IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
1 - 25 of 1046 Matches Previous Page  |  Next Page
Save Time and Achieve Payback Quickly with Total Laptop Overhaul
sponsored by Dell and Microsoft
WHITE PAPER: Boost your users' productivity to get more work done in half the time—delivering fast ROI to IT—with an enterprise laptop overhaul. Read this paper to get the specs on detailed system information, and enable your employees to seamlessly open and engage several apps at a time, host international conference calls, edit file sets, and more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Dell and Microsoft

The Global Evolving Workforce: Key Trends and Future Outlook
sponsored by Dell and Microsoft
WHITE PAPER: Enabling users with their preferred devices is crucial to promoting productivity and growth. Discover ways implementing BYOD policies takes pressure off of IT decision-makers, and how to make security an integral part of your strategy.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Dell and Microsoft

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc.
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Benefits of the Wire-Free Workplace
sponsored by Atos
WHITE PAPER: In a corporate environment, things like meetings, conferences, and sales presentations can be delayed, because of the annoying management of mobile devices and their cables. And due to these delays, business opportunities can go to waste. Read this white paper that details all the benefits of making your business wire-free.
Posted: 21 Jun 2016 | Published: 31 Mar 2016

Atos

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER: Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015

Unisys

Think Beyond the Device: Improving Clinician Workflows and Patient Outcomes
sponsored by Citrix
WHITE PAPER: Modern healthcare is being transformed by the adoption of mobile devices, new mobile health apps, BYOD and flex-work policies. While these trends provide powerful benefits for healthcare providers, they pose significant challenges for IT. This white paper discusses how to address these challenges.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

Citrix

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Protect and Distribute BYOD documents
sponsored by IBM
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

BYOD Mobile Device Management
sponsored by IBM
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

Mobile Threat Management
sponsored by IBM
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM

BYOD Cross-Platform Security: Protecting Enterprise Data
sponsored by IBM
WHITE PAPER: In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

IBM

Embrace True Business Mobility
sponsored by VMware, Inc.
WHITE PAPER: Enterprise leaders must adopt a cohesive, purpose-built strategy to empower mobile users. Explore ways to work seamlessly across unified desktops and mobile device platforms.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

VMware, Inc.

VDI – Simplify Your Migration to Windows® 10 and Beyond
sponsored by Citrix
WHITE PAPER: Find out how VDI can help you to streamline your Windows 10 migration and discover three critical questions to answer surrounding your migration to Windows 10.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Citrix

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
WHITE PAPER: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace and users have more latitude to connect to any network and download apps of their choice. The expectation is that the mobility experience just works anytime, anywhere. This is causing IT to struggle to maintain control.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Security Considerations for Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how endpoint compliance should be enforced in the mobile era. Access now and you'll also explore considerations that are critical for ensuring a secure network.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Empower a Mobile Workforce with Secure App Delivery
sponsored by Citrix
WHITE PAPER: As mobility and the internet create the expectation of immediate access to information from anywhere, IT is challenged with the need to deliver secure application access across any device. Discover how to ensure application security in the mobile trend.
Posted: 10 Jun 2016 | Published: 27 Feb 2015

Citrix

Empowering Mobile Security with Policy Management
sponsored by Aruba Networks
WHITE PAPER: Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rules associated with legacy authentication, authorization and accounting.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

BYOD Doesn't Have to be Your Biggest Headache
sponsored by Aruba Networks
WHITE PAPER: Security for BYOD and mobile initiatives must now be part of a larger conversation when securing the network for the new digital workplace. Based on existing best practices, this white paper outlines eight things you can do to boost network security amidst BYOD.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Solving the BYOD Challenge
sponsored by Aruba Networks
WHITE PAPER: Access this BYOD planning guide and find ways to determine key considerations, ask the right questions, and create a comprehensive project management plan that will ensure the success of your BYOD program.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Preventing Fraud Before Customers Become Affected
sponsored by IBM
WHITE PAPER: Learn how Pulaski Bank achieved the layered security and malware prevention they were looking for and how their struggles can benefit your organization. Not only will you prevent potential fraud, but also increase customer awareness.
Posted: 09 Jun 2016 | Published: 01 May 2016

IBM
1 - 25 of 1046 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement