Mobile Device Management

The proliferation of both employer- and employee-owned mobile devices in the workplace presents new challenges for IT management and security. The variety of devices, operating systems, and apps — many of which may conflict with existing organizational standards — requires new configuration, reporting, and support capabilities.

Latest Research

  • For Infrastructure & Operations Professionals

    REPORT: Drive Employee Productivity With Rugged Mobile Moments

    Ensure That Your Device Strategy Meets The Rugged Requirements Of Employees In Less-Than-Ideal Conditions

    August 10, 2017 J. P. Gownder, Andrew Hewitt

    Delivering on a strategy to improve your business' customer experience or supplying an employee with key data might hinge on greater resilience than your average iPhone provides. The only way to ensure that a device can withstand certain conditions is by ruggedization — a process that uses a set of rigorous certifications to increase longevity and effectiveness of employee devices in harsh environments and nontraditional settings. This report gives infrastructure and operations (I&O) professionals our latest research on the rugged market and helps them match the right rugged technology to the right employees in their immediate context. This is an update of a previously published report; Forrester reviews and revises it periodically for continued relevance and accuracy.

  • For Infrastructure & Operations Professionals

    REPORT: Vendor Landscape: Enterprise Mobility Management (EMM) Solutions, 2017

    The First Wave Of EMM Has Matured But Stands On The Verge Of Evolution

    July 28, 2017 Andrew Hewitt, David K. Johnson

    While infrastructure and operations (I&O) pros have historically employed enterprise mobility management (EMM) solutions to address mobile device management and security, these solutions are expanding to take on new business applications. This broader remit includes unified endpoint management (UEM), internet of things (IoT), and advanced analytics. This report examines key functions and trends that shape the present and future of the EMM market and takes a look at the vendors that make up the EMM landscape.

  • For Security & Risk Professionals

    REPORT: Build A Cross-Functional Mobile Security Team

    Organization: The Mobile Security Playbook

    February 22, 2017 Chris Sherman

    As security leaders look to support business engagement with customers, partners, and employees through mobile, they often discover gaps in team expertise. To better organize talent, security execs must divide mobile security responsibilities among existing security operations and architecture roles, They must also partner with the office of the CIO and business leaders on strategic initiatives. The goal is to build a cross-functional group of security strategy and ops staff with clear responsibilities. This report explains the elements of an effective mobile security team.

  • For Infrastructure & Operations Professionals

    REPORT: The State Of IoT Management

    Bet On Emerging Ecosystems To Help Smooth Business Integration

    February 16, 2017 Christopher Voce, Michele Pelino, Andrew Hewitt

    Connected solutions enable businesses to optimize processes, enhance offerings, and transform their own business models. They generate streams of valuable customer and operational data. While business leaders salivate over the potential of harnessing these insights, infrastructure and operations (I&O) pros struggle to deliver because of immature, unfamiliar management offerings that fail to connect the internet of things (IoT) to traditional systems. This report helps I&O pros overcome the challenges to develop effective IoT management strategies.

  • For Security & Risk Professionals

    REPORT: Define A Compelling Strategy To Secure And Protect Mobile Moments

    Strategic Plan: The Mobile Security Playbook

    February 14, 2017 Laura Koetzle, Chris Sherman, Michele Pelino

    This report helps security and risk (S&R) leaders develop comprehensive strategic mobile security plans to secure and protect both employees' and customers' mobile moments — without degrading the quality of those experiences. Developing a comprehensive mobility strategy requires S&R leaders to: 1) collaborate with executives and decision-makers across the business; 2) communicate the need for a comprehensive mobile strategy; 3) understand current and future mobility requirements; and 4) develop and document a future road map. This is an update of a previously published report; Forrester reviews and updates it periodically for continued relevance and accuracy.

View all research

Analysts Who Cover Mobile Device Management

View all related analysts