IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
101 - 125 of 2026 Matches Previous Page  |  Next Page
Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

6 Components of Mobility Management Software
sponsored by Microsoft
EGUIDE: As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.
Posted: 14 Jun 2016 | Published: 09 Jun 2016

Microsoft

Embrace True Business Mobility
sponsored by VMware, Inc.
WHITE PAPER: Enterprise leaders must adopt a cohesive, purpose-built strategy to empower mobile users. Explore ways to work seamlessly across unified desktops and mobile device platforms.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

VMware, Inc.

VDI – Simplify Your Migration to Windows® 10 and Beyond
sponsored by Citrix
WHITE PAPER: Find out how VDI can help you to streamline your Windows 10 migration and discover three critical questions to answer surrounding your migration to Windows 10.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Citrix

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Affordable Business Transformation: "Just Right" IT for SMBs
sponsored by HPE and Intel®
CASE STUDY: Examine several case studies which demonstrate how to facilitate successful digital transformation in your small to midsize business (SMB). Whether your organization is in the retail, construction, beverage, or energy industry, discover how to make the most of your investments by directing your efforts in 4 key areas.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

HPE and Intel®

Embracing the Digital Workplace
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Organizations across all industries recognize the need to embrace digital transformation or risk being left behind in today's mobile world. Transform your business by embracing digital and discover the key trends driving the transformation as well as, the impact these trends are having on the underlying mobile networks.
Posted: 07 Jun 2016 | Published: 07 Jun 2016

Hewlett Packard Enterprise

A Case Study for Kalibrate: A Cloud-Driven Adaptive Edge
sponsored by Rackspace
CASE STUDY: This case study demonstrates how Kalibrate, a next-gen SaaS solution provider, produced synergy by uniting its data and location intelligence to achieve a full and seamless eco-system through private cloud integration. Access now to take advantage of cloud SaaS and give your organization a cloud-driven adaptive edge.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Rackspace

Compete Big by Achieving Business Outcomes with Improved IT Infrastructure
sponsored by HPE and Intel®
WHITE PAPER: Access this white paper to find out how eight different companies drove significant business benefits by deploying converged infrastructure technologies.
Posted: 06 Jun 2016 | Published: 06 Jun 2016

HPE and Intel®

Free Yourself from Old-School PC Tools
sponsored by MobileIron
WHITE PAPER: Take a look at the significant improvements new devices have made and learn about how managing all of them can be boiled down to a single enterprise mobility management solution that eases both management and security.
Posted: 03 Jun 2016 | Published: 25 May 2016

MobileIron

The Future of PC Security and Management
sponsored by MobileIron
WHITE PAPER: Enterprise mobility management (EMM) is one big key to unlocking mobility's full potential. We had previously required a variety of solutions to deal with every aspect of mobile management. Now there is an EMM solution that does it all. Read on to learn more about EMM and this simplifying solution.
Posted: 03 Jun 2016 | Published: 31 May 2016

MobileIron

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Five simple strategies to help enable a more productive mobile workforce
sponsored by HPE and Intel®
RESOURCE: How do you keep your mobile workforce productive? Explore best practices and five strategies to make sure that your workers are making the most of mobility.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Introduction to Amazon's Desktop-as-a-Service Platform
sponsored by Amazon Web Services
VIDEO: Discover how managed desktops-as-a-service enables users to securely access the documents, applications, and resources they need with the device of their choice. You'll learn how you can deliver a high-quality desktop experience to any user.
Posted: 02 Jun 2016 | Premiered: 26 Feb 2016

Amazon Web Services

Five End-User Computing Predictions for 2016
sponsored by Dell and VMware
RESOURCE: This blog post reveals the top five trends that will impact end user computing (and to a greater degree IT as a whole) in 2016. Here's a sneak peak at what made the list: digital transformation. Access now to learn the others.
Posted: 02 Jun 2016 | Published: 04 Feb 2016

Dell and VMware

Client Virtualization for Higher Education Delivers Greater Mobility, Increased Security, and Savings
sponsored by Dell and VMware
WHITE PAPER: Today's students are accustomed to accessing data from any device, any location, at any time. But can their educational work styles be the same? This white paper details how client virtualization provides a simple way to seamlessly access data and apps across any device, enabling a mobile work style that improves student engagement and success.
Posted: 02 Jun 2016 | Published: 03 May 2016

Dell and VMware

What mobile policy suits your organisation?
sponsored by IBM MaaS360
WEBCAST: Bring your own device (BYOD) may not be right for every organization. It takes a lot to ensure a secure and successful BYOD campaign. Watch this webinar to see how other companies are approaching BYOD and how to make sure that you can take advantage of this growing business trend.
Posted: 31 May 2016 | Premiered: Mar 31, 2016

IBM MaaS360

USC’s Engineering Program Adopts Sophisticated Virtualized Graphics
sponsored by Dell, Inc., Intel and VMware
RESOURCE: Discover in this case study how USC virtualized their graphical applications by adopting vGPU-enabled desktop virtualization. Read on to see why you should consider utilizing VDI with hardware accelerated graphics, so that even with low-end PC or Macs, your users can access and use graphically-intensive Windows-based applications.
Posted: 31 May 2016 | Published: 16 Mar 2016

Dell, Inc., Intel and VMware

Beyond the Perimeter: Protecting your Network
sponsored by IBM MaaS360
WEBCAST: Learn how to protect your network beyond the perimeter defenses and securely integrate mobile access to company data. Watch this webinar to learn what considerations you need to account for when planning your network security strategy, especially when it comes to employee mobile devices.
Posted: 31 May 2016 | Premiered: May 25, 2016

IBM MaaS360

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 08 Jun 2016 | Published: 01 Jun 2016

Fortinet, Inc.
101 - 125 of 2026 Matches Previous Page    3 4 5 6 7 8    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement