Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 696

Mobile Application Management (MAM)

What is Mobile Application Management (MAM)?

Mobile Application Management (MAM)Controls that protect corporate data inside specific mobile applications without taking full management of the underlying device.


MAM enforces policy at the app layer: data-loss prevention (no copy/paste to personal apps), app-level encryption, conditional access, selective wipe of corporate data, and required app version. Solutions such as Microsoft Intune App Protection, Workspace ONE, and Android Work Profile rely on platform APIs (iOS Managed App Configuration, Android Enterprise) or SDKs that wrap business apps. MAM is the typical choice for BYOD because the employer manages only the work apps and not the personal phone, preserving user privacy. It is weaker than full MDM against a compromised device, so it is often combined with device-trust signals and zero-trust access conditions.

Examples

  1. 01

    An Intune App Protection policy blocks copy/paste from Outlook into a personal note-taking app.

  2. 02

    When an employee leaves, the company triggers a selective wipe of corporate apps on their personal phone.

Frequently asked questions

What is Mobile Application Management (MAM)?

Controls that protect corporate data inside specific mobile applications without taking full management of the underlying device. It belongs to the Mobile Security category of cybersecurity.

What does Mobile Application Management (MAM) mean?

Controls that protect corporate data inside specific mobile applications without taking full management of the underlying device.

How does Mobile Application Management (MAM) work?

MAM enforces policy at the app layer: data-loss prevention (no copy/paste to personal apps), app-level encryption, conditional access, selective wipe of corporate data, and required app version. Solutions such as Microsoft Intune App Protection, Workspace ONE, and Android Work Profile rely on platform APIs (iOS Managed App Configuration, Android Enterprise) or SDKs that wrap business apps. MAM is the typical choice for BYOD because the employer manages only the work apps and not the personal phone, preserving user privacy. It is weaker than full MDM against a compromised device, so it is often combined with device-trust signals and zero-trust access conditions.

How do you defend against Mobile Application Management (MAM)?

Defences for Mobile Application Management (MAM) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Mobile Application Management (MAM)?

Common alternative names include: MAM, App-level management.

Related terms