mobilephones
blog

What are MDM, MAM and MCM? What functions are really necessary from the perspective of information leakage countermeasures [Series] Thorough consideration of smartphone security (5) | Business + IT

By mobilephones 03/01/2023 502 Views

Solve business issues by integrating IT and management

What is Business + IT?

Login

Newsletter registration

What is Business + IT?

  • Sales Strategy
  • Cost Reduction
  • Organizational Reform
  • Production and Manufacturing
  • Crisis Management
  • Compliance
  • Energy-saving/environmental response
  • By industry/scale
  • Core system
  • Information system
  • Operation management< /li>
  • Security
  • Network
  • Mobile
  • Hardware
  • Development
  • Related genres

    What are MDM, MAM and MCM? What functions are really necessary from the viewpoint of information leakage countermeasures?

    From the viewpoint of smartphone information leakage prevention, it is easy to understand if you classify it into three layers, "network layer", "OS layer", and "application layer" in order to implement measures, as I explained last time. This time, we will compare these three layers with MDM (Mobile Device Management), MAM (Mobile Application Management), and MCM (Mobile Contents Management), which are classified from the perspective of solutions. Susumu Yoshida, President and Representative Director of Connect One, author of "Security Measures for Business Use of Smartphones", gave us his thoughts on the latest circumstances and data.

    Susumu Yoshida

    Susumu Yoshida

    I'm from Hokkaido. After graduating from the Faculty of Science and Engineering at Waseda University, he joined Honda R&D Co., Ltd. and was involved in the design of large motorcycles for 14 years. After that, he established Connect One Co., Ltd. and assumed the position of president. Released the "ConnectONE Series", which specializes in the concept of connecting multiple terminals and multiple business systems. Get the support of many companies. Currently a member of the Japan Smartphone Security Forum. (Technical Subcommittee Network Working Group Cloud Task Force Leader)

    MDM (Mobile Device Management) Typical MDM functions and their effectiveness

    This continuation is for members only

    From here onwards, only those who have registered as a "Business + IT Premium Member" (registration is free) can use it.

    Register now (free) Log in

    Register as a Business + IT member now.

    All free! Full of benefits for business and IT!

    To the list of topic

    of the completely free smartphone/mobile phone genre

    IT introduction support information for the smartphone/mobile phone genre

    Go to list

    PR

    SB Creative Co., Ltd.

    Business + IT is operated by SB Creative Corp. of the SoftBank Group.

    By registering as a business + IT member, you can subscribe to members-only content and e-mail newsletters, and be invited to special seminars!

    What are MDM, MAM and MCM? [Series] Thorough consideration of smartphone security (5)|Business + IT

    Related Articles

    iPhone12 series accounts for more than 35% of global smartphone sales ~ 2021Q2

    I want ZTE's foldable galaho "CYMBAL-T" to be released in Japan as well!