IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
126 - 150 of 1046 Matches Previous Page  |  Next Page
5 Ways Mobility Will Change Your Contact Center
sponsored by Unify
WHITE PAPER: This exclusive white paper explains how the physical contact center is alive and well, and will be for a long time. It also explains why mobility changed the contact center to be untethered, allowing workers to complete tasks from anywhere around the world. Read on to learn more.
Posted: 17 Feb 2015 | Published: 17 Feb 2015

Unify

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

Transformation Everywhere: Are You Ready for A New Style of Business?
sponsored by Hewlett-Packard Company
WHITE PAPER: In this in-depth white paper, explore the "Tech CIO Playbook" to learn the strategies to adapting to the dynamic landscape of today. Read on to learn what you need to do to prepare and how to succeed in the marketplace with the right technology.
Posted: 13 Feb 2015 | Published: 03 Dec 2014

Hewlett-Packard Company

The Clinical End User Experience: Sub-Par Today, Optimal Tomorrow
sponsored by AppSense
WHITE PAPER: In this white paper, explore healthcare IT respondents' opinions on critical areas that could improve the user experience and boost productivity. Find out how VDI has experienced exponential growth within the healthcare industry due to its ability to support a multiplatform workplace.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

AppSense

The four cornerstones of a successful BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this informative e-guide, learn about the four cornerstones of a successful BYOD program: quality of user experience, device flexibility, vendor independence, and security policy. Information is one of the most valuable pieces of an organization – discover how to implement to right BYOD policy to secure it
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Dell, Inc. and Intel®

IDC Analyst Connection: Is Your Print and Document Infrastructure...Intellectual Property Security
sponsored by Hewlett-Packard Company
WHITE PAPER: In this analyst Q&A, Angèle Boyd, Group Vice President and General Manager, Imaging/Output Document Solutions, IDC, shares her insights and advice on a range of important printer and document-management related business productivity and IP security issues.
Posted: 11 Feb 2015 | Published: 11 Feb 2015

Hewlett-Packard Company

Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and Intel®

10 Common Pitfalls of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about the top 10 pitfalls commonly seen in endpoint backup and how to avoid them.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Druva Software

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

Cloud Mobility: Improve Mobile Collaboration and Capabilities
sponsored by IBM
WHITE PAPER: The following white paper explores the growing need for the mobile workforce to be connected to the enterprise network at all times and offers insight into a SmartCloud solution that intends to deliver just that. Read on to learn about the key mobility capabilities, benefits, and more.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

IBM

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Mobile File Sharing Solutions: 7 Key Factors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 7 key reasons why Accellion is selected over Dropbox to meet the need for a mobile, scalable, secure content management and sharing solution that extends enterprise security policies and controls to all devices.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

New Enterprise Imperative - Securing Mobile Content
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the requirements for providing secure mobile access to ECM platforms and cloud storage services, and how to best enable mobile productivity for your work force
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

The Aragon Research Globe for Mobile Content Management, 2014
sponsored by Accellion, Inc.
WHITE PAPER: A growing trend is the shift toward being able to manage mobile content as well as mobile devices and mobile apps. Managing critical content outside of repositories is what MCM is all about. Read the 2014 Aragon Research Globe Report for Mobile Content Management to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Accellion, Inc.

Optimizing the Datacenter Network for Improved Scalability, Orchestration, and Automation
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at the four pillars of computing, and how they all blend together to drive innovation and optimization in the network today. Read on to learn more.
Posted: 02 Jan 2015 | Published: 02 Jan 2015

Cisco Systems, Inc.

2014 Connected World Technology Final Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive research study conducted by Cisco offers a look at how employees feel about enterprise mobility.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Cisco Systems, Inc.
126 - 150 of 1046 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement