Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown
MAM

MAM

(also mobile application management)

MAM definition

Software used to secure and enable control and monitoring of applications used by employees on a company’s and personal mobile devices. IT administrators can use MAM to:

  • Enforce security policies.
  • Manage the sharing of sensitive business data.
  • Separate corporate apps and data from personal information.
  • Download, update, or delete software on the device.
  • Manage software licensing.
  • Change settings and configurations on certain apps.
  • Grant and revoke permissions to access and use business data.

Why do corporations need MAM?

When it comes to smartphones, most companies follow the BYOD policy. While having a smartphone is not necessary for many professions (most work can be done on the computer), modern apps can offer a huge productivity boost. Time management, reminders, notes, sketches, communicating on the go — you name it, there’s an app for it. Naturally, employees want to use apps that make their work easier, and companies want to make sure mobile devices don’t become a security risk.

How do corporations manage mobile apps and devices?

Businesses use unified endpoint management (UEM) tools to ensure the security of those devices and the data stored on them — MAM is one of them. Corporations, among other mobility management products, may also use mobile device management to regulate device usage, mobile email management to enforce company policies on mobile devices, or identity and access management to grant and revoke permissions to access certain data.

Further reading

Ultimate digital security