IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementWhite Papers (View All Report Types)
76 - 100 of 1139 Matches Previous Page  | Next Page
The Forrester Wave™: Enterprise Mobile Management Q3 2014
sponsored by Citrix
WHITE PAPER: In this report, Forrester evaluates the 15 most significant EMM providers and details how each vendor fulfills the 27 evaluation criteria points.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Citrix

ESG: Mobile Workspaces Deliver the Optimum User Experience While Enabling Mobility and Productivity
sponsored by Citrix
WHITE PAPER: This white paper offers a look at the momentum of mobility, as well as market trends and best practices for mobile workspaces. Read on to learn more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Citrix

Optimize the Microsoft Lync 2013 user experience and improve return on investment
sponsored by Dell, Inc.
WHITE PAPER: This exclusive white paper addresses the opportunities and challenges of deploying UC&C, plus more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Dell, Inc.

Augmented IVR – Second Life for Interactive Voice Response
sponsored by [24]7 Customer Inc.
WHITE PAPER: Find out how interactive voice response (IVR) and voice app infrastructures have brought both visual and voice resources into each customer's journey.
Posted: 22 Oct 2014 | Published: 30 Jun 2014

[24]7 Customer Inc.

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

WebRTC Rolls Out in Business Apps
sponsored by Twilio
WHITE PAPER: This white paper highlights WebRTC and its role online for mobile customer service. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014


Performance optimized 802.11ac/n Dual-Radio 3x3:3access point with internal antenna option
sponsored by Aerohive Networks
WHITE PAPER: This white paper details a network solution that was able to deliver rock solid connection even in the most high-density environments. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Aerohive Networks

How to Onboard Thousands of Devices only the Day after Software Implementation
sponsored by IBM
WHITE PAPER: This white paper details a mobile device management solution that was able to begin on-boarding devices by up to 200 a minute at peak, with 15,000 users on the first day. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

IBM

Mobilizing Your Workforce
sponsored by 1e Inc
WHITE PAPER: Access this white paper to learn about the benefits of implementing a bring-your-own-PC (BYOPC) policy within your organization. Discover the security challenges of BYOPC, when to implement BYOPC, 5 steps to successful BYOPC, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

1e Inc

EMA Research Report - Enabling Unified Endpoint and Service Management for a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive research report gauges the importance of the mobile workforce and how networks can cater to them. Unified endpoint management (UEM) can help provide a common interface for performing administrative tasks on both PC and mobile devices.
Posted: 15 Oct 2014 | Published: 30 Sep 2014

FrontRange Solutions Inc.

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014


Cloud-Managed Mobility Platform for Education
sponsored by Aerohive Networks
WHITE PAPER: This white paper outlines the major trends impacting the education sector surrounding mobile devices and modernised infrastructures.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

BYOD Without The Hassles
sponsored by BitGlass
WHITE PAPER: This whitepaper shares the six key steps required to build a BYOD program that works.
Posted: 10 Oct 2014 | Published: 10 Oct 2014


Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

BYOD, Data Leakage, and Regulatory Compliance
sponsored by BitGlass
WHITE PAPER: This white paper discusses how modern technology can enable BYOD policies while satisfying enterprises' security and compliance needs.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Changing the Economics of Flash Storage
sponsored by Dell, Inc.
WHITE PAPER: Access this Q&A with Laura DuBois, program vice president of IDC's Storage research to learn more about use cases for flash storage.
Posted: 09 Oct 2014 | Published: 30 Nov 2013

Dell, Inc.

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

School System Makes Move to 802.11ac Smart Wi-Fi
sponsored by Ruckus Wireless
WHITE PAPER: With advancements in mobile technology, it's become more important than ever to have a Wi-Fi network in place that can deal with the increase stress and traffic on the network.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Ruckus Wireless

Location: The New battlefield for Business & Digital Innovation
sponsored by Ruckus Wireless
WHITE PAPER: The shift from the physical world to the online (virtual) world has been emphasized with the emergence of mobile and social technologies.  Users are connected to the virtual world more than ever before, but at the same time still enjoy being 'offiline'.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Ruckus Wireless

Dealing with Density: The Move to Small-Cell Architectures
sponsored by Ruckus Wireless
WHITE PAPER: The expansion of mobile devices in the past decade relied heavily on innovations in the network.  The increase in traffic and stress on the network still proves to be a challenge for IT.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Ruckus Wireless

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper describes how BitGlass partnered with AMAG Pharmaceuticals to resolve critical security and privacy issues following the company's adoption of Google Apps' cloud and BYOD tools.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Vmware View Mobile Secure Desktop on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper examines the use of desktop virtualization as the answer to improving mobile support capabilities and evolving the workspace environment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VCE
76 - 100 of 1139 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement