IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
76 - 100 of 1034 Matches Previous Page  |  Next Page
Picking A Sensible Mobile Password Policy
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: In this white paper, learn how to deploy a 6-point passcode policy for mobile devices that is user-friendly and highly usable, but still strong enough to protect your organization's data. Continue reading to uncover 3 reasons to never implement a password aging policy on mobile devices.
Posted: 01 Jun 2015 | Published: 20 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

Becoming a Modern, Mobile Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this white paper, you'll learn the keys to empowering the new mobile workforce and discover what you need to do to tap into the great potential of enterprise mobility.
Posted: 01 Jun 2015 | Published: 26 Dec 2014

Dell, Inc. and Intel®

Managing Expanding Endpoint Environment: A Survey of IT Professionals
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This report is based on a survey of 723 IT professionals. The goal was to understand the current types of endpoints connecting to corporate networks, what is coming, and what challenges they are creating for systems management. Click through now to explore several detailed findings.
Posted: 29 May 2015 | Published: 30 Jan 2015

Dell, Inc. and Intel®

Insider Security Threats: Three Kinds of Chaos
sponsored by Clearswift
WHITE PAPER: This white paper presents the current information threat landscape and illustrates today's three major internal security challenges. Continue reading to explore new processes to mitigate risk and secure sensitive data.
Posted: 28 May 2015 | Published: 19 Mar 2014

Clearswift

Workspace aggregators help your business to improve costs and boost productivity
sponsored by Matrix42
WHITE PAPER: Read this white paper to find out how workspace aggregators can help your IT department integrate the cloud into your enterprise easily while improving costs, boosting productivity, and minimizing complexity.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

Unify Your Network for a Mobile Enterprise
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Access this white paper to discover how you can overcome the network challenges associated with the BYOD and mobility movements.
Posted: 22 May 2015 | Published: 30 Aug 2013

Alcatel-Lucent Enterprise

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Mobile Call Recording: Are You Complying or Compromising?
sponsored by Smart Numbers
WHITE PAPER: Access this white paper now to learn why implementing a business call recording policy is essential to corporate protection and how to deploy a solution that is simple, effective, and affordable.
Posted: 21 May 2015 | Published: 21 May 2015


Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

Collaboration & Mobility Assessment: Explore Your Collaboration Effectiveness & Mobile Strategy
sponsored by Rackspace
WHITE PAPER: This resource features the Collaboration & Mobility Assessment. Use this tool to determine your biggest opportunities to improve your company's collaboration and mobile readiness.
Posted: 13 May 2015 | Published: 13 May 2015

Rackspace

10 Things IT Administrators Need to Know About Android for Work
sponsored by MobileIron
WHITE PAPER: Access this infographic to learn everything you need to know about Android for Work.
Posted: 12 May 2015 | Published: 12 May 2015

MobileIron

The Ultimate Guide to Enterprise Mobility Management
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll discover an extensive guide to EMM success. Don't let your competition run over you in the mobile-first business world.
Posted: 12 May 2015 | Published: 12 May 2015

MobileIron

2015 Cyberthreat Defense Report
sponsored by Citrix
WHITE PAPER: In this report, discover what security professionals had to say about mobile security, endpoint security, and other important trends in the cybersecurity landscape.
Posted: 12 May 2015 | Published: 12 May 2015

Citrix

HIPAA Compliance Checklist for Mobility
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn the best practices for creating a HIPAA compliance program capable of handling device loss, rogue apps, risky user actions and more.
Posted: 06 May 2015 | Published: 06 Mar 2015

MobileIron

Mitigating Mobility Risks with Real-Time Contextual Data
sponsored by Aruba Networks
WHITE PAPER: Traditional endpoint security approaches won't protect users on the go, so you need to rethink your mobile strategy. This white paper explores a coordinated defense to fill in potential security gaps bu using real-time contextual data.
Posted: 05 May 2015 | Published: 24 Mar 2015

Aruba Networks

Running the Risk: Why a Generation of Sharing Could Be Good for Business
sponsored by Aruba Networks
WHITE PAPER: This insightful research report discusses how businesses can develop a mobile-aware culture that nurtures innovation, collaboration, and productivity, while minimizing the risk of data loss.
Posted: 01 May 2015 | Published: 01 May 2015

Aruba Networks

Designing a Converged Campus Network
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines innovative technology that can help satisfy the technical requirements of a modern network without sacrificing key agility, flexibility and manageability.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

Critical Capabilities for Mobile Application Development Platforms
sponsored by Kony
WHITE PAPER: Inside this Gartner report, you'll discover ratings of 11 different platforms based on 4 different use cases. Read on to see how each of these platforms performed and to choose the one that will be best for your enterprise.
Posted: 29 Apr 2015 | Published: 24 Dec 2014

Kony

Selecting a Mobile App Development Platform Solution
sponsored by Kony
WHITE PAPER: This decision matrix analyzes 12 different mobile application development platforms and identifies the leaders and challengers in the industry in 2015.
Posted: 29 Apr 2015 | Published: 16 Feb 2015

Kony

Mobile Device Management for Education
sponsored by IBM
WHITE PAPER: Access this white paper now and learn how mobility and BYOD strategies in all levels of education can make school districts and organizations more cost-effective with the right device and app management solution.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

10 New Rules for Mobile Strategy and Success
sponsored by Kony
WHITE PAPER: In this white paper, discover ten essential tips for creating an innovative, impactful mobile strategy.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Kony

Mobile Load Testing Challenges
sponsored by Neotys
WHITE PAPER: This white paper elaborates on the challenges of mobile load testing and gives suggestions for overcoming those challenges.
Posted: 29 Apr 2015 | Published: 31 Dec 2014

Neotys
76 - 100 of 1034 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement