MDM vs. MAM

%3CLINGO-SUB%20id%3D%22lingo-sub-90906%22%20slang%3D%22en-US%22%3EMDM%20vs.%20MAM%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-90906%22%20slang%3D%22en-US%22%3E%3CP%3EAll%20the%20talk%20and%20effort%20to%20be%20a%20digital%20business%20puts%20mobility%20squarely%20at%20the%20center%20of%20your%20security%20plan.%20As%20your%20technology%20roadmap%20evolves%2C%20your%20enterprise%20mobility%20management%20(EMM)%20approach%20will%20likewise%20need%20to%20flex%20to%20guard%20your%20company%E2%80%99s%20data%20against%20ever-increasing%20cybersecurity%20hacks.%3C%2FP%3E%0A%3CP%3EDigital%20transformation%20can%20help%20you%20increase%20team%20productivity%20and%20employee%20experiences%2C%20especially%20as%20%E2%80%9Cbring%20your%20own%20device%E2%80%9D%20(BYOD)%20policies%20have%20taken%20firm%20hold.%20Perhaps%20you%E2%80%99ve%20even%20got%20Internet%20of%20Things%20(IoT)%20and%20Artificial%20Intelligence%20(AI)%20on%20your%20radar%20for%20the%20not-too-distant%20future%20to%20capture%20new%20efficiencies%20and%20improve%20decision%20making.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EWhat%E2%80%99s%20the%20best%20way%20to%20secure%20BYOD%20and%20IoT%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20technology%20evolution%20requires%20an%20integrated%20EMM%20plan%20that%20addresses%20the%20complexities%20of%20securing%20hardware%20from%20cross-platform%20ecosystems%20and%20the%20applications%20they%20access%2C%20many%20delivered%20as%20a%20service%20in%20the%20cloud.%20Well-designed%20policies%20are%20not%20fully%20focused%20on%20managing%20devices%2C%20rather%20on%20enabling%20safe%20access%20to%20data%20and%20systems%20from%20a%20wide%20variety%20of%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3ESo%2C%20what%20is%20MDM%20and%20MAM%20anyway%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMobile%20device%20management%20(MDM)%20and%20mobile%20application%20management%20(MAM)%20are%20often%20intertwined%20yet%20play%20distinct%20roles.%20Here%E2%80%99s%20a%20quick%20summary%20of%20their%20characteristics%20and%20purpose%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMDM%3A%20%3C%2FSTRONG%3Eaddresses%20lack%20of%20control%20over%20corporate%20and%20personal%20devices%2C%20and%20lost%20device%20security%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EEnsures%20device%20compliance%20through%20user%20and%20device%20registration%2C%20configuration%20and%20passcode%20management%3C%2FLI%3E%0A%3CLI%3ESecures%20devices%20on%20the%20network%20so%20you%20can%20monitor%2C%20report%2C%20track%20and%20update%20devices%20%E2%80%93%20and%20even%20locate%2C%20lock%20and%20wipe%20devices%2C%20if%20lost%20or%20stolen%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EMAM%3A%20%3C%2FSTRONG%3Eaddresses%20lack%20of%20compliance%20with%20data%20and%20privacy%20requirements%2C%20and%20lost%20data%20retrieval%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EUser%20identity%20policy%2C%20single%20sign-on%20and%20conditional%20access%20tailored%20by%20role%20and%20device%20(with%20Intune%20or%20Active%20Directory%20on%20premises%20or%20in%20the%20cloud)%3C%2FLI%3E%0A%3CLI%3EMonitors%20and%20pushes%20app%20updates%2C%20including%20mobile%20document%20management%20for%20online%20or%20cloud-provisioned%20apps%20like%20SharePoint%20and%20OneDrive%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3EIs%20one%20better%20than%20the%20other%3F%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMDM%20and%20MAM%20are%20not%20exclusive%20of%20each%20other%2C%20and%20for%20most%20scenarios%2C%20together%20they%20can%20help%20you%20confidently%20implement%20and%20enforce%20a%20security%20plan%20that%20grants%20flexibility%20and%20convenience%20with%20accountability%20and%20control.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ETech%20Community%20MVP%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F24070%22%20target%3D%22_blank%22%3EAmmar%20Hasayen%3C%2FA%3E%20shared%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Intune%2FDevice-Security%2Fm-p%2F84943%22%20target%3D%22_blank%22%3Ehis%20story%3C%2FA%3E%20on%20the%20BYOD%20conundrum%2C%20noting%20that%20leadership%20resisted%20registering%20personal%20devices%3A%20%E2%80%9CThe%20solution%20we%20proposed%20is%20to%20get%20licenses%20for%20Intune%2C%20and%20adopt%20the%20Mobile%20Application%20Management%20(MAM)%20approach.%20This%20would%20simplify%20our%20management%20solution%2C%20protect%20corporate%20information%20on%20mobile%20devices%2C%20and%20respect%20any%20privacy%20concerns%20for%20employees.%E2%80%9D%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhat%20challenges%20or%20complexity%20are%20you%20facing%20to%20secure%20myriad%20devices%2C%20documents%20and%20critical%20data%20without%20disrupting%20business%20operations%3F%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-90906%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EActive%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EDigital%20Transformation%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIdentity%20Management%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIntune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Application%20Management%20(MAM)%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMobile%20Device%20Management%20(MDM)%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E%3CLINGO-SUB%20id%3D%22lingo-sub-207375%22%20slang%3D%22en-US%22%3ERe%3A%20MDM%20vs.%20MAM%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-207375%22%20slang%3D%22en-US%22%3E%3CP%3Ethe%20article%20is%3C%2FP%3E%3CBLOCKQUOTE%3E%3CHR%20%2F%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F57724%22%20target%3D%22_blank%22%3E%40Shannon%20O'Donald%3C%2FA%3E%26nbsp%3Bwrote%3A%3CBR%20%2F%3E%3CP%3EAll%20the%20talk%20and%20effort%20to%20be%20a%20digital%20business%20puts%20mobility%20squarely%20at%20the%20center%20of%20your%20security%20plan.%20As%20your%20technology%20roadmap%20evolves%2C%20your%20enterprise%20mobility%20management%20(EMM)%20approach%20will%20likewise%20need%20to%20flex%20to%20guard%20your%20company%E2%80%99s%20data%20against%20ever-increasing%20cybersecurity%20hacks.%3C%2FP%3E%3CP%3EDigital%20transformation%20can%20help%20you%20increase%20team%20productivity%20and%20employee%20experiences%2C%20especially%20as%20%E2%80%9Cbring%20your%20own%20device%E2%80%9D%20(BYOD)%20policies%20have%20taken%20firm%20hold.%20Perhaps%20you%E2%80%99ve%20even%20got%20Internet%20of%20Things%20(IoT)%20and%20Artificial%20Intelligence%20(AI)%20on%20your%20radar%20for%20the%20not-too-distant%20future%20to%20capture%20new%20efficiencies%20and%20improve%20decision%20making.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CEM%3EWhat%E2%80%99s%20the%20best%20way%20to%20secure%20BYOD%20and%20IoT%3F%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EThis%20technology%20evolution%20requires%20an%20integrated%20EMM%20plan%20that%20addresses%20the%20complexities%20of%20securing%20hardware%20from%20cross-platform%20ecosystems%20and%20the%20applications%20they%20access%2C%20many%20delivered%20as%20a%20service%20in%20the%20cloud.%20Well-designed%20policies%20are%20not%20fully%20focused%20on%20managing%20devices%2C%20rather%20on%20enabling%20safe%20access%20to%20data%20and%20systems%20from%20a%20wide%20variety%20of%20devices.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CEM%3ESo%2C%20what%20is%20MDM%20and%20MAM%20anyway%3F%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMobile%20device%20management%20(MDM)%20and%20mobile%20application%20management%20(MAM)%20are%20often%20intertwined%20yet%20play%20distinct%20roles.%20Here%E2%80%99s%20a%20quick%20summary%20of%20their%20characteristics%20and%20purpose%3A%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EMDM%3A%20%3C%2FSTRONG%3Eaddresses%20lack%20of%20control%20over%20corporate%20and%20personal%20devices%2C%20and%20lost%20device%20security%3C%2FP%3E%3CUL%3E%3CLI%3EEnsures%20device%20compliance%20through%20user%20and%20device%20registration%2C%20configuration%20and%20passcode%20management%3C%2FLI%3E%3CLI%3ESecures%20devices%20on%20the%20network%20so%20you%20can%20monitor%2C%20report%2C%20track%20and%20update%20devices%20%E2%80%93%20and%20even%20locate%2C%20lock%20and%20wipe%20devices%2C%20if%20lost%20or%20stolen%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CSTRONG%3EMAM%3A%20%3C%2FSTRONG%3Eaddresses%20lack%20of%20compliance%20with%20data%20and%20privacy%20requirements%2C%20and%20lost%20data%20retrieval%3C%2FP%3E%3CUL%3E%3CLI%3EUser%20identity%20policy%2C%20single%20sign-on%20and%20conditional%20access%20tailored%20by%20role%20and%20device%20(with%20Intune%20or%20Active%20Directory%20on%20premises%20or%20in%20the%20cloud)%3C%2FLI%3E%3CLI%3EMonitors%20and%20pushes%20app%20updates%2C%20including%20mobile%20document%20management%20for%20online%20or%20cloud-provisioned%20apps%20like%20SharePoint%20and%20OneDrive%3C%2FLI%3E%3C%2FUL%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%3CEM%3EIs%20one%20better%20than%20the%20other%3F%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EMDM%20and%20MAM%20are%20not%20exclusive%20of%20each%20other%2C%20and%20for%20most%20scenarios%2C%20together%20they%20can%20help%20you%20confidently%20implement%20and%20enforce%20a%20security%20plan%20that%20grants%20flexibility%20and%20convenience%20with%20accountability%20and%20control.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETech%20Community%20MVP%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F24070%22%20target%3D%22_blank%22%3EAmmar%20Hasayen%3C%2FA%3E%20shared%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Intune%2FDevice-Security%2Fm-p%2F84943%22%20target%3D%22_blank%22%3Ehis%20story%3C%2FA%3E%20on%20the%20BYOD%20conundrum%2C%20noting%20that%20leadership%20resisted%20registering%20personal%20devices%3A%20%E2%80%9CThe%20solution%20we%20proposed%20is%20to%20get%20licenses%20for%20Intune%2C%20and%20adopt%20the%20Mobile%20Application%20Management%20(MAM)%20approach.%20This%20would%20simplify%20our%20management%20solution%2C%20protect%20corporate%20information%20on%20mobile%20devices%2C%20and%20respect%20any%20privacy%20concerns%20for%20employees.%E2%80%9D%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EWhat%20challenges%20or%20complexity%20are%20you%20facing%20to%20secure%20myriad%20devices%2C%20documents%20and%20critical%20data%20without%20disrupting%20business%20operations%3F%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CHR%20%2F%3E%3C%2FBLOCKQUOTE%3E%3CP%3E%3CBR%20%2F%3Egood%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
Retired

All the talk and effort to be a digital business puts mobility squarely at the center of your security plan. As your technology roadmap evolves, your enterprise mobility management (EMM) approach will likewise need to flex to guard your company’s data against ever-increasing cybersecurity hacks.

Digital transformation can help you increase team productivity and employee experiences, especially as “bring your own device” (BYOD) policies have taken firm hold. Perhaps you’ve even got Internet of Things (IoT) and Artificial Intelligence (AI) on your radar for the not-too-distant future to capture new efficiencies and improve decision making.

 

What’s the best way to secure BYOD and IoT?

 

This technology evolution requires an integrated EMM plan that addresses the complexities of securing hardware from cross-platform ecosystems and the applications they access, many delivered as a service in the cloud. Well-designed policies are not fully focused on managing devices, rather on enabling safe access to data and systems from a wide variety of devices.

 

So, what is MDM and MAM anyway?

 

Mobile device management (MDM) and mobile application management (MAM) are often intertwined yet play distinct roles. Here’s a quick summary of their characteristics and purpose:

 

MDM: addresses lack of control over corporate and personal devices, and lost device security

  • Ensures device compliance through user and device registration, configuration and passcode management
  • Secures devices on the network so you can monitor, report, track and update devices – and even locate, lock and wipe devices, if lost or stolen

 

MAM: addresses lack of compliance with data and privacy requirements, and lost data retrieval

  • User identity policy, single sign-on and conditional access tailored by role and device (with Intune or Active Directory on premises or in the cloud)
  • Monitors and pushes app updates, including mobile document management for online or cloud-provisioned apps like SharePoint and OneDrive

 

Is one better than the other?

 

MDM and MAM are not exclusive of each other, and for most scenarios, together they can help you confidently implement and enforce a security plan that grants flexibility and convenience with accountability and control.

 

Tech Community MVP Ammar Hasayen shared his story on the BYOD conundrum, noting that leadership resisted registering personal devices: “The solution we proposed is to get licenses for Intune, and adopt the Mobile Application Management (MAM) approach. This would simplify our management solution, protect corporate information on mobile devices, and respect any privacy concerns for employees.”

 

What challenges or complexity are you facing to secure myriad devices, documents and critical data without disrupting business operations?

 

1 Reply

the article is


@Shannon O'Donald wrote:

All the talk and effort to be a digital business puts mobility squarely at the center of your security plan. As your technology roadmap evolves, your enterprise mobility management (EMM) approach will likewise need to flex to guard your company’s data against ever-increasing cybersecurity hacks.

Digital transformation can help you increase team productivity and employee experiences, especially as “bring your own device” (BYOD) policies have taken firm hold. Perhaps you’ve even got Internet of Things (IoT) and Artificial Intelligence (AI) on your radar for the not-too-distant future to capture new efficiencies and improve decision making.

 

What’s the best way to secure BYOD and IoT?

 

This technology evolution requires an integrated EMM plan that addresses the complexities of securing hardware from cross-platform ecosystems and the applications they access, many delivered as a service in the cloud. Well-designed policies are not fully focused on managing devices, rather on enabling safe access to data and systems from a wide variety of devices.

 

So, what is MDM and MAM anyway?

 

Mobile device management (MDM) and mobile application management (MAM) are often intertwined yet play distinct roles. Here’s a quick summary of their characteristics and purpose:

 

MDM: addresses lack of control over corporate and personal devices, and lost device security

  • Ensures device compliance through user and device registration, configuration and passcode management
  • Secures devices on the network so you can monitor, report, track and update devices – and even locate, lock and wipe devices, if lost or stolen

 

MAM: addresses lack of compliance with data and privacy requirements, and lost data retrieval

  • User identity policy, single sign-on and conditional access tailored by role and device (with Intune or Active Directory on premises or in the cloud)
  • Monitors and pushes app updates, including mobile document management for online or cloud-provisioned apps like SharePoint and OneDrive

 

Is one better than the other?

 

MDM and MAM are not exclusive of each other, and for most scenarios, together they can help you confidently implement and enforce a security plan that grants flexibility and convenience with accountability and control.

 

Tech Community MVP Ammar Hasayen shared his story on the BYOD conundrum, noting that leadership resisted registering personal devices: “The solution we proposed is to get licenses for Intune, and adopt the Mobile Application Management (MAM) approach. This would simplify our management solution, protect corporate information on mobile devices, and respect any privacy concerns for employees.”

 

What challenges or complexity are you facing to secure myriad devices, documents and critical data without disrupting business operations?

 



good 

Related Conversations
Tabs and Dark Mode
cjc2112 in Discussions on
35 Replies
Extentions Synchronization
Deleted in Discussions on
3 Replies
flashing a white screen while open new tab
Deleted in Discussions on
14 Replies
Stable version of Edge insider browser
HotCakeX in Discussions on
35 Replies