IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementWhite Papers (View All Report Types)
76 - 100 of 820 Matches Previous Page  | Next Page
BlackBerry 10 & BES10 Security Guide: The Perfect Balance of Protection & Productivity
sponsored by BlackBerry
WHITE PAPER: This exclusive white paper examines a mobile security solution that provides end-to-end protection for your mobile data without sacrificing the experience that keeps employees productive and efficient.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

BlackBerry 10: Setting New Standards in Mobile Security
sponsored by BlackBerry
WHITE PAPER: This informative paper discusses a mobile management solution that provides cutting-edge mobile security which centralizes and simplifies your security management, allowing you to give your information the protection it needs.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

The CIO’s Guide to Enterprise Mobility Management (EMM)
sponsored by BlackBerry
WHITE PAPER: This exclusive paper discusses what you need to be looking for in an enterprise mobility management (EMM) solution. Read on and find out how you can simplify and strengthen your mobile initiatives.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Why Good Technology Isn’t Good Enough
sponsored by BlackBerry
WHITE PAPER: This exclusive paper examines a mobile solution that rises above the rest by providing a comprehensive architecture, including services, security, and software.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Separating Work and Personal at the Platform Level, How BlackBerry Balance Works
sponsored by BlackBerry
WHITE PAPER: This informative resource examines a mobile management solution that partitions work data from personal data using two completely separate file systems, ensuring the security of your sensitive business information.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

Top 10 Technology Trends for 2014
sponsored by Peak 10
WHITE PAPER: This valuable whitepaper counts down the top 10 tech trends of 2014 and beyond.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

Peak 10

Protection For Every Enterprise, How BlackBerry Security Works
sponsored by BlackBerry
WHITE PAPER: This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure.
Posted: 17 Mar 2014 | Published: 17 Mar 2014

BlackBerry

More advanced business-class management, security, and reliability than Lenovo. Do more with Dell Latitude.
sponsored by Dell, Inc.
WHITE PAPER: This whitepaper offers a checklist for laptops that compares two leading offerings with regards to manageability, durability, and “securability.”
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Dell, Inc.

The Evolution of the Enterprise…And Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Fortinet, Inc.

Citrix BYOD Solution Overview
sponsored by Citrix
WHITE PAPER: This exclusive paper examines how your organization can deliver self-service, on-demand data and applications to any device. Read on to discover best practices and helpful tips for ensuring a successful bring your own device (BYOD) program.
Posted: 12 Mar 2014 | Published: 12 Mar 2013

Citrix

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: This informative paper discusses what steps your company should take to ensure that your mobile initiatives are secure, providing a helpful checklist you can use to navigate the mobile seas to success.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

Citrix

IDC: How Desktop Virtualization and Storage Solutions Have Evolved
sponsored by Citrix
WHITE PAPER: This whitepaper examines flexible desktop virtualization solutions that offer multiple delivery models to virtualize desktops and applications from a single solution suite.
Posted: 11 Mar 2014 | Published: 29 Mar 2013

Citrix

CIO Top Of Mind For 2013
sponsored by EMC Corporation
WHITE PAPER: This short resource gives survey results from over 600 CIOs and tells what they think about the biggest trends in storage today.
Posted: 11 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Mobile Connect
sponsored by Dell Software
WHITE PAPER: Find out how to give your employees safe, easy access to the data and resources they need to be productive from a range of devices (including iOS, Android™ and Windows 8.1) while protecting your network from mobile security threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Mobile Security: How to Protect the Enterprise in the Mobile Era
sponsored by Dell Software
WHITE PAPER: Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

Top Tips on How to Avoid Losing Your Life If You Lose Your Phone at the Christmas Bash
sponsored by Dell, Inc.
WHITE PAPER: Vital information is almost always stored on smartphones, but security measures are rarely taken. This brief resource gives the top twelve tips on making sure vital information is secure in case a smartphone is lost or stolen.
Posted: 10 Mar 2014 | Published: 10 Mar 2014

Dell, Inc.

Validating VoLTE: A Definitive Guide to Successful Deployments
sponsored by Ixia
WHITE PAPER: Access this guide for an extensive framework and step-by-step approach for thoroughly evaluating all aspects of a voice-over LTE implementation.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Ixia

Kearney Clinic Accelerates Workflow and Improves Accuracy and Patient Care
sponsored by Nuance
WHITE PAPER: This case study features Kearney Clinic, who implemented a medical mobile record solution that offered improved point-of-care documentation to enhance overall workflow and patient care.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

Nuance

Securosis Report: Replacing Your SIEM with Security Management 2.5 Yet?
sponsored by IBM
WHITE PAPER: This white paper offers insight on the needs and requirements that security information and event management (SIEM) solutions should address. Read on to learn if your current SIEM vendor is enough, or if you should consider a replacement that better fits today's IT environment.
Posted: 06 Mar 2014 | Published: 01 Feb 2014

IBM

EMA Report: The Benefits of a Unified Endpoint Management Approach
sponsored by IBM
WHITE PAPER: Read this resource to learn how a unified security and IT operations approach can better protect organizations' vast and growing amount of endpoints from sophisticated threats.
Posted: 05 Mar 2014 | Published: 24 Jan 2011

IBM

What can you do differently to guard against threats from rapidly evolving mobile malware?
sponsored by IBM
WHITE PAPER: This must-see white paper discusses the emerging and evolving risks associated with mobile computing and applications. Also inside, find insight to help you effectively address mobile vulnerabilities.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Small Cells, Big Challenge: A Definitive Guide to Designing and Deploying HetNets
sponsored by Ixia
WHITE PAPER: Network operators are under pressure to enhance network coverage, reliability, and capacity, while increasing the quality of the mobile experience. Heterogeneous networks (HetNets) -- more diversified access networks -- are emerging as a strategy to bridge the cost and capacity gap and meet demand.
Posted: 04 Mar 2014 | Published: 30 Nov 2013

Ixia

Securing  Android, iOS and Windows Tablets and Smartphones
sponsored by Citrix
WHITE PAPER: This informative paper examines the common security issues that diverse mobile platforms can cause and discusses a set of tools designed to help you provide the security that mobile users need without hindering their experience.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Citrix

Mobile Design Patterns: Push, Don't Pull
sponsored by IBM
WHITE PAPER: Is it better to wait for users to request, or "pull," the content they need, or to "push" content updates when you think users need them? This resource weighs in on the "push vs. pull" design model debate, describing key advantages of the push model in the mobile space.
Posted: 14 Mar 2014 | Published: 05 Dec 2013

IBM

Why Touch on ThinkPad
sponsored by Insight and Lenovo
WHITE PAPER: This whitepaper examines the benefits of leveraging touch-enabled devices for your mobile workforce, including those that it provides for mobile device management, mobile productivity, collaboration and the adoption of Windows 8.
Posted: 04 Mar 2014 | Published: 04 Mar 2014

Insight and Lenovo
76 - 100 of 820 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement