employees stay productive while at the same time preventing them from violating corporate policies. MDM implementations may be either on-premises or cloud-based.

A few of the things that an MDM primarily deals with:

  • Corporate data segregation
  • Securing emails and corporate documents on devices
  • Enforcing corporate policies
  • Integrating and managing mobile devices, such as laptops and smartphones

MDM also provides the ability to push applications to managed devices and allow enterprises to better enforce security controls. However, fully managing user-owned devices can result in something as drastic as doing a complete lockdown or wipe of their device if it is lost or stolen, which can include the user’s own personal content. When faced with these realities, users often become frustrated or disappointed. This can result in additional headaches for IT as users instead opt for skirting past IT policies to secretly connect to corporate resources.

BYOD Mobile Application Development Management with an apple watch or smart watch and mobile phone

Mobile Application Management

Mobile Application Management, in contrast to MDM, enables enterprises to avoid device-level management. Instead, it offers application-level management on user-owned devices. As a result, MAM completely negates the concerns that are associated with fully managing user-owned devices. 

Water cooler chatter 15 years ago used to be about what happened on Seinfeld. Now it's ‘Look at what I’m doing on the enterprise network with my mobile device." 

Bob Egan, Vice President of Mobile Strategy at Mobiquity

MAM is designed to give IT the ability to manage and secure only those apps that are designed to work with that particular application. As referenced with MDM, IT is capable of wiping or locking an employee's phone. With MAM, however, they could simply lock the user out of their corporate e-mail without the user worrying about his personal data becoming inaccessible. In fact, the company wouldn't even be aware or able to view those files.

IT is also able to limit the sharing of corporate data among different apps. There are some pitfalls with MAM, however. For example, as each app requires its own coding to work with each individual MAM product, the availability of apps for a specific platform can be limited.Practical Guide to HR Service Delivery

Does your business need help moving forward into the future? V-Soft Consulting’s Business Solutions team is ready to help you with all of your mobile app development needs. You can get a free, no-strings-attached consultation to see if we fit your needs.Simply contact us for more information. We’ll be glad to help.

Topics: Mobile Business Apps, Technology, IT Jobs, Mobile Application Development, IT, Apps, Mobile Apps, MDM, MAM, BYOD

Get tech and IT industry Updates