The Rise and Importance of Mobile Device Management (MDM)/Unified Device Management (UEM): From Chaos to Control
In the ever-connected digital landscape, managing mobile devices has become a critical challenge for organizations. As smartphones, tablets, and wearables infiltrate workplaces, Mobile Device Management (MDM) software emerged as a very importance piece part of a holistic solution.
It’s important to note that the industry was essentially boot-strapped as a reaction to Research In Motion’s Blackberry device and their Network Operations Center (NOC)-based approach. Competitors included Microsoft’s Windows Mobile, Palm OS and others.
Microsoft’s approach was to eliminate the NOC altogether and send encrypted messages directly to end-users. This method relied on the widely adopted Exchange Active Sync (EAS) protocol which was part and parcel of Microsoft’s widely deployed Exchange email system. However, the message flow (i.e., no NOC for store, forward, sync, and encrypt) now required a middleware layer to manage devices by centralized IT. This development led directly to the rise of the so-called Mobile Device Manager (MDM) and the related industry and boom in MDM’s such as AirWatch, MobileIron and many others.
Let’s explore the rise and significance of MDM solutions, including key players like Microsoft System Center Mobile Device Manager, MobileIron, AirWatch, and SOTI.
This BLOG will not get into the seminal roles played by industry innovators such as Good Technology and other early players such as Intellisync/Pumatech and later players such as Divide.
In the early 2000s, mobile devices infiltrated enterprises, but chaos reigned:
- Employees brought their personal devices (BYOD), creating security and management nightmares.
- IT departments struggled to enforce policies, secure data, and track devices.
MDM software emerged as a lifeline for IT administrators:
- Its mission: centralize control, enhance security, and streamline device management.
Key Players in MDM
1. Microsoft System Center Mobile Device Manager (SCMDM)
- Rise: Launched in 2008, SCMDM aimed to extend Microsoft’s dominance to mobile devices.
- Features:
- Policy Enforcement: SCMDM allowed IT to enforce policies across Windows Mobile devices.
- Application Deployment: IT could push apps and updates remotely.
- Security: Encryption, remote wipe, and password policies.
- Importance: SCMDM laid the groundwork for modern MDM solutions.
2. Ivanti (form. MobileIron)
- Rise: Founded in 2007, MobileIron focused on multi-OS support (iOS, Android, Windows).
- Features:
- Containerization: Securely separate work and personal data.
- Zero Trust: Assume every device is untrusted until proven otherwise.
- App Management: Deploy, update, and secure apps.
- Importance: MobileIron championed the zero-trust approach, anticipating today’s security landscape.
3. AirWatch (Now VMware Workspace ONE)
- Rise: AirWatch, founded in 2003, gained prominence in the mid-2010s.
- Features:
- Unified Endpoint Management (UEM): Beyond mobile, AirWatch managed PCs and wearables.
- Geofencing: Trigger actions based on device location.
- Identity Management: Seamless user authentication.
- Importance: AirWatch’s UEM vision aligned with the convergence of devices.
4. SOTI
- Rise: SOTI, founded in 1995, expanded into MDM.
- Features:
- Rugged Device Management: Ideal for industries like logistics and manufacturing.
- IoT Management: Beyond smartphones, SOTI handles IoT devices.
- Remote Support: Troubleshoot devices remotely.
- Importance: SOTI’s rugged device focus addressed specialized needs.
5. Others: JAMF, BlackBerry UEM, IBM MaaS360
- JAMF: Dominates Apple device management (macOS, iOS).
- BlackBerry UEM: BlackBerry’s evolution from phones to UEM.
- IBM MaaS360: Comprehensive UEM solution.
Security, Compliance and Productivity
While not being categorized as ‘security’ per se, Mobile Device Management or Unified Device Management (UEM) does enable centralized IT to apply policies on each device frequently in an Over-the-Air (OTA) manner.
MDM ensures devices comply with policies (encryption, passcodes, etc.).
- Protects against data breaches and unauthorized access.
- Unfortunately, the main focus of MDM/UEM’s is on management per se and less on per device security.
- MDM Streamlines app deployment, updates, and configurations.
- Enables remote troubleshooting.
- MDM bridges personal and work devices.
- Essential for the remote work revolution.
In this context, KoolSpan has played a significant role in the field of secure mobile communications, particularly in encrypting calls and messages on Android and iPhones. The company’s platform ensures crystal-clear, high-quality audio for encrypted calls. KoolSpan’s legacy lies in its contribution to mobile security and data protection.
Conclusion
MDM software plays a vital role in terms of allowing centralized IT to manage and enforce polices (e.g., white-listing, black-listing of websites, enforcement of messaging policies, etc.) but it does not focus on end-to-end DAR and DIT protection. For this reason, best of breed MDM’s such as MobileIron (now owed by Ivanti) have teamed with KoolSpan to provide and end-to-end encrypted experience ensuring the privacy and fidelity of communications.
Koolspan’s roots were established in the early days of the Smartphone, preceding the Apple and Google twin announcements of 2007 by five years. This experience in the market, historical teaming with mobile ecosystem players ranging from well-known OEMs such as Samsung, LG and others to tight relationships with major telecommunications carriers including AT&T, has all helped to position KoolSpan as a leader in secure communications.
Recently (April 2024), Forrester published a report on secure communications which can be found here: The Secure Communications Solutions Landscape, Q2 2024 KoolSpan is properly recognized as one of a handful of companies that they found were leaders in this specialized market segment.
With KoolSpan TrustCall and KoolSpan TrustCall Dome, your data can be kept within your own information technology perimeter, on customer premises, or via a protected cloud hybrid environment, such as a virtual machine hosted in the cloud.
KoolSpan never sees your data, much less actively data-mines. KoolSpan encrypted text, voice, video, and file-sharing products put the power of control back to IT and away from end-users.
For more information visit koolspan.com