BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.
The term commonly refers to the use of mobile devices, such as smartphones and tablets, for business purposes. But it also covers the mobility of corporate data and of workers themselves. As an example of enterprise mobility, an employee may upload a presentation from their desktop PC to a cloud storage service, and then access it from a personal Apple iPad to show at a client site.
Enterprise mobility management (EMM) and other technologies have emerged to help IT departments enable mobile workers and to address security risks. A strong acceptable use policy for employees can also contribute to a successful enterprise mobility strategy.
Why enterprise mobility is important
Enterprise mobility is important because it gives employees flexibility and choice, which can improve job satisfaction and increase productivity. Plus, by now every organization is already doing some form of enterprise mobility anyway.
Early enterprise-class mobile devices, such as PalmPilot personal digital assistants and BlackBerry smartphones, were typically employer-provided. These devices focused on providing personal information management capabilities, which included mobile access to email, calendars and contacts.
In 2007, Apple released the first iPhone, and Google followed with its own mobile operating system, Android. The iPhone and Android smartphones targeted consumers, and they helped introduce the concept of app stores to the masses.
As more consumers purchased these smartphones, and as more developers built enterprise apps for them, the bring your own device (BYOD) trend was born. Employees began using their personal smartphones for work -- often without employer permission -- because the devices and their apps enabled them to do their jobs more quickly and with a more streamlined user interface.
At the same time, American workers started to spend increasingly more time out of the office. By 2017, 43% worked remotely on at least a part-time basis, according to a Gallup survey.
In response to these converging trends, organizations adopted BYOD policies and took other steps to formally embrace enterprise mobility and flexible work styles.
In a 2016 survey by research firm Clutch, IT professionals listed improved productivity as the top benefit of embracing enterprise mobility. And a 2017 Gallup survey found that the ability to work remotely and have a flexible schedule was a major factor for employees when choosing whether to take or leave a job.
BYOD is not the only enterprise mobility strategy option, however. Some organizations -- particularly in the government and highly regulated industries, such as finance -- continue to buy devices for employees and lock them down strictly for corporate use. There is also a middle-ground approach called corporate-owned, personally-enabled (COPE). With COPE, an organization buys devices for employees, but with the understanding that they will use them for both business and personal tasks.
Ensuring enterprise mobility security
The BYOD trend stoked fears in IT departments because employees were finding their way around existing security controls and using unmanaged devices to access corporate networks, applications and data.
In the early days of enterprise mobility, mobile device management (MDM) software was the primary security measure. This technology enables IT to remote-wipe devices, enforce the use of passcodes, blacklist and whitelist apps, and otherwise control what users can and can't do on their smartphones and tablets.
Faced with employees reluctant to give IT that much control over their personal devices, organizations turned to more granular enterprise mobility security measures. These included the use of mobile application management (MAM) and identity and access management.
MAM enables IT to control and secure specific apps without managing the rest of the device. Some MAM technologies use application wrapping, which hooks directly into an application's code to provide management capabilities. Others create a secure container for a group of apps to keep them and their data isolated from the rest of the device. There are also some MAM application programming interfaces built directly into Android and Apple iOS.
Identity and access management enables users to log on to multiple types of corporate applications -- including desktop, mobile and cloud apps -- with one set of credentials. This approach aims to simplify the management of multiple user accounts per employee, which can otherwise open organizations up to security risks.
MDM, MAM, and identity and access management capabilities are now typically bundled together as part of larger enterprise mobility management suites.
Major vendors and products
The major enterprise mobility management vendors and their products include VMware AirWatch, Microsoft Intune, MobileIron, IBM MaaS360, BlackBerry Enterprise Mobility Suite and Citrix XenMobile. There are also several stand-alone identity and access management vendors, including Ping Identity, Okta, Centrify and OneLogin. EMM is just one part of the broader enterprise mobility market, however.
Mobile application development also plays a significant role. Organizations that have the in-house resources to build apps themselves may turn to mobile application development platforms (MADPs). These large suites enable developers to test, create, deploy and manage the lifecycle of enterprise mobile apps, but they often require deep expertise. Some of the major MADP vendors are Kony, Microsoft, IBM, SAP and Salesforce.
Rapid mobile application development (RMAD) tools aim to provide a simpler way to build apps and mobilize business processes. They may use technologies such as low- and no-code development, app refactoring and workflow apps. RMAD vendors include Capriza, PowWow Mobile, Sapho and SkyGiraffe.