Over the last quarter–I’ve been getting a lot of questions around the capabilities of managing and securing content and enforcing policy on enterprise and third-party (application store) apps. We often end up talking about mobile application containers. Very few IT people know much around the containerization category–often listed under mobile application management. It’s awareness level is about at the point MDM was two years ago when managers wanted to “push policy” on mobile phones. As mobile device and network technologies advance, users need access to more complex data, often on devices the enterprise doesn’t own. IT and network leaders will begin to learn this year how containerization supports the advanced security and management of enterprise and third-party applications and data.
But it won’t be easy. The challenge is that just like there in no one standard mobile platform or device form-factor, there is no one type of container technology. To help reduce the confusion–I’ve just published a new research note for Gartner clients(or interested press), the first to introduce an architecture of containers, technology overview, a framework of container policies–and best practices for adopting containers in the enterprise. It’s called, “Technology Overview of Mobile Application Containers for Enterprise Management and Security.” (I am also going for longest title of the year!) There are some key recommendations around the technology and use of containers in the enterprise, which are best suited and how containers will evolve. I’ve also identified a list of over 20 container vendors and put together a handy table so you can easily see their product offerings. What policies can containers support today ? It’s in there!
But we won’t stop there. We are working on at least two more pieces that go deep into the use cases for enterprises and a security review of container technologies. It’s an exciting year here for sure. What’s your container strategy?