Mobile Information Management (MIM) ensures the secure provision of corporate data on mobile devices. Along with Mobile Device Management (MDM) and Mobile Application Management (MAM), it is another important component of Enterprise Mobility Management. MIM leverages technologies and practices such as encryption, cloud services, sandboxing, containers and others.
What is MIM (Mobile Information Management)?
The abbreviation for mobile information management is MIM. The term translates into German as “mobile information management.” The goal of mobile information management is to securely provide corporate information and data for use on mobile devices. The data should be protected against unauthorized access, manipulation, and theft or loss.
MIM ensures secure, cross-device mobile access to all data required for daily work. Only authorized users, applications, and devices are allowed to access corporate data. In addition to mobile device management (MDM) and mobile application management (MAM), mobile information management is another important component of enterprise mobility management.
In some cases, there are overlaps with mobile content management (MCM). Technologies and processes such as encryption, cloud-based provisioning, and synchronization of data, containers, and sandboxing are used for MIM.
MIM and Enterprise Mobility Management (EMM)
The abbreviation EMM stands for Enterprise Mobility Management. EMM combines various solutions and processes for the secure management of mobile devices, data, and applications used in a company under a holistic approach. In addition to MIM, Mobile Application Management (MAM), Mobile Device Management (MDM), and, in some concepts, Mobile Content Management (MCM) are components of EMM solutions.
While MDM focuses on the secure management of mobile devices, the task of MAM is the management and provision of enterprise applications and software. The MCM manages access to enterprise resources and content such as cloud services, data servers, and other services. There are overlaps in the scope of tasks between the MCM and the MIM.
EMM focuses on both company-owned mobile devices and privately-owned mobile devices used for business purposes in the case of Bring Your Own Device (BYOD). With some EMM solutions, desktop computers can also be integrated into the management in addition to tablets, smartphones, and laptops. Enterprise mobility management can be implemented on a company’s own servers (on-premises) or as cloud-based services.
Important functions of mobile information management
One of the central functions of mobile information management is the encryption of data and documents. For example, the information is provided in encrypted containers or isolated sandboxes on mobile devices. If a device is lost, access to the container’s encrypted data is not possible without authentication.
Other functions of the MIM include:
- Encrypted access to data servers and encrypted transfer of information.
- Cloud-based provisioning of data without local data storage
- Authentication and authorization of applications, users, and devices for mobile access to corporate data
Benefits of Mobile Information Management
Mobile Information Management provides the enterprise with the benefit of protecting mobile-used information from unauthorized use, theft, and tampering. Company data can be used securely across devices. All information needed for work is available anytime and anywhere, which increases employee productivity.