10 Enterprise Mobility Management Solutions: Beyond MDM

The leading enterprise mobility management products, with background about compatibility, differentiators and security for each.
(Page 1 of 2)

Enterprise mobility management (EMM), rather than mobile device management, defines the new approach to managing employee-owned devices. EMM is a less heavy-handed method of handling device security, onboarding, and monitoring.

CXOs realize that mobile devices are a weak link in the enterprise business chain and that security and asset protection are mandatory. The only way to manage the diverse array of devices and user experience with those devices is to setup a management suite that handles security, connectivity, and access to corporate assets.

Bring your own device (BYOD), whether sanctioned by management or IT departments, is a common practice among employees across a broad spectrum of companies. Enterprises now recognize the value in such programs and are in the process of embracing the trend toward company-managed, employee-owned devices. From a practical point of view, BYOD makes sense as it allows employees to use the technology that they chose and that they like. The advantage for enterprises is that employee efficiency, productivity, and happiness increase, while still maintaining an agreeable amount of control and security over network usage and intellectual property.

The ten enterprise mobility management solutions listed here in alphabetical order are all industry-leading solutions for BYOD and corporate-owned mobile devices.


AirWatch originally was a company that helped companies managed so-called ruggedized devices and wireless endpoints. Since that time, the company transitioned into mobile device management. Now owned by VMware, AirWatch helps companies manage mobile devices, email, applications, content, and browsers. It also integrates with a variety of partner solutions that includes directory services, business intelligence, PKI, unified communications, and network access control.

Compatibility and Management

AirWatch supports all major mobile platforms including Android, iOS, Blackberry, Symbian, and Windows. This all-encompassing support gives you and your users maximum flexibility for device choice. Administrators can use whitelists and blacklists to allow or to deny any type of device or platform.

The AirWatch solution includes a self-service portal for automated enrollment and device vetting. Once users have authenticated, associated profiles, applications, and content are granted based on the user, the device, and device ownership.

Key Differentiators

AirWatch was founded in 2003, which makes it an early entrant into the field of wireless device management. Before widespread mobile devices were generally in use, AirWatch was there and that experience shows in its current position as the leading enterprise mobility management provider.

AirWatch offers its solution on-premise or as a cloud service. Either solution is infinitely scalable and companies can switch from on-premise to the cloud solution or vice versa as needs change.


AirWatch describes its security as end-to-end and includes users, devices, applications, content, data, email, and networks. Its solution fully integrates with AD or LDAP and uses policy-based security as well as whitelists and blacklists. Its security measures extend to content with strong encryption, remote content removal, and a secure container known as AirWatch Content Locker.


Citrix is perhaps best known for its WinFrame product and its lightweight application delivery platform. Citrix looks very different now than in its original incarnation. Now Citrix provides virtualization technologies, SaaS solutions, cloud computing, and mobility management software to businesses worldwide. Citrix still delivers enterprise applications to a variety of devices and platforms. Its XenMobile enterprise mobility management solution delivers device and application management services.

Compatibility and Management

Citrix XenMobile is a comprehensive EMM solution that delivers mobile device management (MDM), mobile application management (MAM), and productivity apps to any device. Its EMM solution also secures apps, data, and devices.

Key Differentiators

Citrix has a long history of delivering applications to various platforms and devices, but that’s only one of its differentiators. Its XenMobile solution also includes NetScaler, which is the industry’s leading service delivery platform. Using XenMobile obviates the need for a layered, multi-vendor approach to mobile management. Citrix does it all: It combines the best security for its ShareFile sync and share content management, first-rate application delivery, and scalable growth for your entire enterprise.


Citrix has always regarded security as a design feature in its products. Its ShareFile product uses secure cloud storage using StorageZones and StorageZone Connectors to create secure connections between you and your data. ShareFile uses encryption everywhere and includes remote wipe and content expiration capabilities. ShareFile also tracks, audits, and reports on all user activity, meaning that any data that’s consumed, shared, or touched in any manner has an audit trail associated with it.

Good Technology

Good Technology specializes in secure mobile solutions for general business, financial institutions, and government entities. Good’s focus is on securing apps, data, and mobile devices. The primary goal of Good’s technologies is to protect corporate assets as well as the device the data resides on.

Compatibility and Management

Good Technology’s EMM solution, Good Dynamics, integrates mobile device management (MDM), mobile application management (MAM), mobile content management (MCM), mobile service management (MSM), and a customizable enterprise app store. And like other EMM solutions, Good offers an on-premise and a cloud-hosted solution.

Key Differentiators

Good Technology invented mobile app containerization. Containerization encrypts the app sandbox and logically separates personal data from corporate data so that the two never mix with each other. Employees can use corporate apps on personal devices without worrying about additional security measures – Good takes care of it all for secured corporate apps. Although containerized apps are separated from personal apps, Good’s technology allows you to securely share data between containerized apps for more flexibility.


As previously noted, Good Technology’s solution is security-focused and provides complete end-to-end security for apps, data, and devices. The following is a partial listing of Good’s security measures:

·  App authorization

·  App-level encryption

·  App authentication

·  Single sign-on

·  Strong password enforcement

·  Remote lock/wipe

·  Data loss prevention

·  Secure corporate access behind firewalls


Named as a Leader in almost every Gartner Magic Quadrant report ever published, the enterprise mobile management space is no exception. Big Blue is right up there with the other industry leaders AirWatch, MobileIron, Citrix, and Good Technology. To qualify as a Leader in the Magic Quadrant report an EMM provider must have the highest product revenue in the EMM market, several years of proven customer implementations, customer mind share and extensive partnerships with channel and other technology providers.

Compatibility and Management

IBM’s MobileFirst Managed Mobility Services for enterprise provides security-rich mobile device management for iOS, Android, Blackberry, and Windows Mobile devices.

Key Differentiators

IBM purchased the MaaS360 mobile device management suite to enter the mobile device management game with a running start. MaaS360, now IBM MobileFirst, is a comprehensive mobile management suite that provides all the expected MDM functionality and features. The differentiator here isn’t the software suite, although MobileFirst is a top-notch offering, it is IBM itself. IBM’s long history in the enterprise computing game carries a lot of weight with businesses. There are still plenty of people around who believe that “you never get fired for buying IBM.”


IBM’s MobileFirst, is a secure, cloud-based management suite for devices, apps, and content. Like any good MDM suite, you can configure extreme security and granular policies for enrolled devices. MobileFirst also features privacy settings, secure document sharing, certificate management, AD/LDAP integration, and email access controls.


MobileIron’s sole purpose is enterprise mobility management and has been since its inception in 2007. MobileIron’s EMM is available as a cloud-based service or an on-premise solution. It secures apps, content, and devices regardless of the device type.

Compatibility and Management

MobileIron supports any device, but focuses most of its effort on the market leaders: iOS, Android, and Windows. The management suite is composed of the EMM big three: MDM, MAM, and MCM products and services.

Key Differentiators

MobileIron is one of the true innovators in the mobile space and provides an array of solutions to meet every conceivable enterprise mobile need including a security and management policy engine, an automated configuration client, and an intelligent security gateway. But the innovation doesn’t stop there. MobileIron’s MAM offering covers users with an enterprise app store (Apps@Work) that also secures apps on the device and containerizes them—separating them logically from personal apps and data.

The MCM solution includes Docs@Work, which is an email attachment security application. Plus, users can securely browse corporate intranet content from outside the corporate network without the use of a device-wide VPN using Web@Work.


Other than the standard security fare of encrypting data, enforcing passwords, using strong authentication, MobileIron’s security wrapper also includes per-App VPN, App-level data loss prevention, App reputation services, and a secure App ecosystem through AppConnect and AppTunnel.

Page 1 of 2

1 2
Next Page

Tags: mobile device management, MDM, Enterprise Mobility Management, EMM

0 Comments (click to add your comment)
Comment and Contribute


(Maximum characters: 1200). You have characters left.



IT Management Daily
Don't miss an article. Subscribe to our newsletter below.

By submitting your information, you agree that datamation.com may send you Datamation offers via email, phone and text message, as well as email offers about other products and services that Datamation believes may be of interest to you. Datamation will process your information in accordance with the Quinstreet Privacy Policy.