IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
1 - 25 of 1045 Matches Previous Page  |  Next Page
10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

The Trouble With Instant Messaging On The Move
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about the challenges with mobile IM security tools and discover a mobile IM security solution that provides organizations with enhanced security over corporate data in IM environments.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Critical Capabilities for Mobile Application Development Platforms
sponsored by Kony
WHITE PAPER: Inside this Gartner report, you'll discover ratings of 11 different platforms based on 4 different use cases. Read on to see how each of these platforms performed and to choose the one that will be best for your enterprise.
Posted: 22 Jul 2015 | Published: 24 Dec 2014

Kony

Mobile Backend-as-a-Service (MBaas)
sponsored by Kony
WHITE PAPER: Access this whitepaper to discover how mobile backend as a service (MBaaS) can be utilized as the backend for anything with a frontend, including desktop, web, and mobile apps – as well as the growing number of applications within the Internet of Things.
Posted: 22 Jul 2015 | Published: 01 Jul 2015

Kony

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID

Best Practices for Building a Mobility Strategy
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn how you can create a mobile strategy that enables a productive workforce without harming security or control.
Posted: 17 Jul 2015 | Published: 30 May 2014

Cisco Systems, Inc.

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Extreme Networks
WHITE PAPER: In order to fully accept the "Bring Your Own Device" (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 16 Jul 2015 | Published: 17 Dec 2014

Extreme Networks

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

Intro to Mobile App Management: App Security from the Onset
sponsored by IBM
WHITE PAPER: This white paper, the first in an installment of three, explores how to create a successful app security strategy from the beginning.
Posted: 16 Jul 2015 | Published: 24 Jun 2015

IBM

Managing Communications in Modern Business
sponsored by Vodafone/Cisco
WHITE PAPER: Access this brief white paper to learn how the business world is changing and discover the innovation that's driving improved communications management.
Posted: 15 Jul 2015 | Published: 31 Mar 2015

Vodafone/Cisco

Secure Content Collaboration on the Go
sponsored by IBM
WHITE PAPER: This white paper discusses the dangers of mobile content sharing and gives advice on what you can do to make it secure.
Posted: 15 Jul 2015 | Published: 15 Jul 2015

IBM

How to Choose the Right EMM Platform
sponsored by IBM
WHITE PAPER: This exclusive resource compares the top EMM platforms today and provides key takeaways for each one.
Posted: 15 Jul 2015 | Published: 30 Sep 2014

IBM

Going Green with Enterprise Mobility
sponsored by Smart Numbers
WHITE PAPER: In this white paper, you'll learn about a new mobile solution that creates true dual-persona capability for any smartphone, giving organizations the ability to provide staff with a second mobile number – not a second handset.
Posted: 14 Jul 2015 | Published: 14 Jul 2015


Mobile Malware: The Hackers' New Playground
sponsored by IBM
WHITE PAPER: This comprehensive white paper outlines how to prevent security breaches in mobile apps. Read on to learn about the intricacies of mobile malware, mobile threat management, how iOS is still vulnerable to attacks, and much more.
Posted: 13 Jul 2015 | Published: 13 Jul 2015

IBM

Mobile Device Management for Retail
sponsored by IBM
WHITE PAPER: Access this white paper to learn about the new age of mobility in the retail space, as well as how to overcome security challenges with centralized device control, compliance, system updates, and disaster recovery.
Posted: 13 Jul 2015 | Published: 26 Dec 2014

IBM

Taking Windows Mobile on Any Device
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an application virtualization platform that centralizes and virtualizes Windows apps and desktops in the data center and deliver high-performance, secure access to them from any type of mobile device, at any time.
Posted: 13 Jul 2015 | Published: 30 Apr 2015

Citrix

Your New EMM Platform
sponsored by BlackBerry
WHITE PAPER: Download this white paper to discover an enterprise mobility management (EMM) platform that manages all aspects of your mobile environment – including device, app, and security. Also, learn about a migration strategy to help you move to this platform.
Posted: 09 Jul 2015 | Published: 31 Dec 2014

BlackBerry

Embracing Secure BYOD
sponsored by Acronis
WHITE PAPER: Access this white paper to learn the 7 key features to look for when evaluating a comprehensive access, sync and share solution as you empower your mobile employees.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

Acronis

Manage Your Enterprise Apps Securely
sponsored by IBM
WHITE PAPER: Access this brief white paper to learn how you can ensure mobile app security with a mobile application management (MAM) solution.
Posted: 06 Jul 2015 | Published: 13 May 2015

IBM

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM

A practical guide to creating mobile enterprise programs
sponsored by IBM
WHITE PAPER: This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers.
Posted: 06 Jul 2015 | Published: 25 Feb 2014

IBM

Enterprise Mobility Management - The Big Bang Theory
sponsored by IBM
WHITE PAPER: In this CITO research report, learn about managing the big bang of mobility through mobile device management, mobile application management, and mobile content management systems. Read on to learn about what's in store for today's mobile universe, and what looms in the future.
Posted: 06 Jul 2015 | Published: 03 Sep 2014

IBM

How to Meet your Mobile Device Management Challenges
sponsored by IBM
WHITE PAPER: This brief white paper highlights 6 key features of a mobile device management (MDM) system that will help configure devices for enterprise access and secure corporate data on smartphones and tablets – all from a single screen.
Posted: 06 Jul 2015 | Published: 05 Sep 2014

IBM

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: Managing smartphones and tablets is only half the Mobile Device Management (MDM) story. Securing the data and access points between corporate systems and your workers' variety of mobile devices requires just as much consideration and planning as protecting the devices themselves.
Posted: 06 Jul 2015 | Published: 01 Aug 2014

IBM
1 - 25 of 1045 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement