IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management White Papers (View All Report Types)
76 - 100 of 1010 Matches Previous Page  |  Next Page
Remote Data Management a Necessity at Law Firms
sponsored by Absolute
WHITE PAPER: This white paper provides solutions to ensure data security and privacy. Add persistent endpoint security and data risk management solutions to your IT environment to lock up confidential client information and use your security prowess as a standout advantage in your field.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

Absolute

The Role of Mobile Apps in Car Sharing & Private Ownership
sponsored by HERE
WHITE PAPER: This blog post discusses the pros and cons of car sharing for both personal users and the economy. Learn about mobile applications that enable cars to recognize the driver, load his or her profile, and adjust everything from the music playlist to the position of the seat or mirror.
Posted: 11 Mar 2016 | Published: 17 Oct 2014

HERE

5 Ways to Improve Business Continuity
sponsored by Mitel Networks Limited
WHITE PAPER: This guide provides 5 ways you can improve business continuity by relocating or distributing your workforce. Learn about improving availability with mobile devices, creating a disaster recovery site, and more.
Posted: 11 Mar 2016 | Published: 30 Dec 2014

Mitel Networks Limited

Five Ways to Attract and Retain the Best People
sponsored by Mitel Networks Limited
WHITE PAPER: Access this resource to discover 5 strategies to attract and retain the best employees with the promise of enterprise mobility. Learn how to expand your hiring pool from local to global, provide your workers with a virtual workspace, and more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Mitel Networks Limited

Five Ways to Improve Reachability in Your Organization
sponsored by Mitel Networks Limited
WHITE PAPER: The truth is that being mobile doesn't equate to being productive: being reachable does. From this white paper, gain insight into 5 ways to improve reachability in your organization, and maximize productivity based on the mobile devices your employees already bring to the office.
Posted: 10 Mar 2016 | Published: 31 Dec 2014

Mitel Networks Limited

Shadow IT: The Impact on Technical Support and the Opportunities for IT
sponsored by ServiceNow
WHITE PAPER: View this white paper now and uncover how businesses can support the growing movement of Shadow IT and see for yourself how to ensure that the need for efficient mobile computing doesn't impede the progress of your business.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

ServiceNow

Modern Mobility: Five Ways to Be More Productive at Work
sponsored by Mitel Networks Limited
WHITE PAPER: In this white paper, you will discover five ways you can improve employee productivity in your organization by maximizing on BYOD and optimizing enterprise mobility policies for remote work. Read on to improve mobile networking and communication experience for your workers.
Posted: 08 Mar 2016 | Published: 31 Dec 2014

Mitel Networks Limited

2016 Cyberthreat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.
Posted: 07 Mar 2016 | Published: 02 Mar 2016

LogRhythm, Inc.

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

The ABCs of Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you learn about the basics of Mobile Device Management (MDM) and gain a broad perspective on MDM as a whole, including expert advice on Over-the-Air (OTA) configuration, wiping corporate data on mobile devices, and much more.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

IBM MaaS360

Thinking Outside the Container: How to Overcome MDM Limitations
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to overcome the limitations of current container-based MDM/MAM solutions. Access this paper to implement MAM/MDM solutions that don't contain the user and constrain the benefits of mobility, and which empower the user by enabling the new capabilities found in the native mobile OS.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Matrix42

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

A Guide to Mobile Application Delivery and Investment Protection
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to integrate your mobile applications management (MAM) into your existing infrastructures to allow remote management of app delivery, security, configuration and access – without the need for proprietary proxy servers.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Matrix42

Smart Service Management for Smart Devices
sponsored by Matrix42
WHITE PAPER: This white paper explores why integrating your ITSM, client management, and EMM can help your enterprise meet the demands of today's mobile workstyles. Access now to learn how this strategy can shorten ticket resolution times, boost employee productivity, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Access this paper to view the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Network security is failing to keep up with the rapid influx of mobile devices. Security professionals have realized that BYOD, mobility and cloud are exposing flaws in network security architectures. This vendor-neutral resource highlights how your enterprise can mitigate risk effectively in this type of dynamic environment.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: With the current shift toward mobility becoming the business norm, security needs to be your top priority. Discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn about mobile security best practices.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: There's a gap in productivity caused by traditional remote access. Discover a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

The Business Case for Mobility
sponsored by Lenovo
WHITE PAPER: In this article, you'll explore how implementing a mobility strategy can boost productivity, empower employees, and streamline internal processes. Learn how to align business goals with these benefits to make them a reality.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Lenovo

Empowering Cloud with the Right Devices
sponsored by Lenovo
WHITE PAPER: In the following white paper, learn how with the right devices you can increase the value and usability of your cloud deployments. Read on now and uncover the devices that can match and extend your company's ability to give users exactly what they want—when and where they need it.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Lenovo

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Taking Windows Mobile on Any Device
sponsored by Citrix
WHITE PAPER: Taking Windows applications and desktops mobile has many advantages, but with so many device types to consider, how can you simplify solution implementation? Learn how Citrix XenApp solves this complex problem.
Posted: 22 Feb 2016 | Published: 30 Apr 2015

Citrix
76 - 100 of 1010 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement