IDC Marketshare – EMM

Consumerization of IT has been the major driving trend of this market since the iPhone started appearing in the enterprise eight years ago. While most organizations have come to grips with the fact that their new reality is a multiplatform, mixed ownership device ecosystem, the fact that each organization has unique mobile worker populations and operates in varying compliance environments means there is no one-size-fits-all approach to policy creation. Security and compliance are obvious driving factors for EMM spending. However, the real value-add of EMM is that it allows IT to enable employees with the information they need to do their jobs. IDC has just recently gotten back the results of its yearly mobile enterprise survey, and the results clearly demonstrate enterprises are buying, building, and deploying mobile applications. The more applications organizations roll out, the greater the need for solutions that provide secure access to applications and that data mobile workers need to do their jobs.

We see EMM systems tying into a broad swath of back-end infrastructure, and we believe one of the most important of those is identity infrastructure. In an ideal situation, IT administrators will be able to assign one set of data access policies per user or identity and that will follow them no matter what kind of application or device they are accessing the information from. Mobile devices, wearables, and IoT devices will be able to provide additional layers of authentication and contextual data, ensuring even higher levels of security.

Four key themes that seemed to resonate best with customers last year:

  • providing stringent security without hindering end-user experience,
  • offering a sophisticated mobile content management offering,
  • providing segmented messaging (by vertical or company size), and
  • offering the ability to tie EMM into a broader end-user computing story.

iOS 7 – Enterprise Readiness

In iOS 7, the company introduced managed open in, managed application configurations, and per-app VPN capabilities, all aimed at giving enterprises greater control over corporate applications and data.

EMM Software vs Mobile OS Capabilities – Conflict of interest?

OS providers create differentiated experiences for their devices (or OEM partners’ devices) and raising their relevancy in the enterprise. However, the more of this type of capability that gets built into the OS, the more important it is for EMM providers to find new ways to differentiate their solutions. Failure to do so leaves the vendor competing on price alone, leading to an eventual drop in ASPs.

Phased approach to implementing EMM

  1. Identify mobile device usage policies
  2. Productivity apps
  3. Secure access to custom apps

EMM Offerings

EMM offerings include capabilities that enable the secure management of devices, applications, and content within a mobile computing context.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: