IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
26 - 50 of 1042 Matches Previous Page  |  Next Page
Four Key Trends Impacting Mobile Infrastructure Strategy
sponsored by IBM
WHITE PAPER: Access this white paper for an in-depth look at the key building blocks of a successful mobile enterprise infrastructure solution, as well as the major trends and challenges of deployment in the modern business world.
Posted: 19 Jun 2015 | Published: 29 Aug 2014

IBM

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

IDC EMM Buyer Case Study: CommunityOne Bank
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn how CommunityOne Bank, a medium-sized financial institution, benefits from an EMM solution that provides secure mobile device management (MDM) and flexible service delivery.
Posted: 18 Jun 2015 | Published: 31 Mar 2015

Good Technology

Applying IT Service Management Best Practices To Mobile
sponsored by Good Technology
WHITE PAPER: Access this white paper to discover the keys to mobilizing your ITSM approach to ensure the success of your mobile business initiatives.
Posted: 18 Jun 2015 | Published: 30 Sep 2014

Good Technology

Top Considerations for Defining a Successful BYOD Strategy
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn the 6 key tips that show you how to implement a BYOD strategy that can ultimately deliver the business benefits you're looking for.
Posted: 18 Jun 2015 | Published: 31 Jul 2014

Good Technology

BYOD: In a Maturing Market, Employee Satisfaction Is The Top Priority
sponsored by Intel
WHITE PAPER: Access this white paper to learn how IT leaders in conservative markets can develop a sophisticated approach to managing the risks associate with mobile device proliferation within the enterprise.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Intel

How Mobile Engagement Is Reinventing Brick and Mortar Retail
sponsored by Honeywell
WHITE PAPER: This white paper describes how the effective use of mobile engagement can increase sales and customer satisfaction at your brick-and-mortar retail stores.
Posted: 16 Jun 2015 | Published: 31 Dec 2014

Honeywell

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

2015 Mobile Threat Report
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to discover in-depth research about the current state of mobile security and learn what you need to do to keep your enterprise protected.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Pulse Secure

Integrating MDM and NAC for Mobile Success
sponsored by Pulse Secure
WHITE PAPER: Read this white paper to discover how integrated VPN, access control, and mobile device management solutions deliver superior network security and BYOD productivity so that you can gain a competitive edge in the mobile business world.
Posted: 09 Jun 2015 | Published: 28 Aug 2015

Pulse Secure

Empowering Mobile Productivity
sponsored by Pulse Secure
WHITE PAPER: Access this white paper now to learn how you can enable authenticated, authorized mobile users with fast, seamless access to necessary network resources that is also completely secure.
Posted: 09 Jun 2015 | Published: 29 Aug 2014

Pulse Secure

Moving Beyond Your Mobile Blind Spot: An App Centric Approach to Enterprise Mobility
sponsored by Pulse Secure
WHITE PAPER: In this white paper, you'll learn how shifting the focus of a mobile strategy from device management to app-centric can improve user experience and workforce productivity while improving security.
Posted: 09 Jun 2015 | Published: 28 Mar 2014

Pulse Secure

Enterprise Plans for Mobile Security
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how your competition is embracing mobile security and discover key trends that will keep your company data safe for mobile business.
Posted: 08 Jun 2015 | Published: 26 Dec 2014

Pulse Secure

Getting a handle on mobile devices – securely, reliably and tidily
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42

The Answers to Your Mobile App Delivery Issues
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn why the right network infrastructure is essential to ensuring high quality app delivery across different devices securely, while preparing for future expansion.
Posted: 08 Jun 2015 | Published: 29 May 2015

Citrix

Optimizing the Mobile Workforce
sponsored by Calero Software
WHITE PAPER: Read this white paper to learn how you can find the right balance of policy, plans, enforcement, support and user experience necessary for successfully optimizing the mobile workforce.
Posted: 05 Jun 2015 | Published: 26 Dec 2014

Calero Software

The Dos and Don'ts of BYOD
sponsored by Calero Software
WHITE PAPER: In this white paper, you'll learn everything you need to know about the most widespread mobile approach – BYOD. Read more and discover how you can start implementing a BYOD program without any surprises.
Posted: 04 Jun 2015 | Published: 27 Dec 2013

Calero Software

Enabling the Mobile Workforce in the Wake of Consumerization
sponsored by Calero Software
WHITE PAPER: In this white paper you'll learn how to gain a competitive advantage by outsourcing mobile support to providers that offer world class service desk capabilities and economies of scale for maximizing the value of mobility.
Posted: 04 Jun 2015 | Published: 26 Dec 2014

Calero Software

Enabling enterprise data access on mobile devices
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn about a secure mobile productivity suite that increases employee access to enterprise data and applications without compromising security, employee privacy, or the personal user experience on the device.
Posted: 03 Jun 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 02 Jun 2015 | Published: 08 May 2015

HID

Why Should You Consider BYOD?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn what it takes to build a successful BYOD strategy.
Posted: 02 Jun 2015 | Published: 30 Jun 2014

Dell, Inc. and Intel®

Developing an Exceptional TEM Program
sponsored by Calero Software
WHITE PAPER: Access this white paper to learn the ins and outs of TEM performance metrics and how you can align them with your business processes.
Posted: 02 Jun 2015 | Published: 28 Dec 2012

Calero Software

Department Store Retailer - A leading department store buys into mobile IBM System i connectivity - without the hefty price tag
sponsored by Open Legacy
WHITE PAPER: A major department store chain used applications residing on an IBM System i for store management, sales floor tracking, reporting, and finance. It wanted to unlock business-critical data stored in its legacy applications, so it modernized its IBM System i environment.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

Open Legacy

Is a secure workspace approach right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: View this white paper to find out whether taking a secure workspace approach is the right way to go.
Posted: 01 Jun 2015 | Published: 01 Jul 2014

Dell, Inc. and Intel®
26 - 50 of 1042 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement