Mar 14, 2016
What Users are Saying about MDM
Enterprise mobility has evolved quite a bit in recent years. It wasn’t that long ago that companies utilized mobile device management (MDM) as a means of managing mobility within the enterprise. However, research and verbatim responses increasingly demonstrate that users don’t like MDM, especially when it’s applied to monitoring, managing, and controlling their personal devices. For instance, a Harris study commissioned by Fiberlink reveals that employees have grave concerns about a company’s ability to watch over how they use their personal devices. 82% of employees who were surveyed say they consider the ability to be tracked an invasion of their privacy. Meanwhile, 76% say they wouldn’t give an employer access to view which apps are installed on their device. And given the choice, 75% say they wouldn’t allow an employer to install an app which gives the company the ability to locate them in exchange for access to corporate resources. It’s not just employees who are wary of draconian mobile management capabilities. A separate study, the Bitglass 2015 Security Report, found that 40% of security administrators choose not to participate in the same mobile policies that they enforce for their companies. According to the same study, the majority of the 2,242 employees who were surveyed said they would participate in a BYOD program if their employer was able to protect corporate data but could not view, alter, or delete personal data and applications. 67% of employees expressed this view, while 64% of IT workers voiced the same opinion. Industry analysts have also expressed reservations about the burdens imposed by MDM tools. “We think some IT organizations that are used to having strong controls in place on mobile devices are going to implement MDM policies that are just too onerous,” Gartner analyst Van Baker shared with CIO Magazine. In fact, Baker predicted that one in five BYOD programs would fail by this year due to the deployment of MDM measures that are too restrictive. For example, some IT departments have implemented MDM controls that require employees to jump through multiple passwords, according to the CIO article. MDM requires employees to allow access to their personal devices in order to use enterprise apps, and that’s a choice most employees aren’t willing to make. This helps explain why a growing number of enterprises are opting instead to using mobile application management (MAM®) as it is less intrusive than MDM, more secure, and easier to administer. Using MAM, an employee’s personal contacts, apps, photos, and data can remain separate from the enterprise apps and data that are managed. Meanwhile, app-level data containment and security policies are more flexible and easier to implement. Ultimately, it’s an organization’s apps and data that are the most critical assets that need to be secured and managed–not an employee’s personal device. This is why MAM represents the most logical future for enterprise mobility. To learn more about how MAM is an important part of any approach to mobile security, download the "Complete Guide to Mobile Security" below.