Mobile application management
   HOME

TheInfoList



OR:

Mobile application management (MAM) describes the
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consist ...
and
services Service may refer to: Activities * Administrative service, a required part of the workload of university faculty * Civil service, the body of employees of a government * Community service, volunteer service for the benefit of a community or a p ...
responsible for provisioning and controlling access to internally developed and commercially available
mobile app A mobile application or app is a computer program or software application designed to run on a mobile device such as a phone, tablet, or watch. Mobile applications often stand in contrast to desktop applications which are designed to run on d ...
s used in business settings, on both company-provided and 'bring your own'
mobile operating system A mobile operating system is an operating system for mobile phones, tablet computer, tablets, smartwatches, smartglasses, or other non-laptop personal computing, personal mobile computing devices. While computers such as typical laptops are "mobi ...
s as used on
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
s and
tablet computer A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being com ...
s. Mobile application management provides granular controls at the application level which enable
system administrator A system administrator, or sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as servers. The system administrator seeks to en ...
s to manage and secure application or 'app' data. MAM differs from
mobile device management Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of m ...
(MDM), which focuses on controlling the entire device, and requires that users enroll or register their device, and install a service agent. While some
enterprise mobility management Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context. As more workers have bought smartphone and tablet ...
(EMM) suites include a MAM function, their capabilities may be limited in comparison to stand-alone MAM solutions, because EMM suites require a device management profile in order to enable app management capabilities.


History

Enterprise mobile application management has been driven by the widespread adoption and use of mobile applications in business settings. In
2010 File:2010 Events Collage New.png, From top left, clockwise: The 2010 Chile earthquake was one of the strongest recorded in history; The Eruption of Eyjafjallajökull in Iceland disrupts air travel in Europe; A scene from the opening ceremony of ...
, the International Data Corporation (IDC) reported that
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whi ...
use in the
workplace A workplace is a location where someone works, for their employer or themselves, a place of employment. Such a place can range from a home office to a large office building or factory. For industrialized societies, the workplace is one of ...
will double between 2009 and 2014. The '
bring your own device Bring your own device (BYOD )—also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)—refers to being allowed to use one's personally owned device, rather than being required to u ...
' (BYOD) phenomenon is a factor behind mobile application management, with personal PC, smartphone, and
tablet Tablet may refer to: Medicine * Tablet (pharmacy), a mixture of pharmacological substances pressed into a small cake or bar, colloquially called a "pill" Computing * Tablet computer, a mobile computer that is primarily operated by touching the ...
use in business settings, vs. business-owned devices, rising from 31 percent in 2010 to 41 percent in 2011. When an
employee Employment is a relationship between two parties regulating the provision of paid labour services. Usually based on a contract, one party, the employer, which might be a corporation, a not-for-profit organization, a co-operative, or any ot ...
brings a personal device into an enterprise setting, mobile application management enables the corporate
information technology Information technology (IT) is the use of computers to create, process, store, retrieve, and exchange all kinds of data . and information. IT forms part of information and communications technology (ICT). An information technology syste ...
(IT) staff to download required applications, control access to business data, and remove locally cached business data from the device if it is lost or stolen, or when its owner no longer works with the company. Use of mobile devices in the workplace is also being driven from above. According to
Forrester Research Forrester is a research and advisory company that offers a variety of services including research, consulting, and events. Forrester has nine North America locations: Cambridge, Massachusetts; New York, New York; San Francisco, California; McLe ...
, businesses now see mobile as an opportunity to drive innovation across a wide range of business processes.McCarthy, John C., and Pelino, Michele, 'Mobile Management takes a 180-degree turn', ''
Forrester Research Forrester is a research and advisory company that offers a variety of services including research, consulting, and events. Forrester has nine North America locations: Cambridge, Massachusetts; New York, New York; San Francisco, California; McLe ...
'', 11 August 2011
Forrester issued a forecast in August 2011 predicting that the "mobile management services market" would reach $6.6 billion by 2015 – a 69 percent increase over a previous forecast issued six months earlier. Citing the plethora of mobile devices in the enterprise – and a growing demand for mobile apps from employees, line-of-business decision-makers, and customers – the report states that organizations are broadening their "mobility strategy" beyond mobile device management to "managing a growing number of mobile applications".The advent of Internet of Things (IoT) has been changing lives for the better. It is not limited to homes but, has a pivotal role connecting teams, devices and decisions. With more connected devices, there is a boost in data generation, data analysis and reporting.


App wrapping

App wrapping was initially a favoured method of applying policy to applications as part of mobile application management solutions. App wrapping sets up a
dynamic library In computing, a dynamic linker is the part of an operating system that loads and links the shared libraries needed by an executable when it is executed (at " run time"), by copying the content of libraries from persistent storage to RAM, filli ...
, and adds to an existing binary that controls certain aspects of an application. For instance, at start-up, you can change an app so that it requires authentication using a local passkey. Or you could intercept a communication so that it would be forced to use your company's
virtual private network A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The b ...
(VPN), or prevent that communication from reaching a particular application that holds sensitive data. Normally, application wrapping is performed using a SDK from an application or EMM seller that permits an engineer or administrator to convey an API that empowers the board arrangements to be set up. For instance, an application wrapping API would permit an administrator to control who can download a portable application and whether corporate information got to by that application can be reordered. Application wrapping can be applied during interior advancement of programming or sometime later to off-the-rack programming buys essentially by adding executable code through the SDK. Quite possibly the most broadly utilized portable application stages, Microsoft's Office 365, likewise gives its own extraordinary arrangement of issues respect to the board. Before, Office 365 didn't permit application the executives by means of outsider EMM supports; that usefulness was accessible just through its InTune cloud-based administration. computerworld.com/article/3209907/app-wrapping-the-key-to-more-secure-mobile-app-management.html Increasingly, the likes of
Apple An apple is an edible fruit produced by an apple tree (''Malus domestica''). Apple trees are cultivated worldwide and are the most widely grown species in the genus '' Malus''. The tree originated in Central Asia, where its wild ancest ...
and
Samsung The Samsung Group (or simply Samsung) ( ko, 삼성 ) is a South Korean multinational manufacturing conglomerate headquartered in Samsung Town, Seoul, South Korea. It comprises numerous affiliated businesses, most of them united under the ...
are overcoming the issue of app wrapping. Aside from the fact that app wrapping is a legal grey zone, and may not meet its actual aims, it is not possible to adapt the entire
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common daemon (computing), services for computer programs. Time-sharing operating systems scheduler (computing), schedule tasks for ef ...
to deal with numerous wrapped apps. In general, wrapped apps available in the
app store An App Store (or app marketplace) is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not include the running of the c ...
s have also not proven to be successful due to their inability to perform without MDM.


System features

An end-to-end mobile application management solution provides the ability to: control the provisioning, updating, and removal of mobile applications via an enterprise
app store An App Store (or app marketplace) is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not include the running of the c ...
, monitor application performance and usage, and remotely wipe data from managed applications. Core features of mobile application management systems include: *App
configuration Configuration or configurations may refer to: Computing * Computer configuration or system configuration * Configuration file, a software file used to configure the initial settings for a computer program * Configurator, also known as choice bo ...
*App delivery (Enterprise App Store) * App performance monitoring *App updating *App version management *App wrapping * Crash log reporting *Event management * Push services *Reporting and tracking * Usage analytics *
User Ancient Egyptian roles * User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty * Useramen, an ancient Egyptian vizier also called "User" Other uses * User (computing), a person (or software) using an ...
& group
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
*User
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicatin ...


See also

*
Over-the-air programming Over-the-air programming (OTA programming) refers to various methods of distributing new software, configuration settings, and even updating encryption keys to devices like mobile phones, set-top boxes, electric cars or secure voice communication ...
*
Mobile security Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business ...
*
List of Mobile Device Management software This is a list of Mobile Device Management software. General information Discontinued These are the discontinued Mobile Device Management solutions: * Good Technology - acquired by BlackBerry on November 2, 2015. * McAfee EMM - discontinued si ...


References

{{DEFAULTSORT:Mobile Application Management Mobile telecommunication services Application Management Application Management