IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
26 - 50 of 969 Matches Previous Page  |  Next Page
IBM Managed Mobility Services for Mac: Integrate and Manage Mac Devices Across Your Enterprise
sponsored by IBM
WHITE PAPER: Discover a streamlined method for delivering, setting up, configuring, supporting, and managing Mac devices in this white paper. Explore the benefits that IBM's managed mobility services offering can provide, including improved employee satisfaction and productivity, reduced risk to corporate data while enabling device preference, and more.
Posted: 01 Sep 2016 | Published: 29 Apr 2016

IBM

Improve Mobile Infrastructure with an Analytics Workshop
sponsored by IBM
WHITE PAPER: Proprietary analytics tools can help identify and clarify your mobile challenges. Uncover a workshop designed to put mobile business in motion with four steps, including data collection, analysis, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

IBM

Ovum Report: Why Put Mobile Threat Protection On Your Radar?
sponsored by Lookout
WHITE PAPER: This report details Ovum's view on the "urgent need for protection systems" to secure enterprise mobile devices and the value that one mobile threat security system provides. Access now to learn about this system and its essential mobile security features, like MDM integration, jailbreak/root detection and more.
Posted: 31 Aug 2016 | Published: 22 Mar 2016

Lookout

The Power of the Patient Experience: 8 Ways to Increase Satisfaction
sponsored by Medfusion
WHITE PAPER: Learn 8 guidelines for engaging and activating your patient base to boost retention rates, bottom line, and—most importantly of all—patient satisfaction. You will learn how to deliver a mobile-friendly experience to your patients, properly advertise resources, and more.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

Medfusion

The Evolution and Impact of Hidden Mobile Threats
sponsored by Wandera
WHITE PAPER: Learn to protect your mobile workforce and their devices comprehensively in this white paper. Uncover the many attack vectors malicious users and programs use to target vital enterprise and personal data, and how to plug any gaps you many have in your defenses.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Wandera

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Mobile Content Management: Top 10 Considerations
sponsored by vmware airwatch
WHITE PAPER: The mobile office is a reality in today's world, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. To protect your business you need enterprise-grade mobile content management. Access this white paper to learn the top 10 considerations for mobile content management.
Posted: 15 Aug 2016 | Published: 01 Jun 2016

vmware airwatch

Five Essential Elements for an Effective Mobile Security Strategy
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

The 11 EMM Providers That Matter Most And How They Stack Up
sponsored by vmware airwatch
WHITE PAPER: Selecting the right partner for your enterprise mobile management (EMM) can be extremely difficult. An array of vendors exists that widely varies in both offerings and overall quality. Access this report that provides an evaluation of the 11 most significant EMM vendors (based on 25-criteria) to ensure you make the best decision.
Posted: 15 Aug 2016 | Published: 31 Dec 2015

vmware airwatch

An End-to-End Framework For Mobile Security
sponsored by BlackBerry
WHITE PAPER: Discover how to secure corporate data on the cloud in a BYOD environment. Learn not only about the changing landscape of mobile security, but also the growing trends that make securing enterprise data on these devices more vital than ever.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

BlackBerry

Future Focus: Is Your Enterprise Ready for IoT?
sponsored by BlackBerry
WHITE PAPER: Every part of the workplace may soon be connected to a digital network because of the emergence of the Internet of Things (IoT), and the number of connected devices will continue to grow. Access this white paper that details the challenges presented by IoT, and how you can adapt your mobile strategy to maximize returns from this technology.
Posted: 11 Aug 2016 | Published: 25 Jul 2016

BlackBerry

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

Midmarket Enterprise Storage Array Buyers Guide
sponsored by Pure Storage
WHITE PAPER: This buyer's guide details the top ranking storage arrays from 10 storage providers. Access now to quickly compare their features and to find the storage solution that best suits your needs.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Pure Storage

What Will My Enterprise Mobile App Cost?
sponsored by Magenic
WHITE PAPER: Mobile app development is a complex undertaking where a myriad of decision points can impact cost; so unfortunately, there is no one simple formula for calculating a reliable estimate. However, this white paper explores 7 strategic perspectives that will help you factor in key cost considerations to safeguard your mobile app ROI.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Magenic

Mobility In Government Services: A Regulatory Compliance Checklist
sponsored by BlackBerry
WHITE PAPER: Discover the struggles faced by the mobile solutions used by government organizations and not only why compliance is so challenging, but also why it's vitally important.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

BlackBerry

Four Reasons it's Time to Move Beyond Excel
sponsored by Salesforce.com
WHITE PAPER: Excel works great for inputting data and crunching numbers, but it simply can't provide a comprehensive view of your data. In this white paper, discover how you can visualize data like never before and uncover hidden insights. Learn how you can explore sales data on any device, accelerate time to value, and ultimately, see the whole picture.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Salesforce.com

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM

The ABC's of Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: While there are native applications that can do the basics of mobile device management (MDM), only a true MDM platform can make your IT's life simpler. Access this white paper to learn the ABC's of mobile device management and discover ways to enable productivity and data protection for the way people work.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

Mobilize SharePoint, Windows File Share, and Intranet for Robust Enterprise Collaboration
sponsored by IBM MaaS360
WHITE PAPER: Discover how you can unlock the potential of your enterprise systems and content. Explore the multifarious benefits of technology that enables simple, safe access to behind-the-firewall resources.
Posted: 09 Aug 2016 | Published: 29 Feb 2016

IBM MaaS360

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

The Solution for Engagement
sponsored by Avaya CenturyLink
WHITE PAPER: Your methods of communication are the connective tissue that holds your enterprise together. This white paper details how communications are evolving and how new platforms can benefit your business by delivering complete solutions that enable you to implement widespread engagement capabilities.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360
26 - 50 of 969 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement