The lightening evolution of enterprise mobility is changing the definition of Mobile Device Management (MDM) as quickly as the numbers shift at a telethon.
Several interrelated trends – including the increasing popularity of telework, the explosive rise of highly functional smartphones and tablets and the consumerization of IT/Bring Your Own Device (BYOD) — has made the old definition of MDM essentially meaningless.
The challenge is that there seems to be little agreement on what the new definition is. The base level – the “old” MDM – is pretty well established. Charles Brett, the Vice President and Principal Analyst for Constellation Research, breaks MDM into three categories: Mobile Device Management (MoDM), Mobile Apps and Data Management (MADM) and Mobile Enterprise Management (MEM).
The first category, Brett said, covers what formerly was the lion’s share of MDM: The ability to remotely switch off, wipe and perform fairly rudimentary device management tasks. In Constellation’s view, the next step up – MADM – looks at the interrelationship between the mobile device and the applications that they download and use. The upper third of the pyramid is MEM. This incorporates BYOD issues such as protecting corporate and personal data loaded into the same smartphone or tablet.
A Mercurial Sector
Following the category is not easy. Constellation, for instance, follows a mix of vendors that likely are a mix of familiar and unknown to all but the closest observers. A recent report from the firm identified Airwatch, Amtelnet, BoxTone, Capricode, Equinux, FancyFon, Fiberlink, Good Technology, Kaseya, MAD, Nukona, SAP, SOTI, Tangoe and Trellia. That seems to be nothing more than a good start. “We are tracking between 40 and 60 different vendors in this space,” Brett said. “Half are in the first or are moving up to the second. We’ve seen something like ten or 12 who now really fall into the MEM category.”
The MoDM, MADM, MEM pyramid and the players associated with it is Constellation’s take. The challenge is that there seem to be as many approaches as there are players.
For instance, MDM vendor Tangoe agrees that MDM is highly fragmented. However, they see the shards differently. Custie Crampton, the company’s Vice President of MDM Solutions, said that Tangoe sees the MDM hierarchy divided into five categories: security; application management; telecom expense management (TEM); content management and BYOD.
MobileIron holds a third view into how MDM breaks out. Product Manager Sean Ginevan suggests that the three categories are basic security, automation – enabling users to self-serve and thus take pressure off IT – and application development and management. “We believe you have to have a strong tie MDM, mobile device security and application management into the same platform,” Ginevan said.
Finally, John Herrema, the Senior Vice President of Corporate Strategy for Good Technology, makes the case that, in essence, all roads to MDM go through BYOD. The company’s rationale is pretty simple: BYOD is the wave of the future, and being able to adequately secure and support both personal and mobile devices without causing problems for either is such a difficult task that more mundane elements of MDM – such as managing devices and making sure applications aren’t loaded with malware – will be fairly easy.
The game changer is the idea that the network is no longer closed down and buttoned up, so to speak. That changes the nature of MDM. “When you are using the BYOD model, the old rules of management don’t apply,” Herrema said.
Defining MDM from the functional standpoint is the main issue facing the sector – but not the only one. Another challenge vendors need to deal with is tracking who within the organization is in control.
In the earlier stages of mobility, the responsibility for determining how mobile devices were managed was handled by the business units. Security wasn’t as huge a problem as it is today, and departments – from HR to accounting and marketing – and beyond needed to make sure that mobile devices had the functionality for the tasks at hand. The deep enfranchisement of mobility and the far greater value of the data, application and access rights connected with it are leading IT to demand more control.
A structure that relies on the IT department at the device management and security level and line of business personnel at the application layer likely will emerge. “That would be the typical break point,” Crampton said. “IT would handle the core functions and the business units would handle things from the functional perspective.”
It is unlikely that the definition of MDM will be settled any time soon. There are two things to watch for: On one hand, the category is ripe for M&As, close confederations between vendors and other landscape shifters. On the other hand, the accepted definition of MDM likely will cover all the important elements of mobility. In other words, the now discreet tasks that must be performed in order to support mobile workers – security, application management, BYOD and the rest – may become elements of an integrated MDM stack. Mobile Device Management could remain fragmented and fuzzy — or become the unified field theory of corporate mobility.