IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
101 - 125 of 2032 Matches Previous Page  |  Next Page
The Convergence of Tablets and PCs
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Download and discover the pros and cons of enterprise tablet adoption so that you can determine whether or not they are the right fit for your company.
Posted: 27 May 2015 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Building the Business Case for Tablets in the Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn why enterprise tablet adoption is on the rise, and how you can build a business case for the greater productivity, security and reliability of current options.
Posted: 27 May 2015 | Published: 27 May 2015

Dell, Inc. and Intel®

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Tablets Designed for Mobile Productivity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper and discover Dell's new tablets designed specifically for business productivity.
Posted: 26 May 2015 | Published: 26 May 2015

Dell, Inc. and Intel®

How To Approach Mobile Healthcare Security And Data Breaches
sponsored by Absolute Software
EGUIDE: In this e-guide, industry expert Reda Chouffani presents 7 best practices for protecting mHealth data from breach. Also inside, explore how you can prepare for the aftermath of a breach.
Posted: 26 May 2015 | Published: 29 Apr 2015

Absolute Software

Mobility Myth Busting: BYOD, Tablets and Mobile Apps
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This brief white paper presents the 3 key myths that are holding enterprise mobility strategies back and explains how to move beyond them to become a truly successful mobile business.
Posted: 26 May 2015 | Published: 28 Nov 2014

Dell, Inc. and Intel®

Tablets That Work for Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper examines the latest tablet innovations and explains why these devices are ready for the business world.
Posted: 26 May 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

Rethinking Your Approach to Mobile Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn about the IDEA cycle approach to embracing a mobile mindset.
Posted: 26 May 2015 | Published: 24 Jan 2014

Dell, Inc. and Intel®

Workspace aggregators help your business to improve costs and boost productivity
sponsored by Matrix42
WHITE PAPER: Read this white paper to find out how workspace aggregators can help your IT department integrate the cloud into your enterprise easily while improving costs, boosting productivity, and minimizing complexity.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

Unlock the Potential of Your Businesses' Mobile Moments with a Winning App Strategy
sponsored by Kony
WEBCAST: Does your enterprise have an app strategy that will engage your customers and employees in their mobile moments? Learn how to build a winning app strategy that will identify mobile moments and adapt to the changing demands of your customers and workforce.
Posted: 26 May 2015 | Premiered: May 26, 2015

Kony

Mobile Strategy for the Business Owner: The What, Why, and How of Great Apps
sponsored by Kony
WEBCAST: As a business professional, you know that mobile can play a huge role in meeting your team's objectives. What you may not know is how to get there: What it takes to balance the strategy, processes, technology, and collaboration required to make mobile a success.
Posted: 26 May 2015 | Premiered: May 26, 2015

Kony

Taking Your Mobile Initiative Global – How to Ramp Up Faster and Be More Flexible
sponsored by Kony
WEBCAST: Learn best practices for accelerating the time to value of your global mobile initiatives, and respond to the unique user requirements of different global geographies.
Posted: 26 May 2015 | Premiered: May 26, 2015

Kony

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Mobile call recording: Are You Complying or Compromising?
sponsored by Smart Numbers
WHITE PAPER: This white paper makes the case for implementing a mobile business call recording solution that will help you defend your organization from public scrutiny.
Posted: 21 May 2015 | Published: 21 May 2015


6 Major Trends Shaping the Future of Security
sponsored by Box
WHITE PAPER: This white paper outlines the 6 major trends that are changing IT security as we know it.
Posted: 20 May 2015 | Published: 20 Feb 2014

Box

The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 20 May 2015 | Published: 20 May 2015


Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

The Top 6 Tools Users Need for Mobile Files
sponsored by BlackBerry
WHITE PAPER: Access this white paper now to discover the 6 tools users need for mobile files, and how to provide them securely and effectively. Read on and learn the keys to creating a productive mobile workforce.
Posted: 18 May 2015 | Published: 18 May 2015

BlackBerry

The Keys to BYOD Security Success
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, you'll learn how to plan for BYOD security and discover tips for minimizing risk by enforcing solid policies with encryption.
Posted: 18 May 2015 | Published: 18 May 2015

Dell, Inc. and Intel®

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: Access this white paper to learn the best practices for secure MALM. Don't leave your enterprise app store vulnerable to attacks.
Posted: 14 May 2015 | Published: 26 Dec 2014

IBM

The Guide to Mobility Access
sponsored by Hewlett-Packard Limited and Intel ®
WHITE PAPER: Access this resource for the ultimate guide to embracing business mobility.
Posted: 13 May 2015 | Published: 11 May 2015

Hewlett-Packard Limited and Intel ®

Manage Your Enterprise Apps Securely
sponsored by IBM
WHITE PAPER: Access this brief white paper to learn how you can ensure mobile app security with a mobile application management (MAM) solution.
Posted: 13 May 2015 | Published: 13 May 2015

IBM

Internet of Things Security Study: Home Security Systems Report
sponsored by Hewlett-Packard Company
WHITE PAPER: This research study presents the  test results of 10 popular home security systems. The results will make you feel anything but secure.
Posted: 12 May 2015 | Published: 29 Apr 2015

Hewlett-Packard Company

12 key considerations your mobile app testing solution should cover
sponsored by Hewlett-Packard Limited
BROCHURE: This informative brochure highlights 12 considerations that your mobile application testing solution should cover. Also, explore an end-to-end mobile testing solution that meets all 12 of these key considerations for mobile testing.
Posted: 12 May 2015 | Published: 30 Sep 2014

Hewlett-Packard Limited
101 - 125 of 2032 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement