This resource is no longer available
MAM Offers Security, But With Limits
Mobile device management is a necessary security measure, but it’s not a cure-all, and it doesn’t enable productivity. Enter mobile application management (MAM), which organizations can use to provide employees with secure access to corporate apps and data.
In this interactive classroom, you’ll learn about the various approaches to MAM, including application wrapping, enterprise app stores and dual persona technology -- and how they can benefit your business and users alike. We discuss the pros and cons of MAM.
Our lessons also include a look at how IT administrators can use MAM with mobile device management (MDM) for bring your own device (BYOD) administration. Finally, we taste the alphabet soup of enterprise mobility management options, including MAM, MDM and mobile information management.
- 13 May 2014
- 15 May 2014
- Virtual Environment