With MAM®, What Happens if an Employee Loses a Device?

Blog



With MAM®, What Happens if an Employee Loses a Device?

Republished with permission from Apperian blog

Written by Stephen Skidmore, Director of Product Marketing at Apperian

We frequently encounter the perception that device management (MDM) is the best and only way to ensure corporate apps and data are not compromised when a mobile device is lost or stolen. Yet the requirement to wipe an entire device of its contents is not necessary, nor desired in many situations. MDM isn’t appropriate for BYOD or applicable for other unmanaged devices in the extended enterprise, such as those owned by contractors or your dealer networks, because a device management profile cannot be implemented. Mobile application management (MAM®) is built to secure just what you need to protect — corporate apps and data — and a robust MAM platform should make it easy, with or without MDM.

Touch screen mobile phone in hand

TAKE PREVENTATIVE MEASURES


With stand-alone MAM, you can wrap apps with security policies to implement safeguards before a device goes missing. For example, the ‘corporate authentication’ policy requires users to enter their corporate credentials before the app will open. Additionally, the ‘data-at-rest encryption’ policy, encrypts the data stored in the app, without having to encrypt the entire device. (Read about more mobile app security policies.) If someone attempts unauthorized access, your corporate data won’t be compromised.

WIPE THE DATA


If a “data wipe” policy was applied to the app, then you can remotely delete all of the app’s data, rendering it a useless shell. This command can be issued remotely, without user input, and will eliminate any risk of the app being used in the future. Again, your sensitive corporate data won’t be compromised. This is an extremely powerful tool that can effectively decommission an app on any and every device—even those not under management by MDM.

These preventative and data wipe measures are useful in other situations as well. When an employee leaves the company, a contractor’s engagement ends, or a dealer partnership terminates, you can quickly remove access to apps and data. Disabling enterprise credentials blocks access to an app wrapped with a ‘corporate authentication’ policy. You can also wipe the data stored in the app with the “data wipe” policy.

We believe the true endpoint of mobility isn’t the device, but the corporate apps and data. If a device is lost or stolen, MAM still has your data covered.

To learn more about the benefits of using an enterprise app store and how Alpha Anywhere works with Apperian, click here.
The State of Enterprise Mobility Software in 2015
The Price of Mobile Development and How to Slash Costs

About Author

Amy Groden-Morrison
Amy Groden-Morrison

Amy Groden-Morrison has served more than 15 years in marketing communications leadership roles at companies such as TIBCO Software, RSA Security and Ziff-Davis. Most recently she was responsible for developing marketing programs that helped achieve 30%+ annual growth rate for analytics products at a $1Bil, NASDAQ-listed business integration Software Company. Her past accomplishments include establishing the first co-branded technology program with CNN, launching an events company on the NYSE, rebranding a NASDAQ-listed company amid a crisis, and positioning and marketing a Boston-area startup for successful acquisition. Amy currently serves as a Healthbox Accelerator Program Mentor, Marketing Committee Lead for the MIT Enterprise Forum of Cambridge Launch Smart Clinics, and on the organizing team for Boston TechJam. She holds an MBA from Northeastern University.

Related Posts
Updating Mobile Apps Just Got WAY Easier
Updating Mobile Apps Just Got WAY Easier
"Alpha-Launch" Another Productivity Tool from Alpha to Reduce the Time to Development for Enterprise-Grade Mobile Apps“
The Compelling Case for Deploying to Alpha Cloud
The Compelling Case for Deploying to Alpha Cloud

Comment

Subscribe To Blog

Subscribe to Email Updates