Development of MDM, EMM and UEM and the difference between them
Mobile Device Management
Indicates for managing mobile devices running iOS or Android. The technology includes tools for their configuration and basic security. With MDM, you are able to set up an unlock lock, Wi-Fi, email client and install apps on all devices, for example.
Enterprise mobility management
It is the next evolution of facilities management, where MDM is the cornerstone. In addition, it includes MAM (Mobile Application Management) tools for securing corporate applications and MCM (Mobile Content Management) tools for managing documents and securing access to corporate resources. Typically, EMM systems enable the security of corporate data using an encrypted container. Security gateways are available for access to internal websites or network storage. Thanks to tight integration, it is possible to allow or block access in real time based on the status of the managed device in MDM.
Unified endpoint management
UEM systems then represent the next level, extending management capabilities to all company facilities. This means not only mobile platforms, but also desktop systems and IoT solutions. Thanks to modern APIs in most current operating systems, it is possible to manage all company devices from one admin console, anywhere in the world.
This is a big advantage over the traditional way of managing Windows OS computers using Active Directory Group Policies (GPo). Alternatively, use tools such as Microsoft SCCM / ConfigMg (System Center Configuration Manager). These were designed for managing stations and servers within a local area network (LAN) and are not suitable for managing devices outside the network perimeter. Many companies are starting to take an interest in adopting modern Windows 10/11 management.
There is virtually no pure MDM tool on the market today and most solutions offer EMM functionality. Market leaders such as Microsoft, VMware, Soti or Ivanti provide comprehensive solutions in the area of Unified Endpoint Management.
In addition, a very strong position is held by e.g. Jamf as a specialized tool for managing Apple devices. Or, for example, Soti is very strong in managing rugged Android devices, widely used e.g. in logistics.
Modern security concept
Now let’s go back to the needs of businesses, cloud adoption and security aspects.
Security measures cannot be overlooked with the move to the cloud .
At the outset, every company should ask itself whether it really wants to allow uncontrolled access to company data. Regardless of whether the equipment meets at least the basic safety requirements.
- What if the user loses it and it’s not set up with a device lock or encrypted
- What if it uses an outdated operating system with known vulnerabilities?
- Can a company computer accessed from the Internet be considered secure if it is away from the company for a long period of time?
It is for these reasons that modern security concepts are coming to the fore. Traditional network perimeter protection with the cloud does not work and it is not easy to distinguish which access is secure or not.
The basic premise of the Zero Trust concept is “trust no one, always verify”.
By tightly integrating IAS (identity management), UEM and XDR (enhanced detection and response) systems, it is possible to assess user access from a given device in real time. And it’s for a specific application. And then either allow or block access.