Updated February 3, 2026.
In today’s cyber threat environment, it’s essential to secure any mobile devices that access company systems. There are several ways to do this. The most common solutions are MDM (mobile device management) and MAM (mobile application management).
But which one is right for you?
Can MDM and MAM work together?
Here’s everything you should know about MDM vs. MAM.
Key takeaways:
- MDM is intended to secure a physical device.
- MAM is intended to secure applications and data.
- Who owns the device (the company or the individual) will determine the right mix of solutions.
- In Microsoft Intune, UEM (Unified Endpoint Management) makes it easy to administer both MDM and MAM in one place.
What is MDM (mobile device management)?
MDM (mobile device management) is a software solution that gives IT administrators control over devices connected to the network. For Microsoft customers, Microsoft Intune provides MDM capabilities as part of Microsoft’s UEM (Unified Endpoint Management) functionality.
MDM is all about securing a physical device. This software allows admins to monitor, manage, and secure company-owned devices remotely. It’s the primary tool for enforcing your organization’s security configuration settings.
As you can imagine, employees often won’t allow their personal devices to be onboarded into a company’s MDM. So MDM for BYOD is usually a non-starter.
What is MAM (mobile application management)?
MAM (mobile application management) is a software solution that gives IT administrators control over the organization’s applications and any associated data on devices connected to the network. For Microsoft customers, Microsoft Intune provides MAM capabilities as part of Microsoft’s UEM (Unified Endpoint Management) functionality.
MAM is all about securing applications and their data. This software allows admins to remotely monitor, manage, and secure applications and related data on both company-owned and employee-owned devices.
Welcome to another episode of unraveling IT. On this episode, we'll be sitting down with Brian Harmon, and the CEO of Corska Technologies, as well as Nate Trauer, solutions architect here at Corska Technologies. And we'll be talking about mobile device management versus mobile application management, and which solution we feel is best for your business? Stay tuned. So today, I'm here with Nate Troyer, who is a solutions engineer and, has been introduced in past podcasts. Nate, thanks for joining us. Again today. Yeah. No problem. I'm excited to talk about a topic that is not a new topic, but is certainly one that comes up a lot as we work with new customers, especially. And that's around what do we do with all these mobile devices Right. In our environment. So, would love to hear a little bit about maybe the way, mobile devices used to be managed I I remember days of people carrying, you know, four or five cell phones. Right. Or or at least two. Let's let's roll back to what the, the early two thousands where the proliferation of laptops were was really starting to to catch on. Right? And so, Man, were was I? I wasn't I wasn't fully out of high school yet, but, when laptops were invented, you're saying? I feel like they've been around for a while. Yeah. But, I mean, when they were really, really started, you know, picking up speed, people buying them, corporations kinda moving away from work stations and moving more into laptops. And and I feel like a lot of that was driven by the capability of being able to not have it be a boat anchor. Right. Right. You know, wireless I mean, I remember working at Best Buy and and wireless was just really starting to take off. And, you know, it just became the de facto thing people came in and want it. They they were like, oh, you know, I could get a I could get a boat anchor that sits on my desk, or I could, you know, I could have a laptop. So you have a bunch of system administrators out there who are trying to figure like, how do I manage these devices when they're not here? You know? And there was a lot of, there, you know, the essentially around two thousand one, we had the first real MDM solution come out. I'm sure someone in the comments will say I'm wrong. But I looked it up. So and Wikipedia is never wrong. Wow. That's the great thing about Wikipedia. So, so, essentially, You know, you had your MDM solution, which is, which is, you know, almost complete control of the device. You know, enterprises would would would do that because it's was their devices. Right? You know? Fast forward to, around two thousand five, six, seven, around in there, you know, and the whole bring your own device thing, which I remember you talking about a lot when, you know, earlier on in my career. So what, like, talk us through what bring your own device really is. Yeah. The and it it did start with with laptops. But more mobile phones once the smartphone really took over. And people wanna be able to access their work stuff from their own devices, or you have companies that that don't wanna buy laptops kinda take the mechanic model, which is, you know, you have your own tools to do the job. And a company started losing control of where does our data live? How do I know that that person's working? And how how do I if they decide tomorrow that they won the lottery and they don't wanna work here anymore. How do I make sure that I can get my data back and they can't still send company emails and that kind of thing. So that that really is is kind of the the start of you know, we need to manage these mobile devices. I I feel like pretty quickly laptops and desktops were were easily under control Mhmm. If they were out of the the office or out of the building because those those capabilities started being built into the OS to be able to manage where these devices are. Device started having GPS in them, you know, ten years ago. So we we knew that. And it started to shift more now into most workers when they're not in front of their computer are in front of their phone. Right. Right. So, you know, around around the, you know, mid the mid twenty tens, I think, was, like, around in there. We started to see, Essentially, since you since mobile device management requires that the person that might be their personal device basically sign up to have their device completely controlled by their boss. Potentially deleted. Yeah. Potentially deleted. Whatever. You know, a lot of people were kinda skittish about that. They're like, I don't really know if I want wanna do that. So the middle ground and really cool way of of solving that problem was m a m, where Now we're now we're essentially managing the applications and our data on your device. We're not managing your entire device, just the data and the application So that takes care of the horror story of, you know, I got sideways with my employer and they erased all my family photos off my phone. Right. Right. Did that happen? Oh, that's happened many times. The stories I could tell no. I've never done that. I wouldn't do that. I'm like no. But I I consorting with an unfriend or My guess is my guess is that that we both know people that have had that happen. Sometimes even accidentally, his all all it would take is an administrator accidentally. And we do know IT people make mistakes Yep. Occasionally. Accidentally clearing the wrong device, thinking they're resetting a company owned device, but instead it's an employee owned device and poof everything is gone. Right? Right? And MAM is a way of essentially, like, I I think it's actually pretty cool because you can set policies and things like that so that, you know, you're you're essentially making a container inside that device and you're putting all of your data inside of that container. So only other applications are inside of that container can share that information. Like, I think one of the one of the big security risks, for a while, since people are bringing their phones everywhere and their phones have this to their email is what if I have sensitive information in the email and you copy the text out of there and throw it into a, text message to somebody else? You can stop that now. You can actually stop that now. Right. And and that's the way we would typically recommend mobile application management happen. In fact, you know, we we typically don't recommend mobile device management because that generally leads back to the well, then I want a company phone. I want my personal phone. And the whole point of having a mobile device is that it's convenient. It's easy to use. I've got one interface to get to my work and my personal you know, that's a double edged sword. It it's hard to get away from work. But at the same time, I think most of us appreciate the convenience of I can handle the urgent things without having to, you know, run back to a a home, a coffee shop, wherever it is. Pull out a laptop and and work. I know for me, it's changed the way I can handle vacations and other things and be confident that that things are going well and that that people can get a hold of me. So, you know, I'd say if you're an organization, you have employees carrying around a company phone, and a personal device. Not only are you wasting money on the company phone, you're likely not getting the value that you hope you are out of having that person be connected to work when they're away from their desk. So what I already know the answer to this question, but what are some of the solutions that have MDM and MAM built into them? Yeah. Intune is is the most prevalent, and it's certainly the one that we would recommend. And it it fits into the Microsoft ecosystem much along the the line of what you'll hear from us a lot is it it makes sense now. To not try and pick eight different best breed products, but to to really go after a a stack of tools that's consistent and that that interfaces with the rest of the ecosystem that you use everywhere else. So we would we would lean towards Microsoft Intune. That's what we use internally, we use it both on our laptops as well as, you know, employee own devices. So we don't supply any company cell phones anymore. We did five years ago. But the way we use it is we containerize the the company data. If somebody leaves, we can clear that part out. They can uninstall the apps and it really leaves no, you know, fingerprints that that we were there. And at the same time, it protects the company data and that individual, because it's not when somebody leaves, people lose their phones. Right? They're in an airport. They lose their phone. They lose their laptop. Those are the the scenarios where where we can help as well. We can't read text messages. We can't, you know, track people, any of that kind of stuff. But it it does give full access to everything that that they need from OneDrive SharePoint, email, shared files, all that kind of stuff without without having to expose the company to risk or tell them to carry around another, you know, mini computer in pocket. Yeah. I I'm glad that we moved away from that because it was always like, okay. I have my phone. Where's my company phone? You know, and I just I don't like them that. That's I think most people don't. Yeah. So it's it's definitely in the future. Right? I and and the future is here. It's been here for a couple of years, but we still see companies that are nervous about, well, how do I have total control. And the the answer is we don't have total control over anything. Right. What we want to have is we wanna have reasonable controls in place And then we wanna trust people to to be educated, do the right thing, and still protect the company and those individuals in the case that somebody makes a mistake. And And m a m really checks all of those boxes. Yep. Yep. Alright. Well, Nate, thanks for joining me again. Today. You talked most of this time. Or maybe I joined you. We'll find out. I guess either way, Thanks for your expertise. Appreciate the conversation. And look forward to chatting again soon. Okay. Okay. So are you gonna do the introduction? Or Yeah. I'm going to. Alright. Welcome back. Leave it in. You you can use our outtakes. It seems like only yesterday that I was wearing a different vest. Today, you're wearing my vest. That's not true. That's true. Yeah. That's
Generally speaking, MAM is less invasive than MDM. For example, you can configure your MAM solution so that it disables copying and pasting data out of Outlook into another application. But MAM solutions generally don’t have access to an employee’s personal data like photos and contacts on their BYOD device.
What is Microsoft UEM, and how does it relate to MDM and MAM?
Microsoft UEM (Unified Endpoint Management) is Microsoft’s modern, consolidated approach to managing all endpoints—mobile devices, PCs, virtual desktops, kiosks, IoT devices, and more—through a single, unified platform.
UEM is a recommended strategy and approach, not a software system. Microsoft Intune is the core product that powers device management under Microsoft’s UEM model. Microsoft’s shift to UEM in Intune brings together capabilities that were previously separate (MDM, MAM, EMM, and PC management) into one centralized system.
In other words, both MDM and MAM are core functions under the larger umbrella of UEM. They are both supported by Microsoft Intune.
Can MDM and MAM work together?
Absolutely. In fact, MDM and MAM are typically used together to manage company-owned mobile devices within Microsoft’s UEM (unified endpoint management) capabilities within Microsoft Intune. Likewise, MAM by itself is typically used for employee-owned devices and is also administered within UEM in Intune.
MAM is what protects the company’s data. At the end of the day, that’s most important.
MDM for company-owned devices is typically used for policy enforcement. This may include things like:
- Enforcing firewall enablement
- Enforcing installation of endpoint security agent
- Enforcing passcode length
- Enforcing enablement of biometric authentication
FREE comparison chart
Mobile Device Management Options

Compare MDM vs. MAM scenarios
Here are a few common device administration scenarios. The chart below explains which tool (MDM vs. MAM) is appropriate and what the tool can do.
| Scenario | MDM Capabilities | MAM Capabilities |
|---|---|---|
| A) Company‑owned device is stolen | Allows you to wipe the entire device. | Allows you to wipe only applications and their data, though in this case you would likely wipe the full device anyway. |
| B) Employee leaves; BYOD device has corporate apps/data | Not typically used for BYOD—full wipe would be inappropriate. | You can selectively wipe only corporate apps and their data from the personal device. |
| C) Employee gets a new BYOD device to replace the old one | Not applicable (device not MDM‑enrolled). | You can wipe corporate apps/data from the old BYOD device before they move to the new one. |
How flexible is MAM in Microsoft Intune?
In late 2025, Microsoft introduced improved MAM targeting options to give administrators more flexibility in how they handle company data and applications on connected devices. Here are the updates that Microsoft made:
- Users can receive multiple app protection policies based on device state (managed vs. unmanaged).
- Policy stacking and enforcement logic were improved.
What are best practices for device enrollment in Intune?
Intune device enrollment works best when organizations follow a staged rollout starting with pilot groups, prepare devices in advance with enrollment restrictions and baseline security policies, and choose the correct enrollment method based on ownership and platform—such as Azure AD Join or Autopilot for corporate Windows devices, Apple Business Manager for iOS, and Android Enterprise modes for Android devices.
Of course, Microsoft has also included new enrollment options such as:
- Just‑in‑Time Registration
- Enhanced Windows Autopatch controls
- Refined platform-specific BYOD onboarding flows (especially for iOS and macOS)
Here’s a table summarizing best practices for specific areas in enrollment practice.
| Area | Best Practice |
|---|---|
| Rollout Strategy | Use pilot groups before scaling up. |
| Pre‑Configuration | Set enrollment restrictions, profiles, categories. |
| OS‑Specific Methods | Use Autopilot, ABM, Android Enterprise as appropriate. |
| Security | Establish baseline compliance & config profiles. |
| User Experience | Provide clear BYOD instructions and support. |
| Monitoring | Track enrollment failures and compliance early. |
| Identity | Align Entra identity choice with enrollment type. |
| Documentation | Keep guides updated as Intune evolves. |
How does Microsoft Intune support compliance requirements for device management?
Microsoft Intune supports compliance requirements for device management by providing a comprehensive policy framework that evaluates each managed device against organizational security standards, enforces access controls, and automates remediation actions. Intune uses device compliance policies—sets of rules such as minimum OS versions, password requirements, encryption, jailbreak/root detection, and platform‑specific security controls—to determine whether a device meets your defined security posture.
These compliance results integrate directly with Microsoft Entra Conditional Access, ensuring that only devices marked compliant can access corporate resources like email, apps, and data, adding an additional enforcement layer to protect organizational assets.
Intune also includes tenant‑wide compliance policy settings—a built‑in baseline that applies to every device—which determines how devices with missing or outdated compliance information are treated.
This capability helps organizations maintain strict security postures at scale. Administrators gain visibility through compliance reporting, can define automated actions for noncompliance, and can even implement custom compliance policies using scripts or Logic Apps for advanced scenarios. This combination of policy enforcement, conditional access integration, monitoring, and automation ensures organizations can meet regulatory, security, and internal compliance requirements across all enrolled devices.
How do you get MAM?
Good news if you’re a Microsoft customer: MAM is available as part of Intune and Microsoft 365, and it’s a core component in Microsoft UEM (unified endpoint management) within Intune. The list of 365 apps supported by Intune is quite extensive. Whatever your employees need to do, whatever application they’re using, Intune delivers the MAM capabilities you need.
However, Intune is so powerful, it can get overwhelming. Your IT admins probably have enough work on their hands already.
If that’s the case, a partner like Corsica Technologies can help you secure your applications with MAM. Reach out to us today, and let’s strengthen your mobile device security.
Takeaway: Use MDM+MAM for corporate; use MAM alone for BYOD
On corporate devices, it makes sense to enable both MDM and MAM. Whatever configuration-related policies you have, MDM enables you to do the actual enforcement.
For BYOD devices, it’s best to install MAM alone—without MDM.
Why?
FREE chart: MDM vs. MAM
If the goal is to protect company data on BYOD devices, then MAM gets you there with fewer headaches and legal implications. MAM also strikes a better balance between protecting your data and protecting your employees’ freedom.
Here are the 3 biggest reasons we recommend MAM alone, without MDM, for BYOD devices.
1. You get the control you need
Let’s be honest, you don’t need the ability to delete an employee’s personal photos. But you do need to prevent them from moving company data out of safe applications. You also need to secure those applications (and that data). MAM does what you need without potentially doing things you don’t need.
2. You respect your employees’ privacy
While MDM can be configured in many ways, it’s hard to shake the fact that it can exercise control over an employee-owned device. If an employee allows you to put MDM on their BYOD device, there’s more potential for liability down the road if an admin makes a configuration mistake.
3. You avoid the two-phone problem
I can’t count how many times I’ve seen someone with two phones—a company device, and a personal device.
No one should have to deal with that headache. I feel sorry that they work for a company that forces them to have a separate device. I want to sit them down and explain that there’s a better way to do this—one that fits how most people live and work today. That way is MAM.
FREE comparison chart
MDM vs. MAM



