Alpha Software Blog



With MAM®, What Happens if an Employee Loses a Device?

Republished with permission from Apperian blog

Written by Stephen Skidmore, Director of Product Marketing at Apperian

We frequently encounter the perception that device management (MDM) is the best and only way to ensure corporate apps and data are not compromised when a mobile device is lost or stolen. Yet the requirement to wipe an entire device of its contents is not necessary, nor desired in many situations. MDM isn’t appropriate for BYOD or applicable for other unmanaged devices in the extended enterprise, such as those owned by contractors or your dealer networks, because a device management profile cannot be implemented. Mobile application management (MAM®) is built to secure just what you need to protect — corporate apps and data — and a robust MAM platform should make it easy, with or without MDM.

Touch screen mobile phone in hand

TAKE PREVENTATIVE MEASURES


With stand-alone MAM, you can wrap apps with security policies to implement safeguards before a device goes missing. For example, the ‘corporate authentication’ policy requires users to enter their corporate credentials before the app will open. Additionally, the ‘data-at-rest encryption’ policy, encrypts the data stored in the app, without having to encrypt the entire device. (Read about more mobile app security policies.) If someone attempts unauthorized access, your corporate data won’t be compromised.

WIPE THE DATA


If a “data wipe” policy was applied to the app, then you can remotely delete all of the app’s data, rendering it a useless shell. This command can be issued remotely, without user input, and will eliminate any risk of the app being used in the future. Again, your sensitive corporate data won’t be compromised. This is an extremely powerful tool that can effectively decommission an app on any and every device—even those not under management by MDM.

These preventative and data wipe measures are useful in other situations as well. When an employee leaves the company, a contractor’s engagement ends, or a dealer partnership terminates, you can quickly remove access to apps and data. Disabling enterprise credentials blocks access to an app wrapped with a ‘corporate authentication’ policy. You can also wipe the data stored in the app with the “data wipe” policy.

We believe the true endpoint of mobility isn’t the device, but the corporate apps and data. If a device is lost or stolen, MAM still has your data covered.

Learn more about the benefits of using an enterprise app store and how Alpha Anywhere works with Apperian.
Prev Post Image
The State of Enterprise Mobility Software in 2015
Next Post Image
Average Mobile App Development Costs - How to Slash Costs

About Author

Amy Groden-Morrison
Amy Groden-Morrison

Amy Groden-Morrison has served more than 15 years in marketing communications leadership roles at companies such as TIBCO Software, RSA Security and Ziff-Davis. Most recently she was responsible for developing marketing programs that helped achieve 30%+ annual growth rate for analytics products at a $1Bil, NASDAQ-listed business integration Software Company. Her past accomplishments include establishing the first co-branded technology program with CNN, launching an events company on the NYSE, rebranding a NASDAQ-listed company amid a crisis, and positioning and marketing a Boston-area startup for successful acquisition. Amy currently serves as a Healthbox Accelerator Program Mentor, Marketing Committee Lead for the MIT Enterprise Forum of Cambridge Launch Smart Clinics, and on the organizing team for Boston TechJam. She holds an MBA from Northeastern University.

Related Posts
Top Security Concerns for Low-code and No-code Development
Top Security Concerns for Low-code and No-code Development
10 Top Tips for Low-Code Deployment
10 Top Tips for Low-Code Deployment
How No-Code/Low-Code Can Solve Info Management Woes
How No-Code/Low-Code Can Solve Info Management Woes

The Alpha platform is the only unified mobile and web app development and deployment environment with distinct “no-code” and “low-code” components. Using the Alpha TransForm no-code product, business users and developers can take full advantage of all the capabilities of the smartphone to turn any form into a mobile app in minutes, and power users can add advanced app functionality with Alpha TransForm's built-in programming language. IT developers can use the Alpha Anywhere low-code environment to develop complex web or mobile business apps from scratch, integrate data with existing systems of record and workflows (including data collected via Alpha TransForm), and add additional security or authentication requirements to protect corporate data.

Comment