You must understand that not all MDM solutions are equal. Some MDM solutions offer more features than others; some solutions cost more than others; and most solutions vary in how each task is carried out.
All MDM solutions are built around the idea of controlling what users can and cannot do and ensuring that devices are up to date based on the company policy. Some MDM solutions even offer containerization; these products are often called enterprise mobility management (EMM) solutions. When it looked like the lack of security would undo MDM for the enterprise, certain MDM companies rolled in the ability to wrap apps in containers.
Containerization allows data and/or apps to be wrapped into a secure, encrypted environment to protect sensitive data. It's not just data that are containerized -- applications can be secured with an EMM solution. For example, you can specify that an app for company email be encrypted within a secure container, whereas the personal email app remains outside of the encryption.
Note: Containerization is not offered in every MDM solution. If this is something you believe your company will need, it's best to research the providers you are considering to make sure they offer containerization.
How IT will use MDM
Although MDM solutions vary greatly, what you can do with them offers up a bit more universality.
With each solution, the IT staff charged with monitoring MDM will have a management console to log into. From that console every registered device can be viewed and administered. If a new device is to be deployed, the administrator can register the device and then hand it over to the required staff member.
How the administrator registers devices on an MDM console will vary, depending upon the solution you choose. Some MDM services require an app to be installed on each device, whereas some solutions allow the process to be done completely over the air (OTA).
Click the link below to see our DroidLock MDM Solution.