Gartner’s first MAM analysis reveals an encouraging yet entangled ecosystem
Analyst house Gartner has released an inaugural report assessing the state of mobile application management (MAM), and found an emerging yet highly complex ecosystem.
The emergence of MAM as a separate entity, after Gartner renamed its mobile device management (MDM) Magic Quadrant to enterprise mobility management (EMM) last year taking into account a wider list of options for organisations to get their head around, gives a shot in the arm to the sector – the analyst house noted a doubling of enquiries for clients seeking MAM advice in 2015.
Yet it is not entirely straightforward to negotiate. Gartner sees the ecosystem as having four types of capability; standalone MAM, EMM suites which incorporate MAM, app-centric security tools, and MAM capabilities within mobile app development platforms (MADP).
Apperian, one of the vendors cited in the report and an established standalone MAM player with customers including the US Transportation Security Agency, argues the report validates its standalone approach as well as the market in general. “This report highlights a rapidly growing market, as well as clarifying the different vendors that play in this market,” said Chris Hazelton, Apperian director of product marketing and strategy. “As more companies realise that they need to manage apps with or without device management, this report will guide them through their decision making process.”
The MAM report breaks down each vendor type by four business use cases; a BYOD organisation, enterprises with highly regulated and sensitive data, organisations with a large catalogue of apps, or firms with an existing EMM investment but limited budget. Gartner argues standalone MAM is the full solution for BYOD, while app-centric security tool providers, such as Bluebox, Pulse Secure and Sophos, fit the bill for highly regulated industries.
It is clear that different vendors suit different roles, yet in terms of how the report is organised, Hazelton argues the need to classify and clarify different MAM offerings is important. “There are a lot of acronyms in IT and enterprise mobility,” he explained. “[The report] clarifies the MAM capabilities and reach for a wide range of vendors when it comes to securing and managing mobile apps. Prospects can see side by side how the different categories of MAM meet their needs, and that for large scale app deployments, standalone MAM is the obvious choice.”
Gartner asserts organisations should revisit their mobility strategies every six to 12 months, so where does MAM fit into that? “A lot of companies have deployed MDM, and the takeaway here is that IT should evaluate whether MDM is really allowing them to support and enable their users with mobile apps,” said Hazelton.
“MDM is about setting up and managing devices, MAM is more about putting apps in the hands of users,” he added. “Organisations should look closely at MAM and the vendors that offer it to make sure they are able to deploy managed and secured apps to all users.”
Ultimately, given the boost for MAM in this report, it remains one aspect of an overall, integrated enterprise mobility solution. With almost 400 companies out there providing mobility software of some description, whether it’s an MADP, MDM, MAM, or anything else, Gartner’s analysis is certainly of help to those looking for clarity in an increasingly complex landscape.
You can find a link to the full report (registration required) here.
Interested in hearing industry leaders discuss subjects like this and sharing their use-cases? Attend the co-located IoT Tech Expo, Blockchain Expo, AI & Big Data Expo and Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam and explore the future of enterprise technology.
- » Companies need to disclose their cybersecurity risk to attract investors, study finds
- » How the CIO can win over the most tech-resistant and tech-reluctant employees
- » As user privacy and MDM become more incompatible – the new guide to BYOD vs company devices
- » The six key steps to improve your enterprise’s mobile maturity
- » Using AI to secure the modern world – where enterprises are particularly vulnerable