Definition

enterprise mobility

This definition is part of our Essential Guide: Mobile BI tools, trends and best practices guide
Contributor(s): Colin Steele

Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.

The term commonly refers to the use of mobile devices, such as smartphones and tablets, for business purposes. But it also covers the mobility of corporate data and of workers themselves. As an example of enterprise mobility, an employee may upload a presentation from their desktop PC to a cloud storage service, and then access it from a personal Apple iPad to show at a client site.

Enterprise mobility management (EMM) and other technologies have emerged to help IT departments enable mobile workers and to address security risks. A strong acceptable use policy for employees can also contribute to a successful enterprise mobility strategy.

Why enterprise mobility is important

Enterprise mobility is important because it gives employees flexibility and choice, which can improve job satisfaction and increase productivity.

Early enterprise-class mobile devices, such as PalmPilot personal digital assistants and BlackBerry smartphones, were typically employer-provided. These devices focused on providing personal information management capabilities, which included mobile access to email, calendars and contacts.

enterprise mobility management technologies
Enterprise mobility management involves many different technologies.

In 2007, Apple released the first iPhone, and Google followed with its own mobile operating system, Android. The iPhone and Android smartphones targeted consumers, and they helped introduce the concept of app stores to the masses.

As more consumers purchased these smartphones, and as more developers built enterprise apps for them, the bring your own device (BYOD) trend was born. Employees began using their personal smartphones for work -- often without employer permission -- because the devices and their apps enabled them to do their jobs more quickly and with a more streamlined user interface.

At the same time, American workers started to spend increasingly more time out of the office. By 2017, 43% worked remotely on at least a part-time basis, according to a Gallup survey.

In response to these converging trends, organizations adopted BYOD policies and took other steps to formally embrace enterprise mobility and flexible work styles.

In a 2016 survey by research firm Clutch, IT professionals listed improved productivity as the top benefit of embracing enterprise mobility. And a 2017 Gallup survey found that the ability to work remotely and have a flexible schedule was a major factor for employees when choosing whether to take or leave a job.

BYOD is not the only enterprise mobility strategy option, however. Some organizations -- particularly in the government and highly regulated industries, such as finance -- continue to buy devices for employees and lock them down strictly for corporate use. There is also a middle-ground approach called corporate-owned, personally-enabled (COPE). With COPE, an organization buys devices for employees, but with the understanding that they will use them for both business and personal tasks.

Ensuring enterprise mobility security

The BYOD trend stoked fears in IT departments because employees were finding their way around existing security controls and using unmanaged devices to access corporate networks, applications and data.

In the early days of enterprise mobility, mobile device management (MDM) software was the primary security measure. This technology enables IT to remote-wipe devices, enforce the use of passcodes, blacklist and whitelist apps, and otherwise control what users can and can't do on their smartphones and tablets.

Faced with employees reluctant to give IT that much control over their personal devices, organizations turned to more granular enterprise mobility security measures. These included the use of mobile application management (MAM) and identity and access management.

MAM enables IT to control and secure specific apps without managing the rest of the device. Some MAM technologies use application wrapping, which hooks directly into an application's code to provide management capabilities. Others create a secure container for a group of apps to keep them and their data isolated from the rest of the device. There are also some MAM application programming interfaces built directly into Android and Apple iOS.

Identity and access management enables users to log on to multiple types of corporate applications -- including desktop, mobile and cloud apps -- with one set of credentials. This approach aims to simplify the management of multiple user accounts per employee, which can otherwise open organizations up to security risks.

MDM, MAM, and identity and access management capabilities are now typically bundled together as part of larger enterprise mobility management suites.

Major vendors and products

The major enterprise mobility management vendors and their products include VMware AirWatch, Microsoft Intune, MobileIron, IBM MaaS360, BlackBerry Enterprise Mobility Suite and Citrix XenMobile. There are also several stand-alone identity and access management vendors, including Ping Identity, Okta, Centrify and OneLogin. EMM is just one part of the broader enterprise mobility market, however.

Mobile application development also plays a significant role. Organizations that have the in-house resources to build apps themselves may turn to mobile application development platforms (MADPs). These large suites enable developers to test, create, deploy and manage the lifecycle of enterprise mobile apps, but they often require deep expertise. Some of the major MADP vendors are Kony, Microsoft, IBM, SAP and Salesforce.

Rapid mobile application development (RMAD) tools aim to provide a simpler way to build apps and mobilize business processes. They may use technologies such as low- and no-code development, app refactoring and workflow apps. RMAD vendors include Capriza, PowWow Mobile, Sapho and SkyGiraffe.

This was last updated in September 2017

Continue Reading About enterprise mobility

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

4 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

What is your company's enterprise mobility strategy?
Cancel
I guess this is somewhat not an enterprise mobility but corporate data explosion in a public service which can be easily attacked: "The term refers not only to mobile workers and mobile devices, but also to the mobility of corporate data. An employee may upload a corporate presentation from his or her desktop PC to a cloud storage service, then access it from a personal iPad to show at a client site, for example."
Cancel
Enterprise mobility is what Internet was a couple of decades back for enterprise. It's about make sure that all the investments that an enterprise has done in IT over the years is accessible to employees wherever they are. And they are away from their desk most of the time in the modern work environment. Enterprise mobility needs to be looked as a base foundation of the enterprise's digital agenda. Both inwards looking, targeted at employees and external, targeted at enterprise's digital consumers.
Cancel
Enterprise mobility should be managed by the IT department to avoid confidential data being uploaded to unsecure cloud storage. Most important is to find a way to offer productive on-premises access to corporate resources to make sure that users access documents securely.
Therefor an enterprise mobility management solution is essential. It should cover the management of devices, users, content and applications.
Cancel

-ADS BY GOOGLE

Dateiendungen und Dateiformate

Gesponsert von:

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close