{"id":5793,"date":"2014-09-23T10:24:37","date_gmt":"2014-09-23T09:24:37","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=5793"},"modified":"2015-02-05T15:19:16","modified_gmt":"2015-02-05T14:19:16","slug":"mobile-application-management-quel-interet-les-entreprises","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/","title":{"rendered":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ?"},"content":{"rendered":"<p><i>Le mois dernier, un tweet accidentel est apparu sur la timeline des 52 000 followers de la \u00ab\u00a0Envi\u00adronmental Protection Agency\u00a0\u00bb des \u00c9tats-Unis. Un employ\u00e9 avait malencontreusement d\u00e9\u00adclench\u00e9 l&#8217;envoi d&#8217;un message auto-g\u00e9n\u00e9r\u00e9, <\/i><a href=\"http:\/\/www.buzzfeed.com\/rachelzarrell\/the-us-government-is-just-as-addicted-to-the-kim-kardashian\"><i>alors qu&#8217;il jouait \u00e0 &#8220;Kim Kardashian&#8221;<\/i><\/a>.<i><\/i><\/p>\n<p><i>Par ailleurs, <\/i><a href=\"http:\/\/www.forrester.com\/Workforce+Personas+And+The+Mobile+App+Gap\/fulltext\/-\/E-RES104982\"><i>selon une \u00e9tude Forrester<\/i><\/a><i>, 25% des employ\u00e9s dans le monde ont recours \u00e0 leurs applications mobiles personnelles pour compenser le manque d\u2019applications professionnelles dont ils ont besoin pour faire leur travail.<\/i><\/p>\n<p><i>Ces anecdotes illustrent la n\u00e9cessit\u00e9 pressante d&#8217;encadrer l&#8217;utilisation des applications mo\u00adbiles dans l&#8217;entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9\u00a0?<\/i><\/p>\n<h2>Le MDM n\u2019a pas pour vocation de g\u00e9rer ou de s\u00e9curiser les applications<\/h2>\n<p>Le <a href=\"http:\/\/www.solucom.fr\/publication\/livre-blanc-master-data-management\/\">MDM (<i>Mobile Device Management<\/i>)<\/a> ne propose pas de fonctions pour s\u00e9curiser l\u2019acc\u00e8s et la distribution des applications mobiles fournies par l\u2019entreprise. D\u2019ailleurs, ce n\u2019est pas son r\u00f4le\u00a0: le MDM fournit aux entreprises des moyens de g\u00e9rer et de s\u00e9curiser des terminaux, non des applications.<\/p>\n<p>Pourtant, ce sont les applications mobiles qui ont fait le succ\u00e8s des <i>smart\u00adphones<\/i>\u00a0aupr\u00e8s du grand public\u00a0: aujourd\u2019hui, elles constituent m\u00eame le fer de lance de la mobilit\u00e9 d\u2019entreprise en \u00e9tant un v\u00e9ritable vecteur de productivit\u00e9. Le MAM (<i>Mobile Application Management<\/i>), lui, se propose d\u2019adresser cet enjeu d\u2019envergure.<\/p>\n<p>Il n\u2019y a pas vraiment lieu de comparer MDM et MAM (en dehors de la <a href=\"http:\/\/searchconsumerization.techtarget.com\/feature\/Mobile-device-management-vs-mobile-application-management\">granularit\u00e9 de contr\u00f4le<\/a>, de la <a href=\"http:\/\/www.crn.com\/news\/security\/240156399\/mobile-device-management-market-wont-last-gartner.htm\">maturit\u00e9 du march\u00e9<\/a> et du <a href=\"https:\/\/blogs.oracle.com\/OracleIDM\/entry\/when_mdm_and_mam_are\">respect de la vie priv\u00e9e<\/a>)\u00a0: ils ne rendent pas les m\u00eames services et <a href=\"http:\/\/scn.sap.com\/community\/mobile\/blog\/2014\/01\/21\/mdm-vs-mam-and-how-apple-sees-it-in-ios7\">ne r\u00e9pondent pas aux m\u00eames besoins<\/a>. Selon le contexte, il est bien souvent n\u00e9cessaire de combiner ces deux fonctions.<\/p>\n<h2>Qu\u2019est-ce que le <i>Mobile Application Management<\/i>\u00a0?<\/h2>\n<p>Le MAM correspond \u00e0 la gestion des applications mobiles dans le cadre de l\u2019entreprise. Parmi les fonctionnalit\u00e9s-c\u0153ur les plus communes, les fonctions de MAM proposent en g\u00e9n\u00e9ral des outils :<\/p>\n<ul>\n<li>de distribution\u00a0: un <i>store<\/i> priv\u00e9 d\u2019entreprise permet de distribuer des applications mo\u00adbiles aux utilisateurs concern\u00e9s\u00a0; il peut s\u2019int\u00e9grer avec les <i>stores<\/i> publics, autoriser ou bloquer la distribution des applications selon les utilisateurs, etc.\u00a0;<\/li>\n<li>de s\u00e9curit\u00e9 (cf. plus bas)\u00a0: le MAM fournit \u00e9galement des outils pour s\u00e9curiser les appli\u00adcations soit individuellement, soit collectivement ; il s\u2019agit de prot\u00e9ger l\u2019acc\u00e8s aux applications elles-m\u00eames, les donn\u00e9es sous-jacentes et les <i>back-ends<\/i> impliqu\u00e9s\u00a0;<\/li>\n<li>d\u2019administration\u00a0: classiquement, une console web est mise \u00e0 disposition des adminis\u00adtrateurs\u00a0; les modules disponibles varient selon les solutions\u00a0mais des fonc\u00adtions de supervision, d\u2019analytics et de gestion des utilisateurs sont g\u00e9n\u00e9ralement pr\u00e9\u00adsentes.<\/li>\n<\/ul>\n<p>Le MAM adresse les besoins de l\u2019entreprise dans sa globalit\u00e9, mais aussi des DSI et des uti\u00adlisateurs sp\u00e9cifiquement.<\/p>\n<h2>S\u00e9curiser la mise \u00e0 disposition d\u2019applications mobiles<\/h2>\n<p>Les fonctions de MAM proposent des moyens mat\u00e9riels et logiciels pour s\u00e9curiser les appli\u00adcations mobiles de l\u2019entreprise.<\/p>\n<p>La mise en place d\u2019une solution MAM comprend syst\u00e9matiquement l\u2019installation d\u2019une passerelle de s\u00e9curit\u00e9. Qu\u2019elle soit <i>on-premise<\/i> ou provisionn\u00e9e en mode <a href=\"http:\/\/www.solucominsight.fr\/tag\/saas\/\">SaaS<i> (Software as a Service<\/i>)<\/a>, les flux en provenance des applications mo\u00adbiles doivent transiter par celle-ci. L\u2019<i>app tunneling<\/i> (ou <i>mi\u00adcro-VPN<\/i>) apporte un niveau de s\u00e9curit\u00e9 compl\u00e9mentaire aux \u00e9changes entre les applications et le SI.<\/p>\n<p>Le <i>container<\/i> est une fonctionnalit\u00e9 de protection collective des applications mobiles pro\u00adfessionnelles. Il garantit une \u00e9tanch\u00e9it\u00e9 param\u00e9trable entre l\u2019univers professionnel, isol\u00e9 dans le <i>container<\/i> et le reste du terminal qui constitue l\u2019univers personnel. Au sein de ce container, les donn\u00e9es sont g\u00e9n\u00e9ralement chiffr\u00e9es et l\u2019acc\u00e8s aux applications facilit\u00e9 par le <a href=\"http:\/\/fr.wikipedia.org\/wiki\/Authentification_unique\">SSO (<i>Single Sign-On<\/i>)<\/a>.<\/p>\n<p>Enfin, le <a href=\"http:\/\/fr.wikipedia.org\/wiki\/Kit_de_d%C3%A9veloppement\">SDK<\/a> (<i>Software Development Kit<\/i>) permet une s\u00e9curisation en profondeur au moment des d\u00e9veloppements, tandis que l\u2019<i>app wrapping<\/i> permet un traitement superficiel post-d\u00e9veloppement.<\/p>\n<h2><i>In fine<\/i>, le MAM vise \u00e0 pr\u00e9server l\u2019exp\u00e9rience utilisateur et la vie priv\u00e9e<\/h2>\n<p>La promesse du MAM est d\u2019offrir un compromis avantageux entre exp\u00e9rience utilisateur et s\u00e9curit\u00e9. Il permet de d\u00e9velopper et de distribuer des applications natives \u2013 donc potentiel\u00adlement ergonomiques \u2013 en toute s\u00e9curit\u00e9.<\/p>\n<p>Il fait cohabiter les univers personnels et professionnels sur un m\u00eame terminal sans prise de risque inconsid\u00e9r\u00e9e, avec un degr\u00e9 d\u2019\u00e9tanch\u00e9it\u00e9 param\u00e9trable\u00a0; en ce sens, il facilite l\u2019introduction du <a href=\"http:\/\/www.solucominsight.fr\/tag\/byod\/\">BYOD<\/a> (<i>Bring Your Own Device<\/i>) dans l\u2019entreprise.<\/p>\n<p>Enfin \u2013 et c\u2019est un sujet d\u2019actualit\u00e9 \u2013, la vie priv\u00e9e des utilisateurs est respect\u00e9e\u00a0: les politiques de s\u00e9curit\u00e9 ne s\u2019appliquent qu\u2019aux applications \u2013 et donn\u00e9es \u2013 professionnelles, l\u2019entreprise n\u2019a pas la main sur l\u2019espace personnel du terminal.<\/p>\n<h2>Am\u00e9liorer la productivit\u00e9 et l\u2019image v\u00e9hicul\u00e9e<\/h2>\n<p>Les applications mobiles m\u00e9tiers impactent positivement la productivit\u00e9, et le MAM y contribue indirectement en favorisant un acc\u00e8s <a href=\"http:\/\/fr.wikipedia.org\/wiki\/Mobiquit%C3%A9\">ATAWAD (<i>AnyTime, AnyWhere, AnyDevice<\/i>)<\/a> \u00e0 celles-ci. D\u2019une part, la d\u00e9mat\u00e9rialisation, l\u2019automatisation et la mise \u00e0 disposition des ressources de l\u2019entreprise aux collaborateurs en situation de mobilit\u00e9 sont autant de facteurs d\u2019efficacit\u00e9. D\u2019autre part, les attentes des utili\u00adsateurs \u00e9tant tr\u00e8s fortes, les progr\u00e8s de l\u2019entreprise sur ce sujet renforcent souvent la moti\u00advation des \u00e9quipes.<\/p>\n<p>Par ailleurs, l\u2019introduction du MAM dans l\u2019entreprise permet d\u2019am\u00e9liorer l\u2019image v\u00e9hicul\u00e9e par celle-ci et par la DSI aupr\u00e8s des utilisateurs, des prospects, des clients et des partenaires. Elle d\u00e9montre une capacit\u00e9 \u00e0 s\u2019approprier des sujets innovants et complexes\u00a0; elle met \u00e9ga\u00adlement en \u00e9vidence l\u2019int\u00e9r\u00eat de l\u2019entreprise pour le bien-\u00eatre de ses utilisateurs. Enfin, elle fait preuve de davantage de r\u00e9activit\u00e9 dans ses interactions avec l\u2019ext\u00e9rieur.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le mois dernier, un tweet accidentel est apparu sur la timeline des 52 000 followers de la \u00ab\u00a0Envi\u00adronmental Protection Agency\u00a0\u00bb des \u00c9tats-Unis. Un employ\u00e9 avait malencontreusement d\u00e9\u00adclench\u00e9 l&#8217;envoi d&#8217;un message auto-g\u00e9n\u00e9r\u00e9, alors qu&#8217;il jouait \u00e0 &#8220;Kim Kardashian&#8221;. Par ailleurs, selon&#8230;<\/p>\n","protected":false},"author":290,"featured_media":5796,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[37,35],"tags":[64,1684,762,1685,1266],"coauthors":[1682,1683],"class_list":["post-5793","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-innovation","category-strategie-projets-it","tag-byod","tag-mam","tag-mdm","tag-mobile-application-management","tag-mobile-device-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Il y a aujourd&#039;hui une n\u00e9cessit\u00e9 pressante d&#039;encadrer l&#039;utilisation des applications mo\u00adbiles dans l&#039;entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Il y a aujourd&#039;hui une n\u00e9cessit\u00e9 pressante d&#039;encadrer l&#039;utilisation des applications mo\u00adbiles dans l&#039;entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-23T09:24:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-05T14:19:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3900\" \/>\n\t<meta property=\"og:image:height\" content=\"2080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Arnaud Koechlin, Mathieu Sabarly\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaud Koechlin, Mathieu Sabarly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\"},\"author\":{\"name\":\"Arnaud Koechlin\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/85d1a8fea2260ef080653feb33d51ac3\"},\"headline\":\"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ?\",\"datePublished\":\"2014-09-23T09:24:37+00:00\",\"dateModified\":\"2015-02-05T14:19:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\"},\"wordCount\":1005,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg\",\"keywords\":[\"BYOD\",\"MAM\",\"MDM\",\"Mobile Application Management\",\"mobile device management\"],\"articleSection\":[\"M\u00e9tiers - Digital &amp; innovation\",\"M\u00e9tiers - Strat\u00e9gie &amp; projets IT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\",\"name\":\"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg\",\"datePublished\":\"2014-09-23T09:24:37+00:00\",\"dateModified\":\"2015-02-05T14:19:16+00:00\",\"description\":\"Il y a aujourd'hui une n\u00e9cessit\u00e9 pressante d'encadrer l'utilisation des applications mo\u00adbiles dans l'entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg\",\"width\":3900,\"height\":2080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/85d1a8fea2260ef080653feb33d51ac3\",\"name\":\"Arnaud Koechlin\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-koechlin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight","description":"Il y a aujourd'hui une n\u00e9cessit\u00e9 pressante d'encadrer l'utilisation des applications mo\u00adbiles dans l'entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight","og_description":"Il y a aujourd'hui une n\u00e9cessit\u00e9 pressante d'encadrer l'utilisation des applications mo\u00adbiles dans l'entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/","og_site_name":"RiskInsight","article_published_time":"2014-09-23T09:24:37+00:00","article_modified_time":"2015-02-05T14:19:16+00:00","og_image":[{"width":3900,"height":2080,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg","type":"image\/jpeg"}],"author":"Arnaud Koechlin, Mathieu Sabarly","twitter_misc":{"Written by":"Arnaud Koechlin, Mathieu Sabarly","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/"},"author":{"name":"Arnaud Koechlin","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/85d1a8fea2260ef080653feb33d51ac3"},"headline":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ?","datePublished":"2014-09-23T09:24:37+00:00","dateModified":"2015-02-05T14:19:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/"},"wordCount":1005,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg","keywords":["BYOD","MAM","MDM","Mobile Application Management","mobile device management"],"articleSection":["M\u00e9tiers - Digital &amp; innovation","M\u00e9tiers - Strat\u00e9gie &amp; projets IT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/","url":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/","name":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg","datePublished":"2014-09-23T09:24:37+00:00","dateModified":"2015-02-05T14:19:16+00:00","description":"Il y a aujourd'hui une n\u00e9cessit\u00e9 pressante d'encadrer l'utilisation des applications mo\u00adbiles dans l'entreprise. Mais comment ma\u00eetriser l\u2019usage des applications personnelles grand public, et en m\u00eame temps faciliter la distribution d\u2019applications professionnelles en toute s\u00e9\u00adcurit\u00e9 ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/09\/Applications-Fotolia_60254945_Subscription_Monthly_XL.jpg","width":3900,"height":2080},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2014\/09\/mobile-application-management-quel-interet-les-entreprises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Mobile Application Management : quel int\u00e9r\u00eat pour les entreprises ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/85d1a8fea2260ef080653feb33d51ac3","name":"Arnaud Koechlin","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/arnaud-koechlin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=5793"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5793\/revisions"}],"predecessor-version":[{"id":5799,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/5793\/revisions\/5799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/5796"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=5793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=5793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=5793"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=5793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}