Over the last quarter–I’ve been getting a lot of questions around the capabilities of managing and securing content and enforcing policy on enterprise and third-party (application store) apps. We often end up talking about mobile application containers. Very few IT people know much around the containerization category–often listed under mobile application management. It’s awareness level is about at the point MDM was two years ago when managers wanted to “push policy” on mobile phones. As mobile device and network technologies advance, users need access to more complex data, often on devices the enterprise doesn’t own. IT and network leaders will begin to learn this year how containerization supports the advanced security and management of enterprise and third-party applications and data.
But it won’t be easy. The challenge is that just like there in no one standard mobile platform or device form-factor, there is no one type of container technology. To help reduce the confusion–I’ve just published a new research note for Gartner clients(or interested press), the first to introduce an architecture of containers, technology overview, a framework of container policies–and best practices for adopting containers in the enterprise. It’s called, “Technology Overview of Mobile Application Containers for Enterprise Management and Security.” (I am also going for longest title of the year!) There are some key recommendations around the technology and use of containers in the enterprise, which are best suited and how containers will evolve. I’ve also identified a list of over 20 container vendors and put together a handy table so you can easily see their product offerings. What policies can containers support today ? It’s in there!
But we won’t stop there. We are working on at least two more pieces that go deep into the use cases for enterprises and a security review of container technologies. It’s an exciting year here for sure. What’s your container strategy?
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.