IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
101 - 125 of 1984 Matches Previous Page  |  Next Page
Smart Service Management for Smart Devices
sponsored by Matrix42
WHITE PAPER: This white paper explores why integrating your ITSM, client management, and EMM can help your enterprise meet the demands of today's mobile workstyles. Access now to learn how this strategy can shorten ticket resolution times, boost employee productivity, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

The CIO's Guide to Avoiding IT Irrelevance: Build a Bridge with BYOD
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover 7 crucial steps to avoid IT irrelevance by beating Shadow IT with BYOD. Access this paper to view the key aspects of this EMM-based approach, and learn how to eliminate barriers for users with self-service and social ITSM, and more.
Posted: 29 Feb 2016 | Published: 31 Dec 2015

Matrix42

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. Discover a maturity path for managing mobile devices in a SAM context.
Posted: 26 Feb 2016 | Published: 26 Feb 2016

Snow Software

Today's Mobile Enterprise: The Need for A New Network Security Strategy
sponsored by Aruba Networks
WHITE PAPER: Proactive organizations recognize the need for a new network security strategy that spans the enterprise. Access this white paper to learn why network security is becoming increasingly difficult and how to best overcome these pain points with a proven network architecture and strategy to kelp you best mitigate security issues.
Posted: 22 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Secure Remote Access Your Users Will Love
sponsored by Citrix
WHITE PAPER: An organization's remote access strategy focuses on IT priorities—protecting the enterprise network and avoiding unnecessary complexity. But the ultimate customer is the user who depends on reliable access to get work done. Learn how IT can address its requirements while delivering a solution people love.
Posted: 22 Feb 2016 | Published: 22 Feb 2016

Citrix

The Need For a New Network Security Strategy in Today's Mobile Enterprise
sponsored by Aruba Networks
ANALYST REPORT: Large organizations face a difficult challenge on two distinct fronts including, the fight against cyber-criminals and the BYOD trend. Access this white paper to discover how enterprises can mitigate risk in the dynamic environment.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

Aruba Networks

Redefining the Mission of Mobile Authentication
sponsored by Aruba Networks
PRODUCT OVERVIEW: Billions of Wi-Fi enabled smartphones and tablets are pouring into the workplace allowing users to have the freedom to connect to any network and IT is struggling to maintain control. Discover how to maintain policy control, workflow automation and enhance visibility for a seamless mobile experience.
Posted: 18 Feb 2016 | Published: 18 Feb 2016

Aruba Networks

Secure Enterprise Mobility: Leverage Real-Time Context to Mitigate Today's Risks
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will discover how to protect BYOD workflows and deliver secure enterprise-class mobility by utilizing a user and device authentication software. Read on to learn to integrate BYOD and IT-issued devices on the same SSID, and more.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Aruba Networks

Rethinking remote access: Centralize your mobile operations
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will address the productivity gap that traditional remote access causes. Access now to discover a centralized controller, a remote access point solution that integrates your network operations and security requirements.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Aruba Networks

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

Delivering high performing mobile applications with Cloud
sponsored by IBM
WEBCAST: In this webcast, you will discover how to leverage the cloud to continuously deliver high-performance mobile apps, and integrate these apps with your existing IT systems to source new avenues of revenue and transform your business.
Posted: 12 Feb 2016 | Premiered: Feb 12, 2016

IBM

Mobile Malware Hits ActiveSynch-Only Devices
sponsored by MobileIron
WHITE PAPER: In this white paper, learn about four major threats to mobile device security, including: Stagefright, XcodeGhost, and 2 more. Additionally, learn how an enterprise mobility management provider can protect your business by detecting and mitigating threats to mobile devices.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

The State of App Security
sponsored by MobileIron
WHITE PAPER: In this white paper, learn how to proactively approach mobile app security. Explore the features one mobile security option provides, including automated responses to threats like malware, integration to make existing security stack mobile-aware, and more.
Posted: 11 Feb 2016 | Published: 11 Feb 2016

MobileIron

Modern Mobility E-zine: February 2016
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will explore the state of enterprise wearables, assesses their potential use cases, and take an exclusive look at the security challenges that still remain. Read on to access a Q&A with end-user computing expert Matt Kosht, who explains why app refactoring is still a niche technology.
Posted: 09 Feb 2016 | Published: 09 Feb 2016

SearchMobileComputing

Enterprise Mobile Management: The Vendors That Matter Most
sponsored by MobileIron
RESEARCH CONTENT: In this resource, Forrester Research evaluates the 11 most significant EMM vendors from 2015 and provides an analysis to help I&O professionals select the right partner for their EMM. Read on to determine why today's EMM provides a model for future unified application and device management and drives secure productivity.
Posted: 08 Feb 2016 | Published: 04 Dec 2015

MobileIron

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: Check out this incredible online resource center that's packed with proven best practices focused on how to transform your data into a powerful strategic asset with a holistic data protection plan—enabling you to access all of your data safely from any endpoint.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management is just one facet of a strong mobile enablement strategy; it isn't the end-all, be-all. Every company starting a mobile initiative needs a plan tailor-made to meet individualized needs.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

SearchMobileComputing

A Computer Weekly buyer's guide to employee self-service
sponsored by ComputerWeekly.com
EBOOK: In this 13-page buyer's guide, Computer Weekly looks at why IT departments should adopt new ways of delivering applications to employees and how to ensure they use the technology effectively.
Posted: 28 Jan 2016 | Published: 28 Jan 2016

ComputerWeekly.com

Geolocation and Mobile BPM: Benefits & Challenges
sponsored by HERE
EGUIDE: In this expert e-guide, Steve Weissman discusses the benefits that geolocation brings to mobile business process management. Learn how geolocation enables you to make customer service more specific and targeted and enhances business intelligence with geodata.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

HERE

Location-Based Apps and CRM: Convenience vs Privacy Concerns
sponsored by HERE
EGUIDE: This expert e-guide explains the current landscape of the taxi-hailing application market (think Uber) and examines how location-based mobile apps are revolutionizing customer relationship management in hospitality, insurance, and retail with a big emphasis on the customer privacy concern.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

HERE

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Linux Goes Mobile: How LinuxONE can Empower Enterprise Mobility
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how to deliver an exceptional mobile experience with a scalable Linux platform, and utilize this open source software to leverage agile development and delivery of mobile apps. Read on to also learn to deliver on a highly responsive infrastructure that scales to meet peaks in mobile workloads.
Posted: 25 Feb 2016 | Published: 31 Aug 2015

IBM

How an Identity Management System can Improve Mobile Security
sponsored by Oracle Corporation
EGUIDE: This e-guide teaches you about identity access management, which defines user permissions to your network. A large part of this system involves mobile device access as network access from remote locations becomes more frequent.
Posted: 22 Feb 2016 | Published: 16 Feb 2016

Oracle Corporation

Taking Windows Mobile on Any Device
sponsored by Citrix
WHITE PAPER: Taking Windows applications and desktops mobile has many advantages, but with so many device types to consider, how can you simplify solution implementation? Learn how Citrix XenApp solves this complex problem.
Posted: 22 Feb 2016 | Published: 30 Apr 2015

Citrix

Desktop Virtualization Aids Graphic-Heavy Apps and BYOD
sponsored by NVIDIA/VMware
EGUIDE: This e-guide illustrates how virtual desktops can aid graphics-heavy apps, and will help you discover how GPU virtualization can aid app performance, and ease BYOD management. Access this guide to get an exclusive look at Nvidia vGPU support and its accommodation of VDI graphics demands.
Posted: 12 Feb 2016 | Published: 08 Feb 2016

101 - 125 of 1984 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement