IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
1 - 25 of 2051 Matches Previous Page  |  Next Page
10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

New Revenue and Profit Opportunities for Service Providers
sponsored by Solarwinds N-able
WHITE PAPER: This white paper details how service providers can easily transition to managed services in order to stay successful.
Posted: 29 Jul 2015 | Published: 29 Jul 2015

Solarwinds N-able

Modern-Day Mobile Email Gets a Facelift
sponsored by Citrix
WHITE PAPER: You can get all of the scale, functionality and management control required without holding users back from their devices, applications or productivity. This white paper examines a comprehensive enterprise mobility management solution that enables complete and secure mobile device freedom.
Posted: 29 Jul 2015 | Published: 31 Dec 2014

Citrix

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

Top 10 reasons to strengthen information security with desktop virtualisation
sponsored by Citrix
WHITE PAPER: Access this white paper to learn how desktop virtualization overcomes information security challenges in today's enterprises. You'll discover how desktop virtualization compares to traditional security models and the top 10 benefits of using desktop virtualization to strengthen information security.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix

10 Essential Elements for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 28 Jul 2015 | Published: 15 Oct 2014

Citrix

The Trouble With Instant Messaging On The Move
sponsored by BlackBerry
WHITE PAPER: Access this white paper to learn about the challenges with mobile IM security tools and discover a mobile IM security solution that provides organizations with enhanced security over corporate data in IM environments.
Posted: 28 Jul 2015 | Published: 30 Jun 2015

BlackBerry

5 Tips for Building Engaging, Data-Driven Mobile Apps
sponsored by Pivotal
RESOURCE: In this infographic you can discover a short list of considerations as you embark on your own mobile odyssey. Access now to view 5 data driven thought points
Posted: 23 Jul 2015 | Published: 23 Jul 2015

Pivotal

Critical Capabilities for Mobile Application Development Platforms
sponsored by Kony
WHITE PAPER: Inside this Gartner report, you'll discover ratings of 11 different platforms based on 4 different use cases. Read on to see how each of these platforms performed and to choose the one that will be best for your enterprise.
Posted: 22 Jul 2015 | Published: 24 Dec 2014

Kony

Mobile Backend-as-a-Service (MBaas)
sponsored by Kony
WHITE PAPER: Access this whitepaper to discover how mobile backend as a service (MBaaS) can be utilized as the backend for anything with a frontend, including desktop, web, and mobile apps – as well as the growing number of applications within the Internet of Things.
Posted: 22 Jul 2015 | Published: 01 Jul 2015

Kony

Managing Jailbreak Threats on iOS
sponsored by Lookout
WHITE PAPER: This white paper explores how to use device security telemetry to form a digital firmware fingerprint on each device to identify when one is vulnerable or has been compromised through jailbreak.
Posted: 22 Jul 2015 | Published: 24 Jun 2015

Lookout

Bridging the BYOD security and UX gap
sponsored by HID
WHITE PAPER: This white paper explores the top security challenges of today and presents a holistic strategy to bridge the gap between mobile data security and user experience.
Posted: 21 Jul 2015 | Published: 24 Jun 2015

HID

Tablets Designed for Mobile Productivity
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper and discover Dell's new tablets designed specifically for business productivity.
Posted: 20 Jul 2015 | Published: 26 May 2015

Dell, Inc.

Mobility Myth Busting: BYOD, Tablets and Mobile Apps
sponsored by Dell, Inc.
WHITE PAPER: This brief white paper presents the 3 key myths that are holding enterprise mobility strategies back and explains how to move beyond them to become a truly successful mobile business.
Posted: 20 Jul 2015 | Published: 28 Nov 2014

Dell, Inc.

NetScaler and XenMobile Solution for Enterprise Mobility Deployment Guide
sponsored by Citrix
PRODUCT LITERATURE: This deployment guide carefully explains how you should go about your setting up your NetScaler and ZenMobile to optimize enterprise mobility in your organization.
Posted: 20 Jul 2015 | Published: 20 Jul 2015

Citrix

Best Practices for Building a Mobility Strategy
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper to learn how you can create a mobile strategy that enables a productive workforce without harming security or control.
Posted: 17 Jul 2015 | Published: 30 May 2014

Cisco Systems, Inc.

EMM Vendor Analysis: Market Leaders, Challengers and Followers
sponsored by IBM
ANALYST REPORT: This analyst report breaks down the EMM market options by identifying the leading vendors based their strengths and challenges.
Posted: 17 Jul 2015 | Published: 17 Sep 2014

IBM

Tablets That Work for Business
sponsored by Dell, Inc.
WHITE PAPER: In this informative white paper, explore the four main concerns with tablets in work environments today.
Posted: 17 Jul 2015 | Published: 29 Aug 2014

Dell, Inc.

Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Extreme Networks
WHITE PAPER: In order to fully accept the "Bring Your Own Device" (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 16 Jul 2015 | Published: 17 Dec 2014

Extreme Networks

Your Inside Look Into The Current EMM Market
sponsored by IBM
ANALYST REPORT: This research report provides insight into current EMM trends by reviewing the strengths and challenges of 18 major EMM providers.
Posted: 16 Jul 2015 | Published: 17 Sep 2014

IBM

Rethinking Your Approach to Mobile Business
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn about the IDEA cycle approach to embracing a mobile mindset.
Posted: 16 Jul 2015 | Published: 24 Jan 2014

Dell, Inc.

Top 10 Reasons MDM is just a Fad
sponsored by IBM
WHITE PAPER: This white paper reveals the top 10 reasons you don't need a mobile device management (MDM) solution ... or do you?
Posted: 16 Jul 2015 | Published: 16 May 2014

IBM

Intro to Mobile App Management: App Security from the Onset
sponsored by IBM
WHITE PAPER: This white paper, the first in an installment of three, explores how to create a successful app security strategy from the beginning.
Posted: 16 Jul 2015 | Published: 24 Jun 2015

IBM

The Secure Mobile Enterprise
sponsored by Dell, Inc.
VIDEO: This video describes how you can achieve the goal of creating a secure mobile enterprise.
Posted: 15 Jul 2015 | Premiered: 15 Jul 2015

Dell, Inc.

Managing Communications in Modern Business
sponsored by Vodafone/Cisco
WHITE PAPER: Access this brief white paper to learn how the business world is changing and discover the innovation that's driving improved communications management.
Posted: 15 Jul 2015 | Published: 31 Mar 2015

Vodafone/Cisco
1 - 25 of 2051 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement