Mobile Information Management (MIM)

Mobile Information Management (MIM) refers to software and services used to secure and manage the sensitive, often business-critical data used in the enterprise on mobile devices like smartphones and tablet computers.

Also referred to as Mobile Content Management (MCM), Mobile Information Management falls under the umbrella of Enterprise Mobility Management along with other mobile security initiatives like mobile device management (MDM) mobile application management (MAM) and mobile security management (MSM).

How Mobile Information Management Works

MIM is distinguished from other mobile security initiatives in that it focuses specifically on data rather than on the devices or applications that utilize the data. Mobile Information Management involves the encryption of sensitive data and ensuring that only authorized applications can access, transmit or store this data using strong password protection.

Mobile Information Management
Source: Nestweaver

Well-rounded mobile information management strategies and solutions also include clear communication and enforcement of the MIM policies for protecting and securely using data on mobile devices in the enterprise.

On-premises mobile information management vendors and solutions available today include Nomadesk, RES HyperDrive and Citrix ShareFile, and public cloud services like Dropbox, Box, Microsoft SkyDrive and Google Drive can also be brought into an enterprise s MIM and overarching EMM strategies.

Mobile Information Management vs. MAM and MDM

Mobile Information Management shares some characteristics with both Mobile Application Management and Mobile Device Management, and MIM is frequently combined with MAM and/or MDM solutions as part of a holistic Enterprise Mobility Management strategy.

MDM primarily involves protecting and securing mobile device use within an enterprise as well as the use of applications on these devices whereas Mobile Application Management s specific focus is on securing sensitive enterprise apps and, when combined with MIM, the data utilized, stored and transmitted by these apps.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...