IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
101 - 125 of 2066 Matches Previous Page  |  Next Page
Infographic: Top Use Cases for App Virtualization
sponsored by Citrix
WHITE PAPER: Finding FIPS compliant and Common Criteria certified app virtualization tools can help deliver end-to-end security and protection. Discover what else you can do with app virtualization to enable a secure, cost-effective, mobile, and simplified enterprise.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Citrix

Midmarket Enterprise Storage Array Buyers Guide
sponsored by Pure Storage
WHITE PAPER: This buyer's guide details the top ranking storage arrays from 10 storage providers. Access now to quickly compare their features and to find the storage solution that best suits your needs.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Pure Storage

The Move to Open Government Data
sponsored by Lenovo
PODCAST: In this podcast, Karin Geraghty, CIO for the Department of Environment, Water and Natural Resources at the Government of South Australia, discusses compliance, open data portals, the role of mobile devices in data collection, and more.
Posted: 08 Aug 2016 | Premiered: Aug 8, 2016

Lenovo

Managing Android devices in the enterprise
sponsored by ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

BYOD: Policy Formation and Enforcement
sponsored by IBM
EGUIDE: Once you decide to let your employees use their own mobile devices and PCs for work, it's essential that you employ a structured BYOD policy. Access this expert e-guide that details the issues to consider when implementing a BYOD policy and discover steps to enforce your policy after implementation.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Mobile App Delivery: Options to Consider and Potential Obstacles
sponsored by IBM
EGUIDE: Access this expert e-guide for four approaches to mobile app delivery that can provide the necessary oversight for mobile device users in the workplace. Also discover the potential obstacles related to deploying mobile apps.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

BYOD Security and Four Challenges to Consider Before Diving In
sponsored by IBM
EGUIDE: You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Access this expert guide that details the necessary steps to a trusted BYOD security policy and discover 4 BYOD challenges to consider before implementation.
Posted: 29 Jul 2016 | Published: 27 Jul 2016

IBM

The Advantages and Financial Obstacles of BYOD
sponsored by IBM
EGUIDE: Advantages such as cost savings and improved mobility will help BYOD become the norm in corporate end-user device provisioning. Access this expert e-guide for a look at the advantages of BYOD, plus the financial pros and cons of BYOD becoming a part of your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

BYOD: An Opportunity for IT Evolution and Business Advantage
sponsored by IBM
EGUIDE: Most IT departments are missing one of the main points of BYOD – that it allows for IT evolution. Access this expert e-guide for an explanation of how BYOD allows IT to reinvent itself and revolutionize how companies work. Read on to learn the main advantages BYOD offers, and why it will soon be the norm for your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

Application Development 101: Building Apps That Meet Users' Needs
sponsored by IBM
EBOOK: Learn the 8 key considerations that developers should take into account to ensure successful mobile app development in this e-book chapter.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

IBM

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Enterprise Content Management Strategies for Integration, Access, and Control
sponsored by IBM
EGUIDE: Implementing the right ECM strategy can be difficult: it means striking the correct balance between accessibility, control, and data integration. In this e-guide, we explore the concept of ECM software integration, enabling you to share formerly siloed information. You'll learn how to optimize user access without sacrificing IT control.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

What Will My Enterprise Mobile App Cost?
sponsored by Magenic
WHITE PAPER: Mobile app development is a complex undertaking where a myriad of decision points can impact cost; so unfortunately, there is no one simple formula for calculating a reliable estimate. However, this white paper explores 7 strategic perspectives that will help you factor in key cost considerations to safeguard your mobile app ROI.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Magenic

Operational Process Transformation for Dummies
sponsored by K2
ESSENTIAL GUIDE: In today's marketplace, outdated processes that cause delays. Access this essential guide that explains how to optimize your critical processes by selecting an automated approach to business process management.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

K2

HR Process Efficiency for Dummies
sponsored by K2
ESSENTIAL GUIDE: HR leaders in 2016 and beyond will need to leverage technology to eliminate their manual processes and free up time to focus on what the business needs. Access this guide that details how HR can successfully utilize technology to automate a multitude of essential business processes.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

K2

802.11ac: Superb Wi-Fi Performance
sponsored by Aruba Networks
WHITE PAPER: This resource highlights key information on a Wi-Fi performance system that is making sure all devices have the fastest connection at all times. Download now to take a look at some of the following topics – wider channels, efficient encoding aspects, increased data rates enhanced user experiences and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Aruba Networks

Mobile Threat Prevention Behavioral Risk Analysis
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover what it means to have an advanced approach to comprehensive mobile security. Learn how you can closely monitor new or updated apps installed on the device, use app reputation to eliminate malware false-positives, and more.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

A CISO’s Guide to Mobile Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Discover the 5 major threats to mobile security, an in-depth analysis of their methods, best practices to prevent them, and how to stop mobile attacks before they start.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Check Point Software Technologies Ltd.

API Strategies for Enhancing Monolithic Application Systems
sponsored by IBM
WEBCAST: This webcast explores the use of APIs for enabling more efficient data transport, even for monolithic systems. Discover how you can enable continuous delivery and enhance scalability. Plus, learn about the best language for building microservices and microservice APIs.
Posted: 13 Jul 2016 | Premiered: Jul 13, 2016

IBM

VMware Workspace One Undercuts Other Management Approaches
sponsored by VMware
EGUIDE: The pricing of VMware Workspace One could have customers turning away from other management approaches. This e-guide takes a look at the pricing structure and feature capabilities of this Workspace platform and compares it to other approaches on the market.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

VMware

Significant Updates Accompany VMware Workspace ONE Announcement
sponsored by VMware
EGUIDE: With more people entering the age of the "digital workforce," companies are looking at ways to better enable their employees, giving them the flexibility, agility, and security to let them work wherever they choose. In this e-guide, learn how you can deliver digital workspaces with consumer simplicity and enterprise security.
Posted: 21 Jul 2016 | Published: 20 Jul 2016

VMware

Special Report: Managing Mobile Devices
sponsored by IBM
EGUIDE: Identify how new mobile support services can help organizations ensure operations run smoothly. Even more importantly, you'll see how the enterprise can be fortified against costly errors and immense management costs.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

IBM
101 - 125 of 2066 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement