Mobile Information Management (MIM)
Mobile Information Management (MIM) refers to software and services used to secure and manage the sensitive, often business-critical data used in the enterprise on mobile devices like smartphones and tablet computers.
Also referred to as Mobile Content Management (MCM), Mobile Information Management falls under the umbrella of Enterprise Mobility Management along with other mobile security initiatives like mobile device management (MDM) mobile application management (MAM) and mobile security management (MSM).
How Mobile Information Management Works
MIM is distinguished from other mobile security initiatives in that it focuses specifically on data rather than on the devices or applications that utilize the data. Mobile Information Management involves the encryption of sensitive data and ensuring that only authorized applications can access, transmit or store this data using strong password protection.
Well-rounded mobile information management strategies and solutions also include clear communication and enforcement of the MIM policies for protecting and securely using data on mobile devices in the enterprise.
On-premises mobile information management vendors and solutions available today include Nomadesk, RES HyperDrive and Citrix ShareFile, and public cloud services like Dropbox, Box, Microsoft SkyDrive and Google Drive can also be brought into an enterprise’s MIM and overarching EMM strategies.
Mobile Information Management vs. MAM and MDM
Mobile Information Management shares some characteristics with both Mobile Application Management and Mobile Device Management, and MIM is frequently combined with MAM and/or MDM solutions as part of a holistic Enterprise Mobility Management strategy.
MDM primarily involves protecting and securing mobile device use within an enterprise – as well as the use of applications on these devices – whereas Mobile Application Management’s specific focus is on securing sensitive enterprise apps and, when combined with MIM, the data utilized, stored and transmitted by these apps.
IT Solutions Builder TOP IT RESOURCES TO MOVE YOUR BUSINESS FORWARD
Which topic are you interested in?
What is your company size?
What is your job title?
What is your job function?
Searching our resource database to find your matches...
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.
From A3 to ZZZ this guide lists 1,500 text message and online chat abbreviations to help you translate and understand today's texting lingo. Read More »List of Well-Known TCP Port Numbers
Port numbers 0 to 1024 are reserved for privileged services and designated as well-known ports. This list of port numbers are specified in... Read More »
Computer architecture provides an introduction to system design basics for most computer science students. Read More »Network Fundamentals Study Guide
Networking fundamentals teaches the building blocks of modern network design. Learn different types of networks, concepts, architecture and... Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the computing devices that we use... Read More »