Enterprise Mobility Management (EMM)
What is Enterprise Mobility Management (EMM)?
Enterprise Mobility Management (EMM)An integrated platform that combines MDM, MAM, identity, content, and access controls to manage mobile devices and apps across an enterprise.
EMM is the umbrella category that grew out of MDM as organizations needed to manage not only devices but also apps, content, identity, and policy enforcement. A typical EMM platform — Microsoft Intune, VMware Workspace ONE, Jamf, Ivanti Neurons, MobileIron — bundles device enrollment, app distribution, conditional access, certificate management, mobile content management, and integration with the corporate IdP. Modern EMMs are folded into broader Unified Endpoint Management (UEM), which manages mobile devices, laptops, and IoT through one console. EMM is a foundation of zero-trust mobility because policy decisions can rely on device-state attestation rather than network location alone.
● Examples
- 01
Workspace ONE pushes a managed app catalog and a per-app VPN policy to every enrolled iPhone.
- 02
Jamf integrates with Azure AD so a non-compliant Mac is blocked from accessing the corporate VPN.
● Frequently asked questions
What is Enterprise Mobility Management (EMM)?
An integrated platform that combines MDM, MAM, identity, content, and access controls to manage mobile devices and apps across an enterprise. It belongs to the Mobile Security category of cybersecurity.
What does Enterprise Mobility Management (EMM) mean?
An integrated platform that combines MDM, MAM, identity, content, and access controls to manage mobile devices and apps across an enterprise.
How does Enterprise Mobility Management (EMM) work?
EMM is the umbrella category that grew out of MDM as organizations needed to manage not only devices but also apps, content, identity, and policy enforcement. A typical EMM platform — Microsoft Intune, VMware Workspace ONE, Jamf, Ivanti Neurons, MobileIron — bundles device enrollment, app distribution, conditional access, certificate management, mobile content management, and integration with the corporate IdP. Modern EMMs are folded into broader Unified Endpoint Management (UEM), which manages mobile devices, laptops, and IoT through one console. EMM is a foundation of zero-trust mobility because policy decisions can rely on device-state attestation rather than network location alone.
How do you defend against Enterprise Mobility Management (EMM)?
Defences for Enterprise Mobility Management (EMM) typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Enterprise Mobility Management (EMM)?
Common alternative names include: EMM, Mobility management platform.
● Related terms
- mobile-security№ 697
Mobile Device Management (MDM)
Software that lets an organization enroll, configure, monitor, and remotely wipe iOS, Android, macOS, and Windows endpoints from a central console.
- mobile-security№ 696
Mobile Application Management (MAM)
Controls that protect corporate data inside specific mobile applications without taking full management of the underlying device.
- mobile-security№ 123
Bring Your Own Device (BYOD)
A workplace model in which employees use their personally owned smartphones, tablets, or laptops to access corporate applications and data.
- mobile-security№ 694
Mobile App Security
The practice of designing, building, and testing iOS and Android applications to protect user data, prevent reverse engineering, and resist runtime tampering.