IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
1 - 25 of 937 Matches Previous Page  |  Next Page
macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Managing and Maintaining Windows 10
sponsored by Citrix
WHITE PAPER: The new model of Windows 10 has much to offer enterprises, from faster innovation to a streamlined as-a-service model. Learn more.
Posted: 17 Aug 2017 | Published: 17 Aug 2017

Citrix

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

How to implement a user-choice program
sponsored by JAMF
WHITE PAPER: 72% say being able to choose their own devices makes employees more productive. How does this work? This e-book delivers five steps to creating and implementing a technology choice program in your organization. Learn how to streamline deployments, management, security, and more.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

The New Productive Workplace: Mobile Resource Strategy in Midsize Firms
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this IDC report on mobile resource strategy planning to learn how your peers are approaching their strategies and where mobility lands on their list of priorities. You will also gain a global perspective by seeing how attitudes differ between developing and developed countries and how this impacts attitudes toward key technologies.
Posted: 09 Aug 2017 | Published: 31 May 2017

Hewlett Packard Enterprise

Take The Next Step To Becoming A Best-In-Class Mobile Organization
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This report looks at the challenges that businesses face in taking the next step in their mobile initiatives, how new technologies are changing many areas of business, and how leading organizations are embracing next-generation mobile technology.
Posted: 08 Aug 2017 | Published: 29 Dec 2016

Hewlett Packard Enterprise

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

MobileIron

Workplace transformation: Unleash innovation and lower costs with new technologies and work environments
sponsored by Citrix
WHITE PAPER: Find out how you can enable a digital workplace powered by secure app and data delivery technology, to transform your organization's physical space to better meet the needs of the people who use it.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Citrix

Five signs it's time for mobile workspace delivery
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how mobile workspaces can benefit your organization and employees alike, and how EMM can be easily integrated into your existing virtualization platform.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Citrix

Five signs it's time for mobile app delivery
sponsored by Citrix
WHITE PAPER: Download this white paper to discover the workspace platform that can mobilize your employees and allow users easy and secure access to apps, desktops, data and services from any device, over any network. And find out the key questions you should be asking to guide your organization's move beyond virtualization towards mobility.
Posted: 20 Jul 2017 | Published: 20 Jul 2017

Citrix

How to Tackle the Three Biggest Barriers to Business Mobility
sponsored by Citrix
WHITE PAPER: 29% of the global workforce is fully mobile, allowing productivity to skyrocket. Mobility is achievable for any business, but there are significant obstacles along the way. Does your workplace know enough about security and implementation to join in? This Whitepaper will help you overcome the biggest barriers to mobility in your business.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

Workspaces of the Future
sponsored by Citrix
WHITE PAPER: Organizations need to update their operations to respond to and take advantage of the changes in end user workspace requirements. Download this white paper to discover how, Workspace as a Service (WaaS) can benefit your organization and compare the advantages of WaaS to traditional app deployments.
Posted: 19 Jul 2017 | Published: 31 Aug 2016

Citrix

4 Ways to Reduce the Risk of Ransomware
sponsored by Citrix
WHITE PAPER: In recent years, ransomware such as Locky and KeRanger have emerged as a top threat, not just to consumers, but to businesses with high-value data. Read this whitepaper for four best practices to protect yourself from this costly threat.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Building the Digital Workplace
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how your organization can benefit from a digital workspace with cloud-ready data, unified endpoint management, high quality user experience, improved security, and more.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Acceptable Use: How to Write a Mobile Policy Document Employees will Actually Follow
sponsored by BlackBerry
WHITE PAPER: This paper is designed to help you write the best possible mobile policy document to ensure that your employees do not abuse the technology, shirk responsibilities, or open your organizations to outside threats.
Posted: 11 Jul 2017 | Published: 02 Dec 2016

BlackBerry

A UEM Checklist for CIOs
sponsored by BlackBerry
WHITE PAPER: Once you've narrowed down your unified endpoint management (UEM), it can be time-consuming trying to make your decisions. This white paper is your guide to making your UEM decision and provides you a checklist of the critical areas you will need to address to make the best choice possible.
Posted: 11 Jul 2017 | Published: 30 Dec 2016

BlackBerry

5 Way to Manage Mobility and IoT Risks
sponsored by Aruba Networks
WHITE PAPER: While organizations today recognize that to stay competitive they must embrace BYOD, many still struggle with security. Uncover 5 ways to manage mobility and IoT risks.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

Aruba Networks

Access Visibility and Security for Wired and Wireless Devices
sponsored by Aruba Networks
WHITE PAPER: The traditional network perimeter is a thing of the past. IT security pros need the right tools to tackle existing and unforeseen challenges. Discover a 3 step approach to securing your network and the growing number of devices on it.
Posted: 27 Jun 2017 | Published: 27 Jun 2017

Aruba Networks

Security Considerations for Next Generation Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: Endpoint compliance assessments are critical for today's mobile workforce environment. This white paper explains how and where next-generation endpoint compliance should be enforced, as well as additional considerations that are critical for ensuring a secure network.
Posted: 27 Jun 2017 | Published: 18 Mar 2016

Aruba Networks

The Business Value of Securing and Authenticating Wireless and Wired Network Users
sponsored by Aruba Networks
WHITE PAPER: Network access control (NAC) is being largely seen as the answer to faster network security when it comes to dealing with the massive influx of mobile devices. This IDC report gives you what you need to plan your NAC strategy. You will get an overview of market trends, demographics, the business value a NAC system can help you realize, and more.
Posted: 26 Jun 2017 | Published: 29 Dec 2016

Aruba Networks

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

Accelerating Mobile App Adoption with Frictionless Security
sponsored by Blue Cedar
WHITE PAPER: In this white paper, learn about a new kind of mobile security that injects security code directly into existing applications to encrypt data, provide authentication protocols, and more.
Posted: 16 Jun 2017 | Published: 16 Jun 2017

Blue Cedar

Return on Infrastructure: SSDs and SEDs Reap the "New ROI" with Superior Security
sponsored by Micron
WHITE PAPER: Learn how to use storage hardware-level encryption to improve data backup and security, in the form of SSDs and self-encrypting drives (SEDs), by downloading this resource. Read on to compare these drives to traditional HDD and software-based solutions in the areas of data security, EOL management, and DR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Micron
1 - 25 of 937 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement