IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
126 - 150 of 1980 Matches Previous Page  |  Next Page
Clientless Remote Support Software: A Key Service Desk Tool to Drive User Satisfaction and Productivity
sponsored by LogMeIn, Inc.
CASE STUDY: Discover how clientless remote software is changing the way two enterprises manage their devices to support end users in a holistic manner. Further, you'll see how security, features sets, and strong relationships underpin these tools.
Posted: 08 Aug 2016 | Published: 30 Oct 2015

LogMeIn, Inc.

Midmarket Enterprise Storage Array Buyers Guide
sponsored by Pure Storage
WHITE PAPER: This buyer's guide details the top ranking storage arrays from 10 storage providers. Access now to quickly compare their features and to find the storage solution that best suits your needs.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Pure Storage

Managing Android devices in the enterprise
sponsored by ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

VMware Workspace One Undercuts Other Management Approaches
sponsored by VMware
EGUIDE: The pricing of VMware Workspace One could have customers turning away from other management approaches. This e-guide takes a look at the pricing structure and feature capabilities of this Workspace platform and compares it to other approaches on the market.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

VMware

Significant Updates Accompany VMware Workspace ONE Announcement
sponsored by VMware
EGUIDE: With more people entering the age of the "digital workforce," companies are looking at ways to better enable their employees, giving them the flexibility, agility, and security to let them work wherever they choose. In this e-guide, learn how you can deliver digital workspaces with consumer simplicity and enterprise security.
Posted: 21 Jul 2016 | Published: 20 Jul 2016

VMware

Operational Process Transformation for Dummies
sponsored by K2
ESSENTIAL GUIDE: In today's marketplace, outdated processes that cause delays. Access this essential guide that explains how to optimize your critical processes by selecting an automated approach to business process management.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

K2

HR Process Efficiency for Dummies
sponsored by K2
ESSENTIAL GUIDE: HR leaders in 2016 and beyond will need to leverage technology to eliminate their manual processes and free up time to focus on what the business needs. Access this guide that details how HR can successfully utilize technology to automate a multitude of essential business processes.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

K2

Four Reasons it's Time to Move Beyond Excel
sponsored by Salesforce.com
WHITE PAPER: Excel works great for inputting data and crunching numbers, but it simply can't provide a comprehensive view of your data. In this white paper, discover how you can visualize data like never before and uncover hidden insights. Learn how you can explore sales data on any device, accelerate time to value, and ultimately, see the whole picture.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Salesforce.com

BYOD: Policy Formation and Enforcement
sponsored by IBM
EGUIDE: Once you decide to let your employees use their own mobile devices and PCs for work, it's essential that you employ a structured BYOD policy. Access this expert e-guide that details the issues to consider when implementing a BYOD policy and discover steps to enforce your policy after implementation.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

Mobile App Delivery: Options to Consider and Potential Obstacles
sponsored by IBM
EGUIDE: Access this expert e-guide for four approaches to mobile app delivery that can provide the necessary oversight for mobile device users in the workplace. Also discover the potential obstacles related to deploying mobile apps.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

BYOD Security and Four Challenges to Consider Before Diving In
sponsored by IBM
EGUIDE: You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Access this expert guide that details the necessary steps to a trusted BYOD security policy and discover 4 BYOD challenges to consider before implementation.
Posted: 29 Jul 2016 | Published: 27 Jul 2016

IBM

The Advantages and Financial Obstacles of BYOD
sponsored by IBM
EGUIDE: Advantages such as cost savings and improved mobility will help BYOD become the norm in corporate end-user device provisioning. Access this expert e-guide for a look at the advantages of BYOD, plus the financial pros and cons of BYOD becoming a part of your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

BYOD: An Opportunity for IT Evolution and Business Advantage
sponsored by IBM
EGUIDE: Most IT departments are missing one of the main points of BYOD – that it allows for IT evolution. Access this expert e-guide for an explanation of how BYOD allows IT to reinvent itself and revolutionize how companies work. Read on to learn the main advantages BYOD offers, and why it will soon be the norm for your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

Application Development 101: Building Apps That Meet Users' Needs
sponsored by IBM
EBOOK: Learn the 8 key considerations that developers should take into account to ensure successful mobile app development in this e-book chapter.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

IBM

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Enterprise Content Management Strategies for Integration, Access, and Control
sponsored by IBM
EGUIDE: Implementing the right ECM strategy can be difficult: it means striking the correct balance between accessibility, control, and data integration. In this e-guide, we explore the concept of ECM software integration, enabling you to share formerly siloed information. You'll learn how to optimize user access without sacrificing IT control.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Special Report: Managing Mobile Devices
sponsored by IBM
EGUIDE: Identify how new mobile support services can help organizations ensure operations run smoothly. Even more importantly, you'll see how the enterprise can be fortified against costly errors and immense management costs.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

IBM

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Modern Mobility e-zine – July 2016
sponsored by SearchMobileComputing
EZINE: In this month's cover story of Modern Mobility E-zine, Editor-in-chief Colin Steele discusses how the mobile workforce is changing the rules on privacy and security in today's workplace. You'll also get access to articles featuring, why layered security is the best defense for mobile security, the value of social collaboration tools, and more.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

SearchMobileComputing

Don't Run A 21st Century Business With 20th Century Phones
sponsored by Avaya CenturyLink
RESOURCE: Explore the top 5 business benefits you will receive by making the switch to VoIP from PBX—fulfilling the need for higher performance standards, simpler network operations, and seamless incorporation of new communications apps. Read on to see why you should consider VoIP.
Posted: 07 Jul 2016 | Published: 22 Apr 2016

Avaya CenturyLink

The Solution for Engagement
sponsored by Avaya CenturyLink
WHITE PAPER: Your methods of communication are the connective tissue that holds your enterprise together. This white paper details how communications are evolving and how new platforms can benefit your business by delivering complete solutions that enable you to implement widespread engagement capabilities.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Tools to Simplify Mobile Application Development
sponsored by IBM
EBOOK: There are many approaches and tools for mobile app development that companies can deploy to support devs and admins in their quest to enable mobility.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

IBM
126 - 150 of 1980 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement