{"id":7171,"date":"2017-04-05T00:00:00","date_gmt":"2017-04-05T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2017\/04\/05\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/"},"modified":"2021-01-28T16:21:50","modified_gmt":"2021-01-28T16:21:50","slug":"enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/","title":{"rendered":"Enterprise Mobility Management Guide"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile end-user devices need to be managed to improve employee productivity and to reduce enterprise security risks. That&#8217;s the world that <strong>Enterprise Mobility Management<\/strong> (EMM) inhabits.<\/p>\n<h2>What is EMM?<\/h2>\n<p>The term Enterprise Mobility Management (EMM) is an evolution of the technology used to help control and manage mobile devices.<\/p>\n<p>EMM is an evolution of the<strong> <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/\">Bring Your Device (BYOD)<\/a><\/strong> phenomenon that has been going on for well over a decade in organizations around the world. The emergence of Apple&#8217;s iPhone a decade ago was a real catalyst in the movement, as employees chose to use their own iPhones over corporate provided devices. The first generation of BYOD management platforms was known as <a href=\"https:\/\/www.esecurityplanet.com\/mobile\/mobile-device-management\/\"><strong>Mobile Device Management (MDM)<\/strong><\/a> and originally focused largely on the hardware enrollment and access part of the BYOD challenge.<\/p>\n<p>The <strong>Mobile Application Management (MAM)<\/strong> categorization of mobile management technologies was initially all about helping organizations manage the software piece, specifically client-side applications running on mobile devices.<\/p>\n<p>The early promise of MAM was to provide capabilities that were not in MDM, namely the application piece, providing curated app stores for corporate use as well as data management policies. While MDM initially was all about hardware and MAM was about the software, the term Enterprise Mobility Management (EMM) is a superset of both MDM and MAM capabilities as well as adding mobile information management.<\/p>\n<h2>EMM features<\/h2>\n<p>A full EMM platform contains multiple capabilities to help secure mobile device usage in an enterprise environment.<\/p>\n<ul>\n<li><strong>Access<\/strong>: EMM can help enforce access rules based on device and policy.<\/li>\n<li><strong>Data protection<\/strong>: Data that is on a mobile device that is protected by an EMM can be encrypted, with options for remote lock and wipe.<\/li>\n<li><strong>App management<\/strong>: An EMM platform can provide enterprise app &#8216;stores&#8217; or enterprise application catalogues, serving as a curated repository of enterprise applications that can be easily downloaded by enrolled devices.<\/li>\n<li><strong>Threat management<\/strong>:The ability to scan devices for known issues as well as offering proactive threat management is sometimes part of EMM solutions.<\/li>\n<li><strong>Separation of work and personal<\/strong>: Some EMM solutions help solve the challenge of commingling of data on a BYOD device with some form of isolated area, on the device, to help keep work data separate from personal data.<\/li>\n<li><strong>Visibility and control<\/strong>: EMM systems also offer visibility into the devices that are connecting to a network and what resources they are consuming.<\/li>\n<\/ul>\n<h2>Setting up EMM<\/h2>\n<p>Different vendors have different approaches to EMM platform deployment. Some deployments can be done as an on-premises software installation, though many vendors today offer some form of Software-as-a-Service (SaaS) cloud-hosted EMM application.<\/p>\n<p>Once the EMM platform is set up (either on-premises or in the cloud), the process of getting devices controlled is referred to as device enrollment.<\/p>\n<p>Device enrollment can be done via:<\/p>\n<ul>\n<li>SMS<\/li>\n<li>Email<\/li>\n<li>URL enrollment<\/li>\n<\/ul>\n<p>The actual EMM control often involves the use of a client-side download application, and some solutions will also include some form of network gateway or proxy control as well.<\/p>\n<p>While many vendors provide a bulk enrollment capability, many will also offer a user self-service portal that enables users to request access.<\/p>\n<h2>EMM products<\/h2>\n<p>EMM vendors include:<\/p>\n<ul>\n<li>VMware AirWatch\u2028<\/li>\n<li>Mobile Iron<\/li>\n<li>IBM MaaS 360<\/li>\n<li>Citrix Xen Mobile<\/li>\n<li>Landesk Mobility Suite<\/li>\n<li>Blackberry EMM \/ Good Secure EMM Suite<\/li>\n<li>Microsoft Enterprise Mobility Suite<\/li>\n<\/ul>\n<p>See our picks for the <a href=\"https:\/\/www.esecurityplanet.com\/products\/enterprise-mobility-management\/\"><strong>5 top EMM solutions<\/strong><\/a>.<\/p>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d7039e792b9-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d7039e792b9\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d7039e792b9\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d7039e792b9\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d7039e792b9\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d7039e792b9\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d7039e792b9\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The modern enterprise is mobile and employees are no longer tethered to their corporate owned and provisioned computing equipment. As is the case in the wired world, mobile end-user devices need to be managed to improve employee productivity and to reduce enterprise security risks. That&#8217;s the world that Enterprise Mobility Management (EMM) inhabits. What is [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[18],"tags":[747,772,746,745],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[294,295,284],"class_list":["post-7171","post","type-post","status-publish","format-standard","hentry","category-mobile","tag-byod","tag-emm","tag-mdm","tag-mobile-device-management","b2b_audience-awareness-and-consideration","b2b_product-byod","b2b_product-mobile-device-management","b2b_product-mobile-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Enterprise Mobility Management Comparison | What is EMM?<\/title>\n<meta name=\"description\" content=\"Enterprise Mobility Management (EMM) is the technology used to control &amp; manage mobile devices. Find EMM products now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enterprise Mobility Management Comparison | What is EMM?\" \/>\n<meta property=\"og:description\" content=\"Enterprise Mobility Management (EMM) is the technology used to control &amp; manage mobile devices. Find EMM products now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-05T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:21:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sean Michael Kerner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Michael Kerner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\"},\"author\":{\"name\":\"Sean Michael Kerner\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\"},\"headline\":\"Enterprise Mobility Management Guide\",\"datePublished\":\"2017-04-05T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\"},\"wordCount\":583,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"BYOD\",\"EMM\",\"MDM\",\"mobile device management\"],\"articleSection\":[\"Mobile\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\",\"name\":\"Enterprise Mobility Management Comparison | What is EMM?\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2017-04-05T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:50+00:00\",\"description\":\"Enterprise Mobility Management (EMM) is the technology used to control & manage mobile devices. Find EMM products now.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enterprise Mobility Management Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0\",\"name\":\"Sean Michael Kerner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png\",\"caption\":\"Sean Michael Kerner\"},\"description\":\"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enterprise Mobility Management Comparison | What is EMM?","description":"Enterprise Mobility Management (EMM) is the technology used to control & manage mobile devices. Find EMM products now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/","og_locale":"en_US","og_type":"article","og_title":"Enterprise Mobility Management Comparison | What is EMM?","og_description":"Enterprise Mobility Management (EMM) is the technology used to control & manage mobile devices. Find EMM products now.","og_url":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/","og_site_name":"eSecurity Planet","article_published_time":"2017-04-05T00:00:00+00:00","article_modified_time":"2021-01-28T16:21:50+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Sean Michael Kerner","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Sean Michael Kerner","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/"},"author":{"name":"Sean Michael Kerner","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0"},"headline":"Enterprise Mobility Management Guide","datePublished":"2017-04-05T00:00:00+00:00","dateModified":"2021-01-28T16:21:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/"},"wordCount":583,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["BYOD","EMM","MDM","mobile device management"],"articleSection":["Mobile"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/","url":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/","name":"Enterprise Mobility Management Comparison | What is EMM?","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2017-04-05T00:00:00+00:00","dateModified":"2021-01-28T16:21:50+00:00","description":"Enterprise Mobility Management (EMM) is the technology used to control & manage mobile devices. Find EMM products now.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/mobile\/enterprise-mobility-management-emm-securing-corporate-data-on-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Enterprise Mobility Management Guide"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/e6c5000303e774ce1e088e741409ffe0","name":"Sean Michael Kerner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor-150x150.png","caption":"Sean Michael Kerner"},"description":"Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.","url":"https:\/\/www.esecurityplanet.com\/author\/sean-michael-kerner-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7171"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7171"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7171\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7171"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7171"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7171"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}