Enterprise Mobility Management (EMM)

Enterprise Mobility Management (EMM)

Enterprise Mobility Management (EMM) is the distribution, organization, and control of mobile devices like cell phones, smartphones, tablets, and laptops, used in enterprise mobility. Microsoft's 2015 Windows 10 allowed most EMM software providers to expand into unified endpoint management (UEM), which allows information technology departments to manage personal computers and mobile devices through a single console. Enterprise mobility management is vital for companies that need to guard against data security and privacy breaches, especially with the risk of employees losing their mobile devices or falling victim to theft. EMM grew out of mobile device management (MDM) and includes components of MDM, mobile content management (MCM), and identity access management. Today, EMM typically encompasses some combination of MDM, mobile application management (MAM), mobile content management (MCM), and identity and access management. Administrators use the MDM server's management console as its headquarters to set policies and settings, and the agent enforces these policies and configures these settings by integrating with APIs built into mobile operating systems. MAM allows administrators to set policies for specific application families, rather than for the whole device.

Enterprise Mobility Management (EMM) encompasses the distribution and management by businesses of mobile phones and tablets used by their employees to safeguard data privacy and prevent security breaches.

What Is Enterprise Mobility Management (EMM)?

Enterprise Mobility Management (EMM) is the distribution, organization, and control of mobile devices like cell phones, smartphones, tablets, and laptops, used in enterprise mobility. 

EMM is important because it gives companies more control over and helps protect enterprise data by managing how mobile devices interact with the enterprise infrastructure. Critics, however, voice concern over companies' ability to track the location and non-work activities of their employees.

Enterprise Mobility Management (EMM) encompasses the distribution and management by businesses of mobile phones and tablets used by their employees to safeguard data privacy and prevent security breaches.
EMM also boosts productivity as applications and information needed to perform work duties can be supplied on employees' mobile devices.
EMM grew out of mobile device management (MDM) and includes components of MDM, mobile content management (MCM), and identity access management.

Understanding Enterprise Mobility Management (EMM)

Enterprise mobility management is vital for companies that need to guard against data security and privacy breaches, especially with the risk of employees losing their mobile devices or falling victim to theft. EMM ensures that the mobile devices used by employees are secure enough to protect the company’s data and private information. This security can be achieved by limiting which employees or devices can access specific information by requiring a virtual private network (VPN) or secure HTTPS connections, mandating two-factor authentication (2FA), by restricting the ability to download certain applications or visit certain websites, and/or by password-protecting the devices including using fingerprints or other biometrics.

In addition to addressing security concerns, EMM software can also help increase employee productivity because IT departments can provide them with the applications and data they need to perform work-related tasks on mobile devices.

Special Considerations

Today, EMM typically encompasses some combination of MDM, mobile application management (MAM), mobile content management (MCM), and identity and access management. MDM is the base of EMM because it relies on the combination of an agent app, which is installed on an endpoint device, and server software running in the corporate data center or the cloud. Administrators use the MDM server's management console as its headquarters to set policies and settings, and the agent enforces these policies and configures these settings by integrating with APIs built into mobile operating systems.

MAM allows administrators to set policies for specific application families, rather than for the whole device. With MCM, only approved applications can access or transmit corporate data. And identity and access management control how, when, and where workers may use corporate apps and data.

These technologies all address specific concerns, and the overlap between MDM, MAM, and MCM is quite minimal. As more organizations embraced enterprise mobility, vendors started to design products rooted in EMM, usually by adding MAM or MCM features to their MDM products. An enterprise app store or another self-service portal for application delivery and deployment is also a common component of EMM software.

Related terms:

Administrator

An administrator is a court-appointed individual who handles all financial matters for a decedent during probate. read more

Application Programming Interface (API)

An application programming interface, or API, is a "go-between" that enables a software program to interact with other software. read more

Biometrics

Biometrics is a type of digital security used to prevent data breaches by making use of individual characteristics such as fingerprints. read more

Cloud Security

Cloud security protects data and online assets stored in cloud computing servers on behalf of their client users. read more

Dark Web

The dark web refers to encrypted online content that is not indexed on conventional search engines. Read about the pros and cons of the dark web. read more

Data Breach

A data breach is an unauthorized access and retrieval of sensitive information by an individual, group, or software system. read more

Encryption

Encryption is a means of securing digital data using an algorithm and a key. read more

Enterprise Resource Planning (ERP)

Enterprise resource planning (ERP) is used by a company to manage key parts of its business such as accounting, manufacturing, sales, and marketing. read more

Hyperledger Iroha

Hyperledger Iroha is a business blockchain framework designed for infrastructure projects that need distributed ledger technology. read more

Mobile Marketing

Mobile marketing utilizes multiple distribution channels to promote products and services via mobile devices, such as tablets and smartphones.  read more