The Future of Mobile Device Management (MDM)

Mobile Device Management (MDM) is a very hot area as it impacts wireless, software/OS, and enterprise mobility.

In our recent MDM research, we have identified the following:

  • Cloud-based MDM applications will take overtake premise-based solutions within the next five years
  • Mind Commerce estimates that the MDM market will grow at a CAGR of 23.3% over the next five years
  • Mind Commerce estimates that revenues for MDM providers will grow at a CAGR of 40% over the next five years
  • There are approximately 180 million Enterprise BYOD devices globally, which is expected to increase 390 million by 2015
  • The US region will lead the market from a regional perspective with an estimated 68 percent of the overall market share

Key issues in enterprise mobility include the current trend towards Bring Your Own  Device (BYOD) in which employees are allowed to choose their mobile/wireless devices to use for work purposes.

BYOD has many implications to the enterprise with the key issue being security.  MDM provides one means of ensuring that there is a management layer to control the user environment and thereby protect corporate data and assets.

Due to increasingly complex issues surrounding mobile OS, applications, and the general wireless device ecosystem, we see mounting importance of MDM over the next five years.  This is also due to enterprise mobility coming to the forefront as corporations seek to better control their overall IT costs, productivity and security.  In terms of the latter, data security and securing corporate assets is of the upmost importance.

In terms of facilitating a custom environment for enterprise, MDM provides a means of efficiently updating the environment and required parameters.  In a previous analyst note we discussed RCS and the Enterprise Dashboard.  This is just one example of how MDM can support enterprise for a customer presentation layer and user interface.

For more information, see:

About Mind Commerce

Analysis of telecom and ICT infrastructure, technologies, and applications.
This entry was posted in Devices, Enterprise, Mobile Data and Applications, Security, Wireless Carriers. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s