IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
151 - 175 of 1006 Matches Previous Page  |  Next Page
Enabling Enterprise Mobility with APIs
sponsored by MuleSoft
WHITE PAPER: This paper reviews the primary drivers and challenges faced by enterprises trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity. Access this white paper now to devise a mobile strategy for your business.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

MuleSoft

Embracing Strategic Mobility for Small to Midsize Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this white paper, Nolan Greene, research analyst with IDC's Network Infrastructure group, breaks down the concerns with regards to adopting mobility in small to midsize businesses. Learn how to best adapt your SMB to current mobile trends.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Cisco Systems, Inc.

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: In this white paper, discover the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

Mobile Security Threats: Get Ready for 2016
sponsored by CloudMine
WHITE PAPER: This valuable resource will help your organization to bolster your mobile security defenses as you race to adopt new technologies to stay ever-more innovative and agile. View now to discover 6 top mobile security threats, as well as 8 best practices for securing your enterprise mobile apps.
Posted: 16 Oct 2015 | Published: 16 Oct 2015


How to Avoid the Software Licensing Cost Trap
sponsored by Matrix42
WHITE PAPER: There is now an urgent requirement for transparency and control over software compliance within companies. This white paper serves as an instructive guide for optimizing your software expenses using asset management, ensuring the efficient use of software.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

Matrix42

The New BYOD: Best Practices for a Productive BYOD Program
sponsored by vmware airwatch
WHITE PAPER: This white paper demonstrates how to leverage BYOD as a tool to drive mobile accessibility in your business. It outlines the basic measures that must be taken to dramatically boost productivity. Read on now to learn how to transition from corporate-owned devices to a BYOD-centric workplace.
Posted: 08 Oct 2015 | Published: 08 Oct 2015

vmware airwatch

BYOD Done Right Is a Win-Win for Workforce Mobility
sponsored by vmware airwatch
WHITE PAPER: By accessing this paper by Frost & Sullivan, you'll discover how VMware AirWatch delivers a compromise-free approach to workforce mobility. Learn what this particular BYOD strategy entails, and what facets of customization are a key part of it.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

vmware airwatch

5 Steps to Migrate Your Applications to the Cloud Stress Free
sponsored by Commvault
WHITE PAPER: In this white paper, you'll find a five-step process for securely migrating your applications to the cloud and keeping them secure once they're there.
Posted: 29 Sep 2015 | Published: 29 Sep 2015

Commvault

Enterprise Mobility Best Practices: MDM, Containerization or Both?
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you will learn why both MDM and application-level management are still relevant for device deployments, providing additional functionality and security.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Transforming Data Center Security for Business Mobility with Smart Networking
sponsored by vmware airwatch
WHITE PAPER: In this white paper, you will learn about an IT solution that solves this challenge of securing proprietary applications and data in the cloud data center. Learn what these cloud security approaches can offer over traditional security methods.
Posted: 18 Sep 2015 | Published: 18 Sep 2015

vmware airwatch

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by vmware airwatch
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage Office 365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

Stories of Business Transformation
sponsored by vmware airwatch
WHITE PAPER: This white paper reviews one EMM platform that can deliver flexible mobility to your employees. Access this guide to see what differentiates this platform from the others, with features including a suite of integrated productivity and collaboration apps.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

vmware airwatch

State of the WAN Report: Software Defined WAN Emerges
sponsored by Citrix
WHITE PAPER: Connectivity is the way of the future. Understanding the current state and future of networking is the key to success. Access this report to learn about the current state of WAN technology, the future of software-defined WAN and how your organization should prepare for future networking needs.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Citrix

Ransomware: How cyber criminals hold your data hostage
sponsored by IBM
WHITE PAPER: This white paper explores the growing ransomware threat and how you can defend against it.
Posted: 09 Sep 2015 | Published: 30 Jun 2015

IBM

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

The 10 Pillars To Building A Winning Mobile Strategy
sponsored by Red Hat
WHITE PAPER: This white paper addresses the disruptive nature of mobile technology for businesses and offers 10 pillars for mobile success.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Red Hat

The Enterprise Mobile Landscape
sponsored by Red Hat
WHITE PAPER: This eBook divulges the results of a survey of 120 global organizations on the challenges of enterprise mobility, the Internet of Things, and mobile app development. In addition, read on to discover the 10 pillars of an effective mobility strategy.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Red Hat

Videoconferencing and Telepresence Adoption: The New Frontier
sponsored by Vyopta
WHITE PAPER: In this e-guide, Katherine Trost explains how to guide IT leaders through the video decision process. Read on to learn more about the physical pieces of enterprise video conferencing solutions.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Vyopta

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Gartner Magic Quadrant for EMM
sponsored by VMware
WHITE PAPER: This white paper reviews the 2015 EMM market, and is a guide for organizations looking to introduce EMM into their businesses, as well as for those intending to upgrade mobility services. Access this paper now to analyze the strengths and weaknesses of 11 EMM vendors.
Posted: 18 Sep 2015 | Published: 08 Jun 2015

VMware

Enterprise Mobility Management Security: How to Score Vendor Fulfillment
sponsored by VMware
WHITE PAPER: This white paper offers the specifics of network connection and BYOD policies, coverage of enterprise-issued mobile devices, and managed security as fulfilled by these vendors.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

EMM Vendor Report Card: How Do Mobility Providers Stack Up?
sponsored by VMware
WHITE PAPER: This white paper highlights the mobility services of one EMM provider that continues to raise the bar in business mobility. Get access to 10 steps to researching and identifying best practices criteria for stacking up EMM vendors' services.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

2014 Report: Enterprise Mobility Management Software Market Shares
sponsored by VMware
WHITE PAPER: This IDC study provides a competitive analysis of the enterprise mobility management (EMM) software market for 2014. In addition to a ranking of the top 15 vendors by revenue, it provides an overview of key market trends and vendors that helped shape the market landscape in 2014.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

VMware

Powering Disaster Recovery in the Cloud
sponsored by Commvault
WHITE PAPER: In this white paper, you will learn more about the challenges organizations face with it comes to DR, and how the cloud can come to the rescue of your organization. Read on to find out how to securely store customer data in the public cloud while fending off security concerns.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault
151 - 175 of 1006 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement