IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
1 - 25 of 2028 Matches Previous Page  |  Next Page
4 Ways to Ensure a Smooth Windows 10 Migration
sponsored by Citrix
RESOURCE: Download this resource to discover a workspace suite that can help enable a smooth Windows 10 transition with a 4-pronged approach to address challenges with app migration, managing Windows 10 desktops, managing all devices, and securing company data.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

Maximizing Your Workspace Investment with Office 365
sponsored by Citrix
WHITE PAPER: By downloading this white paper, you'll learn how to overcome Office 365 migration concerns—including secure app access and mobile policy controls—by using a desktop virtualization suite that will implement SSO to boost productivity, enact multi-factor authentication, and more. Access your copy here.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

VDI—Simplify your migration to Windows 10 and beyond
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to streamline OS migrations now and in the future with a virtualized infrastructure that simplifies BYOD, app compatibility and desktop management.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Citrix

How to Get the Most Value from an Office 365 Investment
sponsored by Citrix
RESOURCE: Download this infographic to learn in a nutshell how to achieve faster Office 365 migration, easier maintenance, and improved security with a desktop management suite that will also automate app compatibility tests, encrypt data in motion, and more.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Citrix

Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI Solutions
sponsored by Citrix
WHITE PAPER: VDI addresses a number of common business challenges, which include enabling mobile workstyles without compromising security, streamlining desktop management efforts, and enhancing the end-user experience through self-service access to applications and desktops. Download this white paper to see how your organization stands to benefit.
Posted: 13 Oct 2017 | Published: 31 Dec 2015

Citrix

Access e-zine: October 2017
sponsored by SearchEnterpriseDesktop
EZINE: Today's mobile application development tools focus on workflow and micro apps, which pare down business processes to present users with the key data they need.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

SearchEnterpriseDesktop

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

CW ASEAN Oct 2017
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a look at what organisations need to do to overcome the complex task of pulling together a seamlessly integrated data management strategy.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

File Sharing Service Eases IT Migration to Windows 10
sponsored by Citrix
WHITE PAPER: Download this white paper to discover a file sharing, storage and sync service that will support your mobile workforce's secure data storage and sharing needs for Windows 10 and beyond in terms of security, flexibility, productivity and Office 365 integration.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Citrix

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Read on to examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. You'll discover a maturity path for managing mobile devices in a SAM context, and more inside.
Posted: 12 Oct 2017 | Published: 31 Dec 2016

Snow Software

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
PODCAST: 50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Eight Common Pitfalls of App and Desktop Virtualization and How to Avoid Them
sponsored by VMware
WHITE PAPER: Discover in this paper how to avoid the eight most common pitfalls during VDI and RDSH projects. Read on as each pitfall is broken down, including but not limited to: not involving users, incorrectly defining app virtualization use cases, not assessing the performance impact on other systems, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

VMware

Mobile Application Development at the Speed of Business with Containers
sponsored by Red Hat
EBOOK: Discover how to use container and cloud technologies to build quality mobile apps quickly. Learn how to power your native and mobile app development initiatives with microservices, enterprise-grade containers, DevOps, APIs, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

Red Hat

2017 Strategic Roadmap for Mobile and Endpoints
sponsored by VMware
RESEARCH CONTENT: In this research report conducted by Gartner Research, learn the 3 components that a mobile and endpoint strategy should include to help accomplish your business goals, as agility becomes increasingly important.
Posted: 04 Oct 2017 | Published: 08 Mar 2017

VMware

Prove Yourself: Identity in a Mobile-Cloud World
sponsored by VMware
EBOOK: The reality of implementing a digital workplace is that authenticating users is going to become more difficult. Access this e-book to learn how to handle identity and access management in a world that revolves around mobility and the cloud.
Posted: 03 Oct 2017 | Published: 31 Jul 2017

VMware

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

Enterprise Mobility Trends to Watch in 2017: Q&A with Sumit Dhawan
sponsored by VMware
WHITE PAPER: Download this Q&A to find out how companies can turn problematic realities such as shadow IT and BYO trends, into real business value.  And, discover additional insights into key enterprise mobility trends to watch—and how to take action.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

VMware

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog

Do More with Complete Mobile-Cloud Security
sponsored by MobileIron
WHITE PAPER: This shift toward modern mobile-cloud technologies is forcing organizations to rethink everything from datacenter architectures to endpoint security because traditional, desktop-based security models are no longer adequate. Download this white paper to uncover some of the critical security gaps today's mobile-cloud enterprises must address.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

How to Choose the Right End-User Computing Device for the Job
sponsored by Lenovo
RESOURCE: It's not enough to supply one-size-fits-all mobile devices to your employees—their devices should be suited to the work they actually perform. Download this white paper for guidelines on choosing the right devices for your employees.
Posted: 29 Sep 2017 | Published: 29 Sep 2017

Lenovo

Create A Simpler, Secure, more Agile Network
sponsored by Nokia
WHITE PAPER: Uncover the immediate benefits of a virtualized software-based approach that makes it easier to enable essential network security elements. These include authentication, authorization and accounting, diameter routing agents and session border controllers.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Nokia

Make Your Digital Transformation Strategy A Reality
sponsored by Lenovo
WHITE PAPER: Regardless of what your digital transformation (DX) strategy looks like, it should be able to meet three key objectives. Download this white paper to discover how your organisation can enable workers to be mobile and productive, streamline internal operations, and ensure seamless collaboration via an effective cloud strategy.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Lenovo

Trusted Identity:The Foundation forBusiness Transformation
sponsored by Entrust, Inc.
RESOURCE: By 2020, there will be 7.6 billion connected people and 75 billion connected devices. Discover how to securely evolve into a digital and mobile enterprise by using authentication strategies.
Posted: 27 Sep 2017 | Published: 20 Sep 2017

Entrust, Inc.
1 - 25 of 2028 Matches Previous Page    1 2 3 4    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement