Citisoft Blog

Enterprise Mobility Management: What’s the Buzz About?

Written by Bashi Pirasteh | Jun 22, 2016

As a consultant within the Investment Management industry, I often find myself face-to-face with a new buzzword thrown around by that one group of tech savvy gurus at my client’s office.  You probably know the group—they always have the latest technology gadgets, are usually on beta software, and are driven by innovation. I enjoy their company because they challenge me and prepare me for the next big thing (and can offer invaluable IT advice when I’m in a pinch!).

You may recall a few years back, the newest buzzword was ’the Cloud’ which was typically followed by ‘Big Data’. When I’m hanging around the tech guru group these day though, they’re more likely to be discussing EMM.  If you haven’t been tuned into the buzz lately, EMM stands for Enterprise Mobility Management.  The concept fairly self-explanatory, but Wikipedia offers a succinct definition:

Enterprise mobility management (EMM) is the set of people, processes and technology focused on managing mobile devices, wireless networks, and other mobile computing services in a business context.

Asset managers continue to grow global operations and workers have become increasingly reliant on mobile devices to keep connected.  Owing much to the pressures of seamless cross-border operations, EMM has become a critical part of an investment manager’s IT strategy. EMM may not be top of mind for most operations teams, but it has touchpoints throughout the organization, particularly when it comes to data governance.

When you consider the amount of secure data that resides on mobile devices (especially in our industry), it’s clear that EMM should be a priority consideration for operational risk management. While your resident tech gurus are hopefully well-versed in the nuts and bolts of EMM strategy, it’s worth getting acquainted with the topic to get a holistic picture of your organization’s risk management and data control policies (more on holistic governance in this blog post).

When considering how EMM might integrate into enterprise risk-management and data governance policies, you can think of four key touchpoints:

Device Management—This applies enterprise security settings to mobile devices across multiple mobile service providers and multiple mobile OS.

Application Management—This provides application level controls which secure specific enterprise applications without disturbing personal applications such as Twitter/Personal email accounts.

Content Management—This allows secure access to enterprise data and content repositories from individual mobile devices. 

Access Management—This controls and grants user access to the enterprise data via authentication and authorization actions. 

A great time to consider these requisites is often during a technology replacement project when you are reviewing your organizational, data, and security policies. Even if there is no big project on the horizon, it’s worthwhile to pick the brains of the tech gurus to potentially help your team better manage risk. If nothing else, you’ll be in-the-know on latest tech buzz the next time you hit the water cooler.