Enterprise mobility management, or EMM, can be an incredibly confusing term for many businesses. While some might assume the term references mobile device management (MDM), EMM can cover so much more than just MDM. Another point of confusion is that many enterprise mobility management providers can’t seem to agree on what constitutes EMM and may offer different features based on the feedback they’ve collected from their own clients.
So, choosing the right enterprise mobility management provider for your own organization can be challenging. To help you out, here are a few tips for finding the right EMM provider for your business:
Tip 1: Remember That EMM is More Than Just MDM
Mobile device management is an important task for enterprises of all sizes—especially those that use a bring-your-own-device (BYOD) policy. However, enterprise mobility solutions need to go beyond just managing disparate mobile devices. A top-tier enterprise mobility management provider will offer an EMM solution that incorporates:
- • Mobile Device Management. Solutions for controlling devices remotely so they can be locked down, wiped, or have their remote location tracking activated from a distance.
- • Mobile Content Management (MCM). Solutions for managing which applications are able to access specific databases or files on the device.
- • Mobile Application Management (MAM). Solutions for allowing admins to set rules or policies for the applications installed on a mobile device.
- • Identity and Access Management (IAM). Solutions for restricting who can access the mobile device as well as its installed apps and data to prevent illicit access by unauthorized users.
An EMM solution that is lacking any one of these elements is not a true “mobile for enterprises” solution. If the EMM provider cannot offer controls for apps, data, devices, and user access privileges for all the above, then the enterprise mobility solution is incomplete.
Tip 2: Consider the Scalability of the EMM Solution
How easy is it to scale the EMM provider’s solution for your organization? Is the solution something designed from the ground up to be suitable only for larger or smaller businesses? Will the cost of the solution be too much if your organization grows? How easy is it to integrate new mobile devices into the EMM solution?
All of these questions help you identify the scalability of an enterprise mobility management solution—which is must-know information for growing businesses. Having an EMM solution doesn’t help much if it will need to be replaced as soon as your organization starts nearing its growth goals (or if the cost of maintaining the solution after hitting your growth goals is too high).
Additionally, knowing how easy it is to plug new mobile devices into the EMM solution is crucial for long-term success as well. If the addition of new mobile devices is too difficult or complicated, then the chances of the new devices not being protected properly increases dramatically.
Tip 3: Look for Enterprise Mobility Solutions with a Unified Dashboard
Most true EMMs will have a unified management dashboard to help users centralize their mobility management efforts. Haphazard custom solutions that combine multiple tools with an ill-conceived API across multiple management dashboards reduce efficiency and makes managing enterprise mobility solutions more of a pain than it needs to be.
Top-tier EMM solutions have a unified dashboard that makes controlling your enterprise’s mobile devices easier, not harder. This dashboard can include features like color-coded indicators to highlight the status of mobile devices—such as green for online and secure, orange/red for online but not properly secured, and gray for offline.
Tip 4: Check if the EMM Provider’s Solution Will Work While Offline
A lot of employees will try to find workarounds for the enterprise’s EMM solution—attempting to disable security controls to improve device performance or to avoid an annoying login process. While this does highlight the need for a near-seamless user experience so employees don’t attempt to remove device protections, it also highlights a need to tamper-proof the enterprise mobility solution.
Online security parameter checks are one tamper-proofing measure—helping to verify the protections on a device by checking them against a blueprint on the organization’s EMM solution server. But, what about when the device is offline or disconnected from the organization’s network? How can you ensure that all the right security parameters are being enforced then?
Offline security setting checks, where the on-device client compares the device’s current security configurations against a locally-stored settings library, can help alleviate concerns about device tampering for offline devices.
For example, Kandji’s own security configuration tools run offline security configuration checks every three minutes on macOS devices—minimizing the risk of tampering with security parameters.
These are just a few tips for finding the best EMM provider and solution for your own business’ needs.
Curious about how Kandji’s offline security configuration checks work for Macs? Test them out for free on up to 10 Macs!