Mobile App Management (MAM) Solutions
OurMeeting is also available as MAM solution.
What is MAM?
MAM is an abbreviation of Mobile App Management. A MAM solution approaches security not at the level of the device, but at the level of the individual App. Increasingly, a MAM solution is used in addition to an MDM solution.Now why is this?
Take a large organization where a lot of confidential information goes around and also widely cooperates with other large organizations. For the management of its mobile devices this organization can choose MDM solution X. But when the cooperation partner Y, a subcontractor, uses a different MDM solution, a problem arises. It’s not possible to use two different MDM solutions in a mobile device.
Making cooperation possible
MAM solves this problem. Using Mobile App Management, security is not regulated at the device level, but at the App level.
OurMeeting works together with Oase App Services. This organization builds Branded Enterprise app stores. They do this on the basis of the Apperian platform. OasaAS establishes a fully customized App store in which all employees, freelancers, contractors and flexible workers can download the apps they need to work for the client.
With Mobile Application Management, organizations gain complete control over security, privacy and the lifecycle of the applications they use. Mobile application management is a practical response to the challenges of a BYOD policy.
Branded App Store
Security is not the only reason to choose a MAM solution. More and more organizations don’t want their mobile apllications downloaded anonymously from a general appstore, but they choose the recognizability of a branded app store in their own corporate identity. An additional advantage is that it allows users to access all the apps after logging in just once.
Our partner:
Oasis App Services uses the Apperian platform:
Read more about security:
Certification
OurMeeting is fully ISO 27001:2013 certified. The ISO-27002 guidelines and control measures have been fully implemented.
Confidentiality
We take privacy and security very seriously. Our internal business processes meet the highest standards.
Secure hosting in the Netherlands
Our customers’ date is securely stored in two different Dutch data centres.
Calamities
Of course you try to prevent calamities. But if that’s not possible it’s essential what happens after the calamity.