Enterprise Mobility is BYOD?

Enterprise Mobility

Enterprise Mobility is deploying, managing and enabling the smartphones and tablets in organization or Enterprise.

  • It enhances the work-life balance,
  • It increases the operational efficiency while increasing the bottom-line

Enterprise Mobility Management







The enterprise mobility management (EMM) industry has responded with technologies like (according Jack’s book)

  • Mobile Device management (MDM)
  • Mobile App Management (MAM)
  • Mobile Virtualization
  • App Wrapping,
  •  “Containerization,”
  • Mobile file syncing.
 All the above are part of BYOD.

1. Mobile Device Management

As you might have already guessed it:)

  •  It is more of “configuration” of the mobile devices
  • Making sure that IT/Corporate  policies are incorporated
  • Monitoring the overall status and health of device.

Implementation models

1. Native MDM solutions :
  • This will provide a management layer that hooks into the firmware MDM features increasingly on offer by device manufacturers (Samsung, Apple etc).
2. Container solutions
  • These are mobile applications hosted either in the cloud or behind the firewall that operate in an isolated ‘container’ on a user’s device
  • With native features of the device (such as copy and paste) locked down for data within the contained environment.
3. Virtual machine solutions
  • create a virtual machine or “identity” for corporate applications and data, which is kept isolated from the personal apps running on the native OS. Again the corporate OS acts as a ‘container’ from which corporate data can’t be copied onto personal applications.

Leaders in MDM space

The following firms are in MDM space , and their position in the industry

2. Mobile App Management (MAM)

Mobile Application Management MAM is the strategy and process around developing/procuring, securing, deploying, accessing configuring, updating and removing (business) applications from mobile devices used.

3. Mobile Virtualization:


Mobile Virtualization — The "Killer App" for Mobile Design and Development
  • Virtualization is a well-known software programming technique applied to run multiple (guest) operating systems (OSes) simultaneously on the same hardware platform.
  • Virtualization software, a.k.a. a Hypervisor, hosts multiple virtual machines (VMs) each of which is capable of running guest OSes by abstracting, partitioning, and multiplexing underlying hardware resources such as computing power, memory, and peripheral devices.
  • Virtualization has already proven its benefits in enterprise and desktop markets. Enterprise virtualization technologies like Citrix Xen and VMware ESX have established their usefulness and dominance in server markets.

4.App Wrapping

MAM has feature call App Wrapping at App level
  • Wraps application as well as data “at the application level” by the corporate.
  • User will “single-sign-on” or  sign-on when you are using the corporate data on the smart-phone/mobile
  • Outside package interacts with the base device and verify the criteria , based on the “corporate” policy
  • Encrypt/decrypt data
Apps in a castle

5. User space containerization

The inside (wrapped) app is modified to not be able to interact with the real device, but to interact with the wrapper instead.
  • Two standard ways this is done is by providing an SDK that corporate apps can be written with and the other is called app wrapping.
  • It should be noted that while using the SDK is the safer option, it will likely lock you in to a single MAM vendor.

6. Mobile file syncing.


BYOD Mobile Sync and Share 3


File sharing should be on corporate private cloud, rather on public clouds.


The all above discussion is part of BYOD.  


1. Blog

2. The Truth about MDM Commoditization

3. What is MDM?

4. 2013 Magic MDM results

5. MDM and all


Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s