Latest ICT trends and developments
Person desk

5 ways an enterprise mobility management (EMM) strategy manages data access and compliance

EMM promises greatly increased freedom and flexibility for employees, but there need to be limitations.

The stakes for companies operating an enterprise mobility management (EMM) strategy are rising. Losing data or becoming a victim of fraud can involve both financial and reputational penalties.

Companies that fail to comply with the new, heavier regulations (particularly in the financial sector) can expect yet harsher penalties. The EU is developing a Cybercrime Directive and a new law on data protection, with fines of up to 2% of turnover. This will have ‘far reaching consequences for banks and financial services’.

Meanwhile, the average cost of data breaches for 383 companies participating in research by IBM and Ponemon Institute increased from $3.79 to $4 million within a single year.

While regulatory pressures increase, so does the pressure to adopt EMM strategies. This pressure also comes from your employees who expect to enjoy the increased access, flexibility and efficiency of a matured mobility strategy.

You will be looking to meet requirements on both ends. So here are five ways you can manage data access and compliance, as part of an EMM strategy.

1. A containerised approaching your own device (BYOD) and corporately owned, personally enabled working practices become commonplace.

Although there can be efficiency gains made from these policies, you will be predominantly concerned about the vulnerabilities this introduces to data and compliance. 75% of large organisations suffered staff related security breaches last year.

Simultaneously, employees are reluctant to allow employers to have control over their personal information, with 19% of employees stating concerns about privacy breaches.

Containerisation and app-wrapping capabilities offered by mobile device management (MDM) and mobile application management (MAM) solutions can provide a solution which satisfies both sides. Areas of devices can be specified for corporate use only with related authentication and access levels put in place, while app-wrapping prevents business apps from accessing any personal data on a device. This meets your requirements and protects the privacy of individual end users.

2. Cloud computing

Look at cloud computing solutions as a means of providing widespread access to information for an enterprise. The uptake of cloud computing is increasing across the enterprise industry. Spending on public cloud Infrastructure as a Service hardware and software is forecast to reach $38B, growing to $173B in 2026.

Of course, not all of you will be convinced of its levels of security. Customers from public sector organisations may be particularly hesitant to move their systems across.

It can be a cost-effective and smart solution, providing automatic updates and backup, new software upgrades and unlimited storage capacity, but 41% of businesses admit migration to the cloud is an issue of concern in terms of data privacy and security risks.

Capabilities offered by MDM, MAM, and mobile content management (MCM) can negate these fears. Customers can be given more visibility and control through features such as:

  • Two step authentication.
  • Containerising devices.
  • App wrapping.
  • Remote wiping.

A holistic EMM strategy will give your complete control over how devices and apps are being accessed and used – all from one console.

3. Platform-neutrality

Consider a platform-neutral approach that will permit the maximum amount of data access from both existing and future devices, taking into account the spread of IoT and wearable technology.

“As equipment becomes outdated and reaches its end of supported life, it becomes less efficient, less productive and less secure. Outdated infrastructure does not support modern applications and innovation, and it does not have the resiliency needed to survive today’s threat environment.” – GovLoop

Smart EMM solutions that promote platform-neutrality will allow you to manage multiple devices, applications, platforms, and operating systems – now and in the future.

This will give your end users freedom to work in their preferred manner, while ensuring that the business is always prepared to support and manage these kinds of developments and equip their business to capitalise on new technology and become more creative and innovate as a result.

4. Better communication

Faster and fuller communications between employees and managers through smart EMM deployment mean that it can be easier to deal with compliance. Today, mobile devices record where everyone is at a given time, the activities that take place on their devices, and communications that are made alongside other data such as credit transfers.

A holistic EMM solution can give you full visibility over how devices, apps, and content are being accessed and edited. As part of communications, you can dictate the device areas, applications, and documents that are restricted to particular users, and why. Having such a wealth of information makes it simpler to provide compliance details and detect rogue activity on devices and applications.

5. Clear policies

On the other hand, if a company has not introduced clear policies on device use, access and work timing, there is the potential for misunderstanding or deliberate abuse. 73% of companies experienced an internal information security incident in the past year.

Resellers should work with their customers to clearly define roles, responsibilities, working practices, and disciplinary actions surrounding mobility management. This will set an understanding between your customer’s business and the end users on what is appropriate usage of devices, apps, and data throughout the enterprise. Policies also need to be set around who will own enterprise mobility throughout your customer’s businesses.


A holistic EMM strategy will help you to manage data access and compliance. This can be achieved through security features offered by MDM, MAM, and MCM solutions. You will raise a variety of concerns about security but your reseller can easily allay these.

It is essential, however, that you don’t just rely on the features provided by EMM solutions. Wider conversations, policies, and understandings need to be established throughout their businesses in order for an EMM strategy to really get off the ground. With resellers, customers, and employees all on the same page, data access and compliance can be a cinch.

Comments (0)

Please login

You must be logged in to post a comment.

Cookie preferences

Our website uses cookies. Below, we briefly explain which cookies we use. You can choose not to allow the placement of analytical and/or marketing cookies. You can change your preferences at any time by clicking ‘Cookie Preferences’ in the footer of our website. You can also revoke or grant your permission(s) there. We store cookies to record your cookie preferences. More information about the cookies and the purposes for which specific cookies are stored, who stores these cookies (the provider), and the storage duration of cookies can be found in our Cookie Policy.

  • Always on

    Our websites cannot function properly without certain cookies. These cookies are necessary for the proper functioning of the website, to comply with the law (e.g. being able to demonstrate which cookie preferences you have set) or required for the security of our systems. You cannot disable these cookies.

  • These cookies, also known as statistical cookies, enable us to further develop and improve the functionality of our website by analysing the use of the website. These cookies send information back to our data analytics tools: Google Analytics from Google LLC or Hotjar from Hotjar Ltd.

  • Marketing cookies (tracking cookies) enable us to collect information about your internet behaviour. This allows us to tailor our online marketing campaigns and web content to your interests.