IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
151 - 175 of 1084 Matches Previous Page  |  Next Page
Manage Your Enterprise Apps Securely
sponsored by IBM
WHITE PAPER: Access this brief white paper to learn how you can ensure mobile app security with a mobile application management (MAM) solution.
Posted: 06 Jul 2015 | Published: 13 May 2015

IBM

MDM Best Practices: Proactive Application Security
sponsored by IBM
WHITE PAPER: Ensuring mobile security now goes beyond MDM and MAM to mobile application lifecycle management (MALM). This white paper reviews MALM best practices for organizations with bring your own device (BYOD) policies.
Posted: 06 Jul 2015 | Published: 26 Dec 2014

IBM

A practical guide to creating mobile enterprise programs
sponsored by IBM
WHITE PAPER: This informative paper discusses practical best practices for implementing effective mobile enterprise programs that can create significant value for employees, partners, and customers.
Posted: 06 Jul 2015 | Published: 25 Feb 2014

IBM

Enterprise Mobility Management - The Big Bang Theory
sponsored by IBM
WHITE PAPER: In this CITO research report, learn about managing the big bang of mobility through mobile device management, mobile application management, and mobile content management systems. Read on to learn about what's in store for today's mobile universe, and what looms in the future.
Posted: 06 Jul 2015 | Published: 03 Sep 2014

IBM

How to Meet your Mobile Device Management Challenges
sponsored by IBM
WHITE PAPER: This brief white paper highlights 6 key features of a mobile device management (MDM) system that will help configure devices for enterprise access and secure corporate data on smartphones and tablets – all from a single screen.
Posted: 06 Jul 2015 | Published: 05 Sep 2014

IBM

Mobile Device Management Policy Best Practices
sponsored by IBM
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority. Securing the data and access points between corporate systems and your workers' variety of mobile devices requires just as much consideration and planning as protecting the devices themselves. Read on to disover the best business practices of MDM.
Posted: 06 Jul 2015 | Published: 01 Aug 2014

IBM

Determining the Right Mobile Security Solution for Your Organization
sponsored by IBM
WHITE PAPER: This helpful white paper presents the steps every organization should take before committing to a mobile security solution, and examines the pros and cons of different potential security strategies.
Posted: 06 Jul 2015 | Published: 07 Aug 2014

IBM

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Explore this resource to discover tips, best practices, and a mobile device management solution to help you manage a multitude of different devices within your IT environment and how you can provide added flexibility to your workforce without sacrificing security.
Posted: 06 Jul 2015 | Published: 28 Aug 2014

IBM

The 10 Principles of BYOD
sponsored by IBM
WHITE PAPER: Access this white paper to discover the 10 key principles you must keep in mind as you implement a successful BYOD program.
Posted: 06 Jul 2015 | Published: 26 Aug 2014

IBM

How Mobility and Analytics Are Redefining Business
sponsored by IBM
WHITE PAPER: This resource explains how the convergence of mobility and analytics within modern enterprises can improve decision-making, enable collaboration, drive faster results, and more.
Posted: 02 Jul 2015 | Published: 31 Jul 2014

IBM

The Changing Face of Unified Communications
sponsored by NEC
WHITE PAPER: This white paper looks at the emerging technologies for UC as a result of the cloud and how that will impact your enterprise and your workforce.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

NEC

Mobile File Management Case Study: The Government of Basel-Stadt
sponsored by Acronis
WHITE PAPER: Access this white paper and learn how the Government of Basel-Stadt implemented a mobile file management solution that ensures security and control while enabling a productive mobile workforce. Read on to learn how to give employees access to files while preventing security breaches.
Posted: 01 Jul 2015 | Published: 28 Nov 2014

Acronis

Secure Access between Endpoints and Corporate Resources
sponsored by HID
WHITE PAPER: This white paper explores how securing corporate data through mobile devices is possible by transforming it into a two-factor authentication token. Read on to learn how to manage your authentication methods, protect your data, maximize your productivity, and more.
Posted: 30 Jun 2015 | Published: 20 Feb 2013

HID

Workplace Mobility, Consumerization, and Alternative IT Strategy Drive End-user Computing Transformation
sponsored by VMware
WHITE PAPER: Access this white paper to learn how to build a desktop transformation strategy that incorporates six application desktop delivery models, endpoint choice, and a safe and secure environment for IT.
Posted: 30 Jun 2015 | Published: 31 Dec 2013

VMware

Enterprise Mobility Productivity Checklist
sponsored by Acronis
WHITE PAPER: Access this white paper for a checklist of the 7 essential steps you must take to create a productive mobile environment for your enterprise.
Posted: 29 Jun 2015 | Published: 26 Dec 2014

Acronis

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

Building a Mobile Workforce to Accelerate Productivity
sponsored by Acronis
WHITE PAPER: This case study reviews how a full-service construction firm, was able to mobilize its workers with a revamped UC strategy. Access this white paper to accelerate your workforce productivity by leveraging the dynamics of enterprise unified communications.
Posted: 26 Jun 2015 | Published: 30 Jun 2014

Acronis

Managing App Sideloading Threats on iOS 2015
sponsored by Lookout
WHITE PAPER: This white paper examines the security threats organizations face when attackers continue to abuse enterprise provisioning and use it to sideload malware on iOS devices.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

Lookout

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: Access this white paper to learn everything you need to know about the current state of mobile security threats for both iOS and Android.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Lookout

Anywhere Access to SAP Applications
sponsored by Citrix
WHITE PAPER: This white paper explores how to enable your workforce to universally access SAP applications while centralizing management for increased security.
Posted: 24 Jun 2015 | Published: 07 May 2014

Citrix

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

How to Create a Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores how a secure mobile enterprise increases productivity and collaboration while opening the doors to business transformation, competitive advantage and improved performance.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Case Study: How Varian Medical Systems Employees Became More Productive with Mobile Solutions
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

Study: How to make mobile successful within the organisation – what every CEO needs to know
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42
151 - 175 of 1084 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement