There are two types of software for managing mobile devices: MDM and EMM. The difference between them lies in the organization of this very administration.

MDM (Mobile Device Management) – classics in the style of the era of BYOD (Bring Your Own Device). MDM-system works at the level of the mobile device and provides full access to it.

EMM (Enterprise Mobile Management) – more advanced type of programs for working at the application and information level. The matter is in flexibility of division of the personal and corporate data. Depending the functionality EMM-systems are divided into three categories:

  1. Mobile Application Management (MAM)
    Device management at the application level. For example, setting up their access to information (both from the business network and from other applications on the device).
  2. Mobile Identification Management (MIM)
    Functionality limiting the use of a mobile device. For example, assigning user roles or geolocation.
  3. Mobile Content Management (MCM)
    Full control at the level of corporate content. It can include restrictions on copying and pasting, access to business content repositories.


Organization of control

Simple monitoring of how employees use mobile devices on the work network is half the battle.

Productivity increase

The efficiency of communications within the team, the speed of performing “field” work and the productivity of the IT department are growing. Security work and installation of applications on each separate device takes a lot of time, and EMM-systems successfully save it.

Functional management

The administrator issues permissions to use mobile devices in the corporate infrastructure for:

  • email delivery, calendar synchronization and contacts on smartphones and tablets
  • secure data management on mobile devices
  • providing a channel for Virtual Private Network (VPN) connections and Remote Desktop Services

Additional useful functionality

MDM and EMM systems include mobile application management functions: enterprise application storage, sandboxing applications, and mobile cost management.


And again the budget

It is important to understand the amount of productivity that will be available after implementation, and compare the payback. It can be expensive, you need to calculate.

Absence of rules or system administrators

Implementation requires clear understanding of how and by whom data security should be provided. If there are no answers to these questions, the system brings more trouble than pleasure.

Availability of infrastructure

In addition to the rules and administration, the question arises of having the same mobile infrastructure and its integration with existing systems. Sometimes this requires additional investment.

Too much control

Two sides of the same coin

  • there are companies that have so strict rules that not every EMM-system will cope
  • but there are those to whom such control may seem excessive, albeit necessary. Some organizations, and especially their employees, are afraid of security restrictions by means of EMM.

If you want 1) to provide an appropriate level of security for corporate data and 2) improve overall performance, the EMM system is one of the most important tools in your work.