Mobile application management (MAM) describes the
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
and
services responsible for provisioning and controlling access to internally developed and commercially available
mobile app
A mobile application or app is a computer program or software application designed to run on a mobile device such as a smartphone, phone, tablet computer, tablet, or smartwatch, watch. Mobile applications often stand in contrast to desktop appli ...
s used in business settings, on both company-provided and 'bring your own'
mobile operating system
A mobile operating system is an operating system used for smartphones, tablets, smartwatches, smartglasses, or other non-laptop personal mobile computing devices. While computers such as laptops are "mobile", the operating systems used on the ...
s as used on
smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s and
tablet computer
A tablet computer, commonly shortened to tablet, is a mobile device, typically with a mobile operating system and touchscreen display processing circuitry, and a rechargeable battery in a single, thin and flat package. Tablets, being computers ...
s.
Mobile application management provides granular controls at the application level which enable
system administrator
An IT administrator, system administrator, sysadmin, or admin is a person who is responsible for the upkeep, configuration, and reliable operation of computer systems, especially multi-user computers, such as Server (computing), servers. The ...
s to manage and secure application or 'app' data.
MAM differs from
mobile device management
Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of ...
(MDM), which focuses on controlling the entire device, and requires that users enroll or register their device, and install a service agent.
[
While some enterprise mobility management (EMM) suites include a MAM function, their capabilities may be limited in comparison to stand-alone MAM solutions, because EMM suites require a device management profile in order to enable app management capabilities.
]
History
Enterprise mobile application management has been driven by the widespread adoption and use of mobile applications in business settings. In 2010
The year saw a multitude of natural and environmental disasters such as the 2010 Haiti earthquake, the Deepwater Horizon oil spill, and the 2010 Chile earthquake. The 2009 swine flu pandemic, swine flu pandemic which began the previous year ...
, the International Data Corporation
International Data Group (IDG, Inc.) is an American market intelligence and demand generation company focused on the technology industry. IDG, Inc.'s mission is centered around supporting the technology industry through research, data, market ...
(IDC) reported that smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
use in the workplace
A workplace is a location where someone works, for their employer or themselves, a place of employment. Such a place can range from a home office to a large office building or factory. For industrialized societies, the workplace is one of the ...
will double between 2009 and 2014.
The 'bring your own device
Bring your own device (BYOD ) (also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own personal computer (BYOPC)) refers to being allowed to use one's personally owned device, rather than being required to use ...
' (BYOD) phenomenon is a factor behind mobile application management,[ with personal PC, smartphone, and tablet use in business settings, vs. business-owned devices, rising from 31 per cent in 2010 to 41 per cent in 2011. When an ]employee
Employment is a relationship between two party (law), parties Regulation, regulating the provision of paid Labour (human activity), labour services. Usually based on a employment contract, contract, one party, the employer, which might be a cor ...
brings a personal device into an enterprise setting, mobile application management enables the corporate information technology
Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
(IT) staff to download required applications, control access to business data, and remove locally cached business data from the device if it is lost or stolen, or when its owner no longer works with the company.
Use of mobile devices in the workplace is also being driven from above. According to Forrester Research
Forrester Research, Inc. is a research and advisory firm. Forrester serves clients in North America, Europe, and Asia Pacific. The firm is headquartered in Cambridge, Massachusetts, Cambridge, MA with global offices in Amsterdam, London, New D ...
, businesses now see mobile as an opportunity to drive innovation across a wide range of business processes.[McCarthy, John C., and Pelino, Michele, 'Mobile Management takes a 180-degree turn', '']Forrester Research
Forrester Research, Inc. is a research and advisory firm. Forrester serves clients in North America, Europe, and Asia Pacific. The firm is headquartered in Cambridge, Massachusetts, Cambridge, MA with global offices in Amsterdam, London, New D ...
'', 11 August 2011 Forrester issued a forecast in August 2011 predicting that the "mobile management services market" would reach $6.6 billion by 2015 – a 69 per cent increase over a previous forecast issued six months earlier.[
Citing the plethora of mobile devices in the enterprise – and a growing demand for mobile apps from employees, line-of-business decision-makers, and customers – the report states that organizations are broadening their "mobility strategy" beyond mobile device management to "managing a growing number of mobile applications".][ Mobile application management has started using machine learning and behavior tracking to improve app security and enforce company policies, especially for personal devices used in the workplace (BYOD).]The advent of Internet of Things (IoT) has been changing lives for the better. It is not limited to homes but, has a pivotal role connecting teams, devices and decisions. With more connected devices, there is a boost in data generation, data analysis and reporting.
App wrapping
App wrapping was initially a favoured method of applying policy to applications as part of mobile application management solutions.
Normally, application wrapping is performed using a SDK from an application or EMM seller that permits an engineer or administrator to convey an API that empowers the board arrangements to be set up. For instance, an application wrapping API would permit an administrator to control who can download a portable application and whether corporate information got to by that application can be reordered. Application wrapping can be applied during interior advancement of programming or sometime later to off-the-rack programming buys essentially by adding executable code through the SDK.[computerworld.com/article/3209907/app-wrapping-the-key-to-more-secure-mobile-app-management.html]
Quite possibly the most broadly utilized portable application stages, Microsoft's Office 365, likewise gives its own extraordinary arrangement of issues respect to the board. Before, Office 365 didn't permit application the executives by means of outsider EMM supports; that usefulness was accessible just through its InTune cloud-based administration.
Increasingly, the likes of Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
and Samsung
Samsung Group (; stylised as SΛMSUNG) is a South Korean Multinational corporation, multinational manufacturing Conglomerate (company), conglomerate headquartered in the Samsung Town office complex in Seoul. The group consists of numerous a ...
are overcoming the issue of app wrapping. Aside from the fact that app wrapping is a legal grey zone, and may not meet its actual aims, it is not possible to adapt the entire operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
to deal with numerous wrapped apps. In general, wrapped apps available in the app store
An app store, also called an app marketplace or app catalog, is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not i ...
s have also not proven to be successful due to their inability to perform without MDM.
System features
An end-to-end mobile application management solution provides the ability to: control the provisioning, updating, and removal of mobile applications via an enterprise app store
An app store, also called an app marketplace or app catalog, is a type of digital distribution platform for computer software called applications, often in a mobile context. Apps provide a specific set of functions which, by definition, do not i ...
, monitor application performance and usage, and remotely wipe data from managed applications. Core features of mobile application management systems include:
*App configuration
Configuration or configurations may refer to:
Computing
* Computer configuration or system configuration
* Configuration file, a software file used to configure the initial settings for a computer program
* Configurator, also known as choice board ...
*App delivery (Enterprise App Store)
* App performance monitoring
*App updating
*App version management
*App wrapping
* Crash log reporting
*Event management
* Push services
*Reporting and tracking
Tracking may refer to:
Science and technology Computing
* Tracking, in computer graphics, in match moving (insertion of graphics into footage)
* Tracking, composing music with music tracker software
* Eye tracking, measuring the position of ...
* Usage analytics
*User
Ancient Egyptian roles
* User (ancient Egyptian official), an ancient Egyptian nomarch (governor) of the Eighth Dynasty
* Useramen, an ancient Egyptian vizier also called "User"
Other uses
* User (computing), a person (or software) using an ...
& group access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
*User authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
See also
*Over-the-air programming
An over-the-air update (or OTA update), also known as over-the-air programming (or OTA programming), is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network.
These embedded systems inc ...
*Mobile security
Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The Information security, security of pe ...
* List of Mobile Device Management software
References
{{DEFAULTSORT:Mobile Application Management
Mobile telecommunication services
Application Management
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
Application Management
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...