Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.


Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Click here to hide

MaaS360 by Fiberlink

Businesses exploring the advantages of mobile apps

A recent survey by mobile application platform developer Kony Solutions, in conjunction with MGI Research, identified several business priorities for mobile applications.

Businesses exploring the advantages of mobile apps

apps, byod, mobile device management

As enterprises embrace mobility trends such as bring-your-own-device (BYOD), it is important for companies to identify which features and capabilities are the most important. By identifying the essential functions they need to provide, businesses can begin adopting solutions that respond directly with employee and consumer needs.

A recent survey by mobile application platform developer Kony Solutions, in conjunction with MGI Research, identified several business priorities for mobile applications. Fifty-three percent of respondents said they are currently planning to develop between one and five business-to-employee applications. Development of customer service apps and customer engagement were ranked among the highest priorities. However, many companies face challenges in supporting multiple platforms and performance.

The survey also found more businesses plan to use hybrid applications. Although 59 percent of companies currently use them, that number is expected to reach 71 percent over the course of 12 months.

"These results are consistent with the fast-moving adoption of mobile apps, " said Igor Stenmark, managing director of MGI Research. "Through this survey, we see that organizations that are focused holistically on the entire mobile application ecosystem - from planning through design and development, to deployment and management - are getting outstanding results and ROI from their mobile app investments. With such a heavy emphasis placed on application performance and user experience, more organizations are realizing that a simplistic focus on just time-to-market is no longer the best approach and that a disciplined implementation of a proper mobile application framework enables companies to best meet their mobile business objectives."

The mobile boom: MDM and MAM needed for mobile device security

Although mobility presents advantages, it also presents challenges. According to a recent Federal Computer Week article, both mobile device management (MDM) and mobile application management (MAM) solutions are essential for managing iPhones, iPads, and Androids entering the workplace. The article highlights several must-haves for organizations, including, for example, the ability to enforce encryption and password policies, remote wiping functionality and the ability to detect when a device has been compromised.

"The technology has split into two types of solutions: traditional MDM, which manages the devices, and application management, which manages the app,” said DJ Kachman, Director of Security Assurance and Mobile Technologies at the Veterans Affairs Department. "As we move down the road, we’ll need to have both - one to make sure the devices are healthy, one to make sure the apps are secure."

Mobile device management for enterprises

Federal Computer Week also distinguishes between enterprise-grade MDM and traditional management solutions. While the article focuses on government agencies, the benefits it references can extend to the enterprise world. One of the key features for MDM in business is integration. The solution should be able to efficiently integrate and work with an existing network and software, as well as handle the platforms currently connected to the network.

The next challenge FCW identifies is selecting a delivery model. On-premises solutions often face disadvantages when it comes to data protection and security. By moving data and device management to the cloud, businesses no longer have to store vital information on individual devices. Mobile application management solutions that provide features such as authentication for access control can further enhance security by identifying and controlling which users can access critical applications and resources through the cloud.

Recommended Articles for You

Post a Comment

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments

Industry News
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.