IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
1 - 25 of 979 Matches Previous Page  |  Next Page
What Will My Enterprise Mobile App Cost?
sponsored by Magenic
WHITE PAPER: Mobile app development is a complex undertaking where a myriad of decision points can impact cost; so unfortunately, there is no one simple formula for calculating a reliable estimate. However, this white paper explores 7 strategic perspectives that will help you factor in key cost considerations to safeguard your mobile app ROI.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Magenic

802.11ac Technical Poster
sponsored by Aruba Networks
WHITE PAPER: This poster highlights key information on a Wi-Fi performance system that is making sure all devices have the fastest connection at all times. Download now to take a look at some of the following topics – wider channels, efficient encoding aspects, increased data rates enhanced user experiences and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Aruba Networks

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

Case Study: Defending Mobile Apps from Attacks
sponsored by Arxan
WHITE PAPER: Discover how a leading medical device manufacturer hardened their application protection strategy to allow physicians to securely read and monitor patient data, as well as securely control medical devices using mobile applications. Learn how you can gain similar security benefits for your own applications.
Posted: 12 Jul 2016 | Published: 01 Jun 2016

Arxan

Mobilize Customers -- And your Potential
sponsored by UXC Oxygen
WHITE PAPER: Mobile means more than just a "portable website." Discover ways to bolster your mobile business initiatives with a fully integrated infrastructure, so you can drive sales and optimize processes.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

UXC Oxygen

Mobility In Government Services: A Checklist Towards Regulatory Compliance
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

Comprehensive Protection from Advanced Threats Requires Mobile Threat Assessment
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover how a mobile threat assessment strategy can provide comprehensive protection against the most vicious and perfidious mobile attacks. Also learn of the myriad attack vectors that threaten mobile devices today, employee involvement in protection, and more.
Posted: 11 Jul 2016 | Published: 31 Mar 2016

Check Point Software Technologies Ltd.

Demystifying Mobile Security Attacks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the most common types of mobile attacks – Android malware apps, iOS surveillance, MITM, and more – and what you can do in order to detect and prevent them from causing damage.
Posted: 11 Jul 2016 | Published: 30 Mar 2015

Check Point Software Technologies Ltd.

Shadow IT HDI Report
sponsored by ServiceNow
WHITE PAPER: View this white paper now and uncover how businesses can support the growing movement of Shadow IT and see for yourself how to ensure that the need for efficient mobile computing doesn't impede the progress of your business.
Posted: 08 Jul 2016 | Published: 08 Jul 2016

ServiceNow

Four Reasons it's Time to Move Beyond Excel
sponsored by Salesforce.com
WHITE PAPER: Excel works great for inputting data and crunching numbers, but it simply can't provide a comprehensive view of your data. In this white paper, discover how you can visualize data like never before and uncover hidden insights. Learn how you can explore sales data on any device, accelerate time to value, and ultimately, see the whole picture.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Salesforce.com

Security Implications of BYOD in Healthcare
sponsored by Optum
WHITE PAPER: This white paper examines the security implications of new mobile technology and movements like BYOD in the healthcare organization. Read on to uncover the unique impacts of BYOD, the most overlooked gaps in healthcare security, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Optum

The Solution for Engagement
sponsored by Avaya CenturyLink
WHITE PAPER: Your methods of communication are the connective tissue that holds your enterprise together. This white paper details how communications are evolving and how new platforms can benefit your business by delivering complete solutions that enable you to implement widespread engagement capabilities.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Save Time and Achieve Payback Quickly with Total Laptop Overhaul
sponsored by Dell and Microsoft
WHITE PAPER: Boost your users' productivity to get more work done in half the time—delivering fast ROI to IT—with an enterprise laptop overhaul. Read this paper to get the specs on detailed system information, and enable your employees to seamlessly open and engage several apps at a time, host international conference calls, edit file sets, and more.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

Dell and Microsoft

The Global Evolving Workforce: Key Trends and Future Outlook
sponsored by Dell and Microsoft
WHITE PAPER: Enabling users with their preferred devices is crucial to promoting productivity and growth. Discover ways implementing BYOD policies takes pressure off of IT decision-makers, and how to make security an integral part of your strategy.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Dell and Microsoft

Making Desktop Virtualization More Viable Through Endpoint Innovation
sponsored by Dell, Inc.
WHITE PAPER: Access this exclusive white paper to discover how organizations can take an end-to-end approach to desktop virtualization that allows them to leverage emerging endpoint designs to expand the range of devices, users, use cases, and workloads within their environments.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Four Steps to Being More Mobile Than Ever
sponsored by Dell, Inc.
WHITE PAPER: Access this expert white paper to examine four key steps involved in enhancing mobility. Discover technologies and platforms that will give your organization the foundation it needs to be more flexible and mobile than ever.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Dell, Inc.

Benefits of the Wire-Free Workplace
sponsored by Atos
WHITE PAPER: In a corporate environment, things like meetings, conferences, and sales presentations can be delayed, because of the annoying management of mobile devices and their cables. And due to these delays, business opportunities can go to waste. Read this white paper that details all the benefits of making your business wire-free.
Posted: 21 Jun 2016 | Published: 31 Mar 2016

Atos

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Protect and Distribute BYOD documents
sponsored by IBM
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Enterprise Email on Mobile Devices
sponsored by IBM
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

BYOD Mobile Device Management
sponsored by IBM
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM
1 - 25 of 979 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement