We see time and time again, with things like shadow IT, that users don't always have the same level of appreciation for or understanding of why we need device management tools.
Control
Myth #2: With EMM, IT has complete control over your device and personal information.
Reality: Depending on the solution your company goes with, many EMM providers offer mobile application management (MAM) capabilities, which separate business and personal apps and data in a mobile container. Here they can be secured with encryption and other mobile DLP technologies and can be remotely locked and wiped by IT.
MAM operates at the higher app layer so IT can focus on protecting what matters – securing business apps and data, not the personal contents of the device.