Skip to main content
App management icon

This post is from the Apperian blog and has not been updated since the original publish date.

Last Updated Feb 26, 2013 — App Management expert

Mobile Application Management vs. Containerization

App Management

The mobile management market is undergoing a metamorphosis. The focus is shifting away from devices to the use of the applications and the enterprise data they interact with; according to 451 Research. In today's enterprise landscape, two approaches to deliver enterprise data to mobile devices reign supreme; mobile application management (MAM) and containerization.

Containerization: Separate & Secure, But Still Attached to the Device Containerization is an approach used by companies to create a separate, encrypted environment for custom, in-house and third-party apps. It’s very similar to what BlackBerry is doing with their new BB10 – creating separate “home screens” for personal and business use. For instance; the container may contain a “third-party email client that is encrypted and separate from the native email client on the device, and can be provisioned and de-provisioned over the air by IT admins.” (451 Research) While the containerization approach protects corporate data and “separates” it from personal data, the user often has to work outside of native apps and enter separate credentials – which is not the most ideal circumstance. Users are looking for a seamless, convenient experience. Containerization may protect the corporate data, but it limits the convenience that makes BYOD so attractive to employees. As a recent ComputerWorld article praising this approach points out, containerization limits the protection of personal information on the device. “…As great as containment is for limiting corporate liability, it doesn't help any personal data that may be lost due to a wipe if the phone is lost or stolen.”

MAM: Secure, Simple – No Strings Attached to the Device Mobile application management or MAM takes a different approach. With MAM, the security and management happens at the app level – not inside a separate box. We like this approach because it keeps the focus on productivity and security. In most cases, these devices are the property of the employee and we respect that. Their stuff is theirs. When you drill down to managing the app security, usage and connections, it’s simpler to remove apps in the case of a lost device or suddenly departing employee. And IT never has to deal with “crossing the line” of personal devices. The best part of Mobile application management is that MAM is based on corporate mobile apps – making selecting apps a self-service operation. When users are empowered to install their own apps, they can be more productive and support costs stay down. Finally, the MAM approach allows IT to focus on delivering tools that keep your team productive and ahead of the competition.

Next Steps: Watch our on-demand Webcast outlining why MAM is a smarter approach to enabling the mobile workforce.

More from the Blog

View more
Apr 30, 2020

Mobile Application Management: A Forward View

App Management
  IT Is Adapting in the Midst of the COVID-19 Pandemic The Coron ...
Read More
May 19, 2019

Sneak Peek: How Are IT Leaders Driving Mobile App Adoption?

App Management
Apperian conducted the The Mobile Enterprise Application Survey to fin ...
Read More
Jan 30, 2019

Part 1: App Security Should Be an Integral Part of Your DevSecOps Process — Not an Afterthought

Application Security
What are the key considerations and components of DevSecOps? The in ...
Read More
Nov 19, 2018

Breaking Down the New California IoT Law

Application Security
Recently California passed legislation regarding the security of all I ...
Read More
Contact Us