Skip to Content

According to Gartner’s Strategic Planning Assumption, 70% of mobile professionals will be working on their own smart mobile devices using at least one kind of application containment by 2017.


In order to ensure that mobile device and app usage continues to grow exponentially to meet this statistic, it is important to be aware of technologies that meet security criteria yet don’t negatively impact the user experience. If you ever confused when security capabilities in EMM, MAM, and MADP technologies then read on!

Gartner analyst Jason Wong recently published a research note titled “How to Choose Among MADP, MAM and EMM Security Controls for Mobile Apps”. The research note provides great summary of the security capabilities in each product and also features a case study on an SAP customer who went through great measures to revamp their mobile app security strategy. The strategy needed a facelift when the company switched from BlackBerry to iPhone and Android devices (as many companies have). In order to meet all of their security guidelines yet keep the apps simple, they selected a combination of products to meet their needs.

I encourage you to download and read the full research note, available here. I’ll give you some of the highlights. First, the company used Mobile Device Management (SAP Afaria) alongside app wrapping (SAP Mobile App Protection by Mocana). They met device level security requirements and also eliminated the need for penetration testing for mobile apps, which were becoming costly and time consuming. The company also used Mocana Atlas to eliminate the multiple authentication steps necessary to access many enterprise mobility applications.  This case study is a great example of how to use SAP Mobile Secure, SAP Mobile Platform, and SAP Mobile App Protection by Mocana and Mocana Atlas platform to cover all the bases. In the end, the company has achieved stellar results and rock solid security.

This particular case study shows how multiple technologies including MADP, EMM/MDM, and MAM can be combined for optimal security and usability. Gartner gives excellent advice and clarifies when and why different approaches are relevant for different use cases. So click through the form and get your copy. It is well worth a read – I hope you enjoy it!

To report this post you need to login first.

Be the first to leave a comment

You must be Logged on to comment or reply to a post.

Leave a Reply