IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
1 - 25 of 1007 Matches Previous Page  |  Next Page
Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Online Team Collaboration: Reaching New Levels With an All-In-One Platform
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper looks at the obstacles small and medium-sized businesses (SMBs) face as they rely on disparate communications tools and the value of an all-in-one platform for messaging, meetings and calls that modernizes today's collaborative workflow and ensures secure, end-to-end communications encryption.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

Cisco Systems, Inc.

Best Practices for Writing Secure iOS and Android Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: As mobile applications grow to reach wider audiences, they become larger targets for cyberattackers. Access this list of 21 mobile security guidelines for developers and security pros when developing Android and iOS mobile apps. Learn how to provide security at every step of the mobile application development and management processes.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Proofpoint, Inc.

Why App Stores Cannot Protect Enterprises from Malware and Dangerous Apps
sponsored by Proofpoint, Inc.
WHITE PAPER: Attackers have adapted to the mobile environment. Discover 18 examples of how curated app stores are failing to protect enterprises from malware and dangerous apps, and cannot provide compliance or privacy protection.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Proofpoint, Inc.

BYOD & MDM: Why you’re still at risk – and what you can do about it
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper discover how you can reap the benefits of BYOD and MDM while also keeping your data and devices secure. Also uncover 9 threats that MDM solutions often fail to catch.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Proofpoint, Inc.

See How Phillip Morris Ramped Up its Mobile Management Across 60 Countries
sponsored by MobileIron
WHITE PAPER: Discover how Philip Morris secured its corporate-issued and employee-owned devices, maintains an accurate device count across 60 countries, resets employee passcodes in seconds, and manages its growing lineup of productivity apps.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

MobileIron

Gain Complete Control of Your Digital Ecosystem
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Transforming the Enterprise with Secure Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: The benefits of the mobile workplace are many. But without new ways to secure it, no enterprise could tolerate the security risks of flexible workplaces. This white paper explains why security is the hidden enabler of the new mobile culture. Access now to learn how providing secure mobile network connections can increase employee productivity.
Posted: 14 Sep 2016 | Published: 29 Apr 2016

Cisco Systems, Inc.

IT Guide for Mobility: Making the Case to Marketing Leaders
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource offers strategies to help IT communicate the full value of mobility to marketing stakeholders in the organization. It explains why partnering with IT is their smartest path to success.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Cisco Systems, Inc.

IT Guide for Mobility: Making the Case to Operations Leaders
sponsored by Cisco Systems, Inc.
WHITE PAPER: This guide offers strategies to help IT communicate the value of mobility to key stakeholders on the operations side of your organization. Further, you'll learn why partnering with IT is their smartest path to success.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Cisco Systems, Inc.

Windows 10, Enterprise Mobility Management, and the Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: This white paper examines how Windows 10, enterprise mobility management (EMM) platforms, and mobile devices are changing the way you can approach complicated security and management tasks. Uncover the top 5 PC management capabilities of EMM, key considerations in adopting an EMM platform, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

The Top Ten Things CIOs Ask About Enterprise Mobility
sponsored by MobileIron
WHITE PAPER: As consumers become more mobile, they want their work lives to be just as flexible and responsive to their needs. This white paper provides the top ten questions most commonly asked by CIOs about enterprise mobility. Access now to see the answers to these questions that will assist your construction of a mobility strategy.
Posted: 13 Sep 2016 | Published: 29 Jul 2016

MobileIron

The Ultimate Guide to EMM
sponsored by MobileIron
WHITE PAPER: How can your organization prepare for the explosive global demand for mobile device usage? By employing enterprise mobility management (EMM). Access this guide that details EMM, EMM deployment best practices, what to look for in an EMM provider and much more.
Posted: 13 Sep 2016 | Published: 29 Jul 2016

MobileIron

IT Guide for Mobility: Making the Case to Business Leaders
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this guide to gain strategies on communicating the full value of mobility to key business stakeholders in the organization, from HR to Marketing and beyond.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Cisco Systems, Inc.

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from, and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

IT Guide for Mobility: Making the Case to HR Leaders
sponsored by Cisco Systems, Inc.
WHITE PAPER: This primer offers some strategies to help IT communicate the full value of mobility to key HR stakeholders in the organization. It explains why partnering with IT is their smartest path to success.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Mobile Malware Hits Active Sync-Only Devices
sponsored by MobileIron
WHITE PAPER: Learn how malware on mobile devices function and menace individuals and enterprises alike, and the particulars of the top threats such as: Stagefright targeting up to 99% of Android devices, XcodeGhost attacks iOS devices with thousands of infected apps, and 2 more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

MobileIron

Mobility for Today, Supporting Strategies for Tomorrow
sponsored by CraveInfoTech
WHITE PAPER: Mobility is the next major workforce improvement, but many companies have not yet made the proper investments due to various concerns, like security and ROI. Access this white paper to overcome these concerns, learn what mobility has to offer various vertical industries, and how it benefits HR teams across the board.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

CraveInfoTech

Worldwide EMM Market Shares: Vendors and Market Share Changes the Landscape
sponsored by VMware, Inc.
WHITE PAPER: This study analyzes the EMM market, ranking the top 14 vendors by revenue and revealing the market trends and events that have helped shape the market landscape. Uncover advice on what you can do in the EMM buying phase.
Posted: 12 Sep 2016 | Published: 31 May 2016

VMware, Inc.

The New Security Paradigm for Digital Government: Securing Data and Assets within an IT Ecosystem that Extends Beyond Agency Walls
sponsored by Unisys
WHITE PAPER: This white paper details why federal agencies are transitioning to digital environments, the new security risks these environments present, and how to protect sensitive information from unauthorized access.
Posted: 06 Sep 2016 | Published: 30 Jun 2016

Unisys

The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond
sponsored by Lookout
WHITE PAPER: Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

Transforming User IT Support: Bringing Users and Resolution Closer Together
sponsored by IBM
WHITE PAPER: This white paper provides an in-depth look at the right-to-left strategy components designed to help IT leaders evaluate their support environments. Discover ways to demonstrate quantitative improvement in productivity and cost savings.
Posted: 02 Sep 2016 | Published: 31 Dec 2014

IBM

IBM Managed Mobility Services for Mac: Integrate and Manage Mac Devices Across Your Enterprise
sponsored by IBM
WHITE PAPER: Discover a streamlined method for delivering, setting up, configuring, supporting, and managing Mac devices in this white paper. Explore the benefits that IBM's managed mobility services offering can provide, including improved employee satisfaction and productivity, reduced risk to corporate data while enabling device preference, and more.
Posted: 01 Sep 2016 | Published: 29 Apr 2016

IBM

Worried About Mobile Security? You Should be
sponsored by IBM
WHITE PAPER: Learn the importance, growth, and lethal significance of mobile security threats. Uncover why malware has exploded out of its infancy with a vengeance, how built-in security controls from vendors won't protect mobile devices, why fraudsters can effectively "fly under the radar", and more.
Posted: 01 Sep 2016 | Published: 31 Jul 2016

IBM
1 - 25 of 1007 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement