Kony

admin/ August 4, 2018/ descriptive

what is mobile application management

Skip to main content

  • 1-888-323-9630
    • USA :  + 1-407-730-KONY (5669)
    • USA :  + 1-650-645-2200
    • India :  + 91-40-4499-1000
    • Australia :  + 61-3-9024-9800
    • United Kingdom :  + 44 020-8629-7170
    • Germany :  + 49 (0) 221-5540-5375
  • Contact Us
  • Get Started
  • Log In



×

HOW CAN WE HELP YOU?
  • Contact sales
  • Request a demo
  • Get support

Kony

menu 

Kony
  • 1-888-323-9630
    • USA :  + 1-407-730-KONY (5669)
    • USA :  + 1-650-645-2200
    • India :  + 91-40-4499-1000
    • Australia :  + 61-3-9024-9800
    • United Kingdom :  + 44 020-8629-7170
    • Germany :  + 49 (0) 221-5540-5375
  • Contact Us
  • Get Started
  • Log In

menu 

  • Featured
  • Videos
  • White Papers
  • Analyst Reports
  • Webinars
  • Case Studies
  • Data Sheets

Mobile Application Management

Mobile application management (MAM) refers to the software and the services that provide and control access for both employee- and company-owned smartphones and tablets to mobile apps in a business context. The mobile apps in question can be either commercially available to the public or developed internally within the company. Mobile application management  is different from MCM and MDM because it focuses on applications that the devices use rather than the management of the devices themselves or the content on them. MAM allows the system administrator to have less control over devices but more control over their applications, while MDM can incorporate both types of management.

With a MAM system , the company can have control over what mobile apps it provides to employees, when those apps are updated, and when they are removed from devices. Generally, MAM will incorporate an enterprise app store that is similar to the typical app store on a mobile device for the purposes of supplying updates and adding and removing apps from use. This also allows the company to keep track of how the app performs and how it is used. In addition, the system administrator will be able to remotely remove, or wipe, all data from these applications.

The major features of a MAM system include delivery, updating, wrapping, version and configuration management, performance monitoring, tracking and reporting, event management, usage analytics, user authentication, push services, crash log reporting, and user authentication. As mobile devices become much more widely used in the business world, being able to employ these features across a range of devices and operating systems becomes a much more pressing issue. MAM offers a simple solution to this problem.

‹ Back to glossary

Share this glossary:




Related Kony Products

  • Kony Fabric
ALERT

Do More with Your Databases – Complimentary Webinar!

  • Topics

    • Cloud Computing
    • Security
    • Big Data
    • Online Privacy
    • Personal Tech
    • Technology Trends
    • IT Business
    • Data Management
  • Webinars

  • Downloads

  • Dictionary

  • Tutorials

  • Q & A

  • Trending

    • Virtualization
    • Machine Learning
    • Big Data
    • Enterprise
    • Development
  • More

    • About
    • Advertising Info
    • Contact Us
    • Contributors
    • Newsletters
    • Videos
    • Write for Us

  • Home
  • Dictionary
  • Tags
  • Security

Mobile Application Management (MAM)

Definition – What does Mobile Application Management (MAM) mean?

Mobile application management (MAM) is a type of security management related to the use of specific mobile apps. In general, MAM is practiced in the business world to provide security for the types of software products installed on smartphones, tablets and mobile devices.

Techopedia explains Mobile Application Management (MAM)

In tandem with mobile device management (MDM), MAM is part of a larger field that provides more control over a device’s specific operating system (OS) and firmware settings. Both security management practices have emerged with the common use of smartphones in personal and business situations.

Specifically, MAM and MDM are emerging enterprise security components because of a phenomenon known as Bring Your Own Device (BYOD), where many employees use their personal devices to access company data, or use company-issued devices in ways that have the potential to jeopardize data assets.

In struggling with the BYOD movement and mobile security, businesses are trying to limit unauthorized use of internal data without harming the job function capability of their employees. For example, if a sales force has critical internal information in a remote database, and the company can save money by allowing sales professionals to use their personal smartphones in sales/client interactions, the company still must try to ensure that these devices are locked to unauthorized viewing or data theft.

MAM focuses on locking down mobile apps, allowing more secure information access. An example is the use of auto-login password technology. As with laptop or desktop computers, many mobile device users can set their devices up to remember individual app passwords. This streamlines logins but also means that another individual has the ability to go straight into a mobile app to view sensitive company data. MAM may include controls and techniques that disable or prevent auto-logins, allowing individual apps to be built with better overall security.

Share this:

Related Terms

  • Mobile Device Management (MDM)

  • Bring Your Own Device Policy (BYOD Policy)

  • Endpoint Security

  • Network Security

  • Username

  • Bring Your Own Technology (BYOT)

  • .NET Enterprise Server

  • .NET Framework Configuration Tool

  • 128-Bit Encryption

  • 256-Bit Encryption

Techopedia - Where IT and Business Meet

Tech moves fast! Stay ahead of the curve with Techopedia!

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.



Related Articles






Moving to SharePoint 2013 – Is It Worth It?






Cloud Evolution: How We See and Use the Cloud Has Changed






Web Roundup: Awesome Angles on IoT






CYOD: The Latest Acronym in the Mobileverse






Mobile Device Management vs. Mobile Application Management: The Big Fight Continues






3 Defenses Against Cyberattack That No Longer Work

Loading....

+ View More Articles


Featured Q&A

  • How can cloud computing save money?

  • What is the difference between big data and data mining?

  • What is the difference between big data and Hadoop?

More of your questions answered by our Experts

Related Tags

Security Mobile Computing Tablets Technology Trends

Resources

New Whitepaper: Best Ways to Extend Endpoint Management and Security to Mobile Devices

New Whitepaper: Best Ways to Extend Endpoint Management and Security to Mobile Devices:

Complimentary Webinar - Getting Control of Your BYOD Program with UEM

Complimentary Webinar – Getting Control of Your BYOD Program with UEM:

Systems Monitoring for Dummies

Systems Monitoring for Dummies:

What's really going on in that Cisco ASA of yours?

What’s really going on in that Cisco ASA of yours?:

E-Book: Compliance is Not Enough: Planning a Complete Security Strategy

E-Book: Compliance is Not Enough: Planning a Complete Security Strategy:

Latest Articles






How AI Advancements Are Affecting Security, Cybersecurity and Hacking






How Data Storage Infrastructure Is Being Redefined Today






Is Your Customer Data Really Safe? How It Can Be Exposed






5 SQL Backup Issues Database Admins Need to Be Aware Of






Is the AI Revolution Going to Make Universal Income a Necessity?

ABOUT

  • About
  • Advertising Info
  • Contact Us
  • Write for Us

CONTENT

  • Topics
  • Dictionary
  • Q&A
  • Tutorials

TOPICS

  • Cloud Computing
  • Security
  • Big Data
  • Online Privacy
  • Machine Learning
  • IT Business
  • Data Management
  • All Topics

CONNECT

  •  Facebook
  •  Twitter
  •  LinkedIn
  •  Google Plus
  •  Feed

MORE

  • Webinars
  • Downloads
  • Newsletters

Techopedia Terms:   
#    
A    
B    
C    
D    
E    
F    
G    
H    
I    
J    
K    
L    
M    
N    
O    
P    
Q    
R    
S    
T    
U    
V    
W    
X    
Y    
Z    

Copyright © 2018 Techopedia Inc. – Terms of Use –
Privacy Policy

Quantcast