IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
101 - 125 of 1103 Matches Previous Page  |  Next Page
SDN 102: Tune into Application Delivery Network Services
sponsored by Citrix
WHITE PAPER: IT organizations need to respond rapidly to the ever-changing needs of their users for resources to support their business applications. This white paper will describe some of the models for SDNs, identify some of the associated use cases and describe methods to successfully integrate application delivery network services.
Posted: 31 Jul 2015 | Published: 31 Jul 2015

Citrix

Drive business growth with mobile workspaces
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about a complete mobile workspace solution that provides all the technologies you need to get started implementing your enterprise mobility strategy today. Also, explore the benefits of having a mobile workspace solution in your organization.
Posted: 31 Jul 2015 | Published: 29 Aug 2014

Citrix

Best practices to enable clinician mobility for patient centered healthcare
sponsored by Citrix
WHITE PAPER: This white paper offers tips for healthcare organizations seeking the benefits of a more mobile environment. Read on to learn strategies, solutions, and real-world examples for transforming healthcare IT without sacrificing security or compliance.
Posted: 31 Jul 2015 | Published: 30 Apr 2013

Citrix

Safeguarding Data and the Mobile Enterprise
sponsored by IBM
WHITE PAPER: As enterprises explore the use of mobile applications, new processes have to be built to secure these applications against compromise. This white paper addresses the unique risks associated with mobile devices, and the capabilities you should consider when building your roadmap to safeguarding data and applications.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

IBM

The 10 Keys to Seeing 20/20 on Your EMM Vision
sponsored by Accelerite
WHITE PAPER: Mobile devices, BYOD initiatives, cloud applications, and new technologies have ushered in fundamental changes in the way corporate IT needs to think about and manage endpoints in businesses, schools, healthcare, and beyond. This white paper examines the must-have strategies for IT mobility management implementation in your organization.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Accelerite

Five customers deliver virtual desktops and apps to empower a modern workforce
sponsored by Citrix
WHITE PAPER: Access this white paper to explore a comprehensive app and desktop virtualization solution that depending on their key business priorities, will deliver the right kind of virtual desktop experience to each user. Discover use cases that help to address important business priorities.
Posted: 30 Jul 2015 | Published: 31 Oct 2013

Citrix

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

Four customers who never have to refresh their PCs again
sponsored by Citrix
WHITE PAPER: Access this white paper to explore four organizations who have transformed their business by implementing desktop virtualization, paired within client computing. Find out how this enabled IT to escape the costly PC refresh cycles and reallocate their PC refresh budget into other business areas.
Posted: 30 Jul 2015 | Published: 31 Oct 2014

Citrix

From BlackBerry to BYOD, CYOD or COPE
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the security, management, and application delivery features of Blackberry, Apple iOS and Google Android devices. Also, discover a comprehensive enterprise mobility management (EMM) and mobile device management (MDM) platform for BYOD initiatives.
Posted: 30 Jul 2015 | Published: 30 Apr 2015

Citrix

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

New Revenue and Profit Opportunities for Service Providers
sponsored by Solarwinds N-able
WHITE PAPER: This white paper details how service providers can easily transition to managed services in order to stay successful.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Modern-Day Mobile Email Gets a Facelift
sponsored by Citrix
WHITE PAPER: You can get all of the scale, functionality and management control required without holding users back from their devices, applications or productivity. This white paper examines a comprehensive enterprise mobility management solution that enables complete and secure mobile device freedom.
Posted: 29 Jul 2015 | Published: 31 Dec 2014

Citrix

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Top 10 reasons to strengthen information security with desktop virtualisation
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how desktop virtualization overcomes information security challenges in today's enterprises. You'll discover how desktop virtualization compares to traditional security models and the top 10 benefits of using desktop virtualization to strengthen information security.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

Bring Your Own Device: From Security to Success
sponsored by Apperian, Inc.
WHITE PAPER: This e-Book was designed to walk you through best practices for executing a BYOD policy. It provides best approaches for data security, tips for employee-proofing you mobility solution, and an overview of what's next with BYOD 2.0
Posted: 28 Jul 2015 | Published: 28 Jul 2015

Apperian, Inc.

The Trouble with Instant Messaging on the Move
sponsored by BlackBerry
WHITE PAPER: This white paper explores the challenges involved in securing mobile IM services in the workplace. Read on to learn about a mobile IM security solution that provides organizations with enhanced security over corporate data in instant messaging environments.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

Critical Capabilities for Mobile Application Development Platforms
sponsored by Kony
WHITE PAPER: Inside this Gartner report, you'll discover ratings of 11 different platforms based on 4 different use cases. Read on to see how each of these platforms performed and to choose the one that will be best for your enterprise.
Posted: 22 Jul 2015 | Published: 24 Dec 2014

Kony

Mobile Backend-as-a-Service (MBaas)
sponsored by Kony
WHITE PAPER: Access this whitepaper to discover how mobile backend as a service (MBaaS) can be utilized as the backend for anything with a frontend, including desktop, web, and mobile apps – as well as the growing number of applications within the Internet of Things.
Posted: 22 Jul 2015 | Published: 01 Jul 2015

Kony

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID

Tablets Designed for Mobile Productivity
sponsored by Dell, Inc.
WHITE PAPER: This brief white paper features tablets specifically suited for business productivity. Access now to discover cost-effective security, management and productivity for the enterprise.
Posted: 20 Jul 2015 | Published: 26 May 2015

Dell, Inc.

Mobility Myth Busting: BYOD, Tablets and Mobile Apps
sponsored by Dell, Inc.
WHITE PAPER: This brief white paper presents the 3 key myths that are holding enterprise mobility strategies back and explains how to move beyond them.
Posted: 20 Jul 2015 | Published: 28 Nov 2014

Dell, Inc.

Tablets That Work for Business
sponsored by Dell, Inc.
WHITE PAPER: In this informative white paper, explore the four main concerns with tablets in work environments today.
Posted: 17 Jul 2015 | Published: 29 Aug 2014

Dell, Inc.

Rethinking Your Approach to Mobile Business
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn about the IDEA cycle approach to embracing a mobile mindset.
Posted: 16 Jul 2015 | Published: 24 Jan 2014

Dell, Inc.
101 - 125 of 1103 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement