Phillip Redman

A member of the Gartner Blog Network

Phillip Redman
Research VP
10 years at Gartner
17 years IT industry

Phillip Redman is a research vice president in Gartner Research, where he leads mobile research in the network services and infrastructure group. Mr. Redman brings almost 15 years of experience in the wireless mobile and telecommunications industry… . Read Full Bio

Coverage Areas:

Can Containers Control Content?

by Phillip Redman  |  January 25, 2013  |  1 Comment

Over the last quarter–I’ve been getting a lot of questions around the capabilities of managing and securing content and enforcing policy on enterprise and third-party (application store) apps.  We often end up talking about mobile application containers.  Very few IT people know much around the containerization category–often listed under mobile application management.  It’s awareness level is about at the point MDM was two years ago when managers wanted to “push policy” on mobile phones.   As mobile device and network technologies advance, users need access to more complex data, often on devices the enterprise doesn’t own. IT and network leaders will begin to learn this year how containerization supports the advanced security and management of enterprise and third-party applications and data.

But it won’t be easy.  The challenge is that just like there in no one standard mobile platform or device form-factor, there is no one type of container technology.  To help reduce the confusion–I’ve just published a new research note for Gartner clients(or interested press), the first to introduce an architecture of containers, technology overview, a framework of container policies–and best practices for adopting containers in the enterprise.  It’s called, “Technology Overview of Mobile Application Containers for Enterprise Management and Security.” (I am also going for longest title of the year!) There are some key recommendations around the technology and use of containers in the enterprise, which are best suited and how containers will evolve.  I’ve also identified a list of over 20 container vendors and put together a handy table so you can easily see their product offerings.  What policies can containers support today ?  It’s in there! 

But we won’t stop there. We are working on at least two more pieces that go deep into the use cases for enterprises and a security review of container technologies.  It’s an exciting year here for sure.  What’s your container strategy?

1 Comment »

Category: Container Mobile Device Management mobile phones mobility management Policy     Tags: , , ,

1 response so far ↓

  • 1 Ernie   January 29, 2013 at 1:40 pm

    This is a great write-up! Mobile platforms are starting to come up more and more, and it’s awesome! I love when I find new things to do with my phone!