IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
1 - 25 of 1897 Matches Previous Page  |  Next Page
Desktop Virtualization Aids Graphic-Heavy Apps and BYOD
sponsored by NVIDIA/VMware
EGUIDE: This e-guide illustrates how virtual desktops can aid graphics-heavy apps, and will help you discover how GPU virtualization can aid app performance, and ease BYOD management. Access this guide to get an exclusive look at Nvidia vGPU support and its accommodation of VDI graphics demands.
Posted: 12 Feb 2016 | Published: 08 Feb 2016


How to Deliver High Performing Mobile Applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Address Five Hindrances to Delivering More Efficient and Manageable IT
sponsored by Dell, Inc.
WHITE PAPER: Providing a value-adding user experience is the most vital requirement of all IT departments, but what are the five biggest challenges that stand in the CIO's way? In this expert paper, you will examine the top five systems management challenges IT departments face when improving service reliability.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Dell, Inc.

The Top 5 Technology Headaches Hindering Innovation Today
sponsored by Dell, Inc.
WHITE PAPER: In this paper, you will address the 5 more onerous issues holding CIOs back from delivering real value and reliability from their IT support. Read on now to discover the mobile headaches of your workplace, and learn how to deliver flexibility for cloud workloads and ensure reliable performance for IoT.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Dell, Inc.

Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Infrastructure Requirements for OS Upgrades
sponsored by Microsoft
WHITE PAPER: Before you update your operating system, you need to consider high-level requirements for your infrastructure. Access this technical guide to learn what you need to do in order to take advantage of mobile device management (MDM) and virtual desktop infrastructure (VDI) enhancements.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

Microsoft

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Kingpin Communications
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices. Read on to enact comprehensive protection against threats to Android, and prepare your mobile endpoints against mRATS, zero-day attacks, and more.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Threat Research: Targeted Attacks on Enterprise Mobile
sponsored by Kingpin Communications
RESEARCH CONTENT: This study reveals whether or not Mobile Remote Access Trojans (mRAT) threats are real for the enterprise. Download now and learn about commercial mRAT threats and what corporate data is at risk.
Posted: 11 Feb 2016 | Published: 25 Mar 2015

Kingpin Communications

The Rise of Known and Unknown Malware and Best Approaches to Zero-Day Attacks
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will examine several best practice strategies for malware threat defense and protection against zero-day attacks. Read on to introduce evasion resistant CPU-level detection alongside OS-level sandboxing and key into the rise of known and unknown malware.
Posted: 11 Feb 2016 | Published: 25 Oct 2015

Kingpin Communications

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Kingpin Communications
WHITE PAPER: Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Top 6 Cyber Security Threats to iOS Devices
sponsored by Kingpin Communications
WHITE PAPER: This white paper details the six most common types of attacks that impact iOS mobile devices. Access now and you'll learn the basic requirements for protecting against them.
Posted: 11 Feb 2016 | Published: 25 Jun 2015

Kingpin Communications

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Kingpin Communications
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Solving the Engagement Challenge
sponsored by SPS Commerce, Inc.
WHITE PAPER: This infographic discusses BYOD, BYOA and the flexible workplace, and explains the benefits of building an infrastructure that supports these trends.
Posted: 08 Feb 2016 | Published: 08 Feb 2016


Enterprise Mobile Management in 2015: The Vendors That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, you will evaluate the 11 most significant EMM vendors from 2015, and analyze their offerings for I&O professionals managing your mobility. Read on to determine why today's EMM provides a model for future unified application and device management and drive secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

Workplace Mobility: Empower Employees to be Productive
sponsored by Microsoft
WHITE PAPER: In this white paper, you'll learn how to enable workers to be more efficient. Discover ways to give users the features they need on the device of their choice.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Modernize and Secure your Business
sponsored by Microsoft
WHITE PAPER: In this solution brief, you'll learn how modern businesses are meeting the expectations of workers to be able to work anywhere, anytime on virtually any device. Discover ways to manage devices and provide workers with secure access to the corporate data and apps they need.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Microsoft

Effective Mobile Strategies for Business
sponsored by Microsoft
WHITE PAPER: In this guide, you'll find mobile strategies that work for BYOD and corporate device scenarios. Discover ways to help users improve their productivity and protect against security threats.
Posted: 04 Feb 2016 | Published: 27 Nov 2015

Microsoft

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management is just one facet of a strong mobile enablement strategy; it isn't the end-all, be-all. Every company starting a mobile initiative needs a plan tailor-made to meet individualized needs.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

SearchMobileComputing

Data Protection and Security Still Prove Challenging for Mobile Devices
sponsored by Hewlett Packard Enterprise
EGUIDE: In the following expert e-guide, hear from Paul Kirvan, Independent IT Consultant, as he reveals why data protection has become such a big issue with BYOD. Inside, gather tips and strategy snippets on how to ensure the prosperity of data within your own mobile device environment. Read on to learn more.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

Hewlett Packard Enterprise

A Computer Weekly buyer's guide to employee self-service
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at why IT departments should adopt new ways of delivering applications to employees and how to ensure they use the technology effectively.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

ComputerWeekly.com

How Identity Governance Became a Key Compliance and Risk Control
sponsored by IBM
WHITE PAPER: In this white paper, you will discover the challenges associated with managing identity governance, including the risks cloud, BYOD, remote access, and your apps and data pose to regulatory compliance. Read on to improve your security intelligence and risk management.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

IBM
1 - 25 of 1897 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement