What is MDM? 

Mobile Device Management or MDM is software that allows for the secure enrollment, configuration, management, and monitoring of mobile devices. Through this software, administrators can manage the apps and settings on a device, as well as set security protocols, password requirements, and enable data encryption across every mobile device in your company. 

When it comes to choosing an MDM solution, we recommend one of the following: Jamf, AirWatch, MaaS360, or MobileIron. Please see below for details on each solution.


Designed specifically for managing Apple devices, Jamf is our highest recommended MDM solution for its simple deployment, ease of use, and great support documentation and service. Through the use of their Blueprints, Jamf allows you to specify different user groups in your organization and set up each group’s mobile devices with the apps, settings, and security they need, all from an admin console. Please see our Jamf Now documentation for more information: Jamf Now Setup


Developed by IBM, MaaS360 with Watson is an easy-to-use MDM platform with the essential functionality for the entire lifecycle management of mobile devices including iPhone and iPad. MaaS360 gives you visibility and management of your iOS devices, applications, and documents, in addition to security encryption enforcement, device restriction settings, and bring your own device (BYOD) privacy settings. For more information on MaaS360, check out our setup guide: MaaS360 Setup


Provided by VMware, AirWatch is an enterprise mobility management solution that powers the VMware Workspace ONE platform. The cloud-based management enables you to configure iPhones and iPads over-the-air with access to apps, corporate networks and resources, and security policies for corporate-owned and employee-owned devices — all from a single admin console. For more information on getting set up with AirWatch, check out our setup documentation: AirWatch Setup


MobileIron’s MDM capabilities give you the fundamental visibility and controls needed to secure, manage, and monitor any corporate­ or employee­ owned mobile device that accesses business critical data. Without the help of IT, users can manage basic tasks like adding devices, and registered devices can be automatically configured with corporate connectivity settings, email profiles, and device-specific restrictions. For more information on MobileIron, please see our setup guide: MobileIron

Did this answer your question?