IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
126 - 150 of 1902 Matches Previous Page  |  Next Page
Avoid the information governance traps of BYOD management
sponsored by Dell, Inc. and Intel®
WHITE PAPER: In this e-guide, learn the steps you must take to achieve a solid governance and mobile device management strategy to help your organization avoid these information governance traps. Read on to learn more.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Dell, Inc. and Intel®

IDC Essential Guidance: Securing the Enterprise: Multifunction Printer Risks and Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This analyst brief reveals the consequences of nonsecure MFPs, and offers essential guidance on how to secure them.
Posted: 10 Feb 2015 | Published: 31 Jul 2014

Hewlett-Packard Company

BYOD or COPE - Which enterprise mobility strategy is right for you?
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This e-guide highlights comparison points for the two models, including control,privacy, productivity, and more. Learn which model would be the best fit for your organization.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Dell, Inc. and Intel®

10 Common Pitfalls of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about the top 10 pitfalls commonly seen in endpoint backup and how to avoid them.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Druva Software

Future of Work
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Design a Blueprint for Building a Mobile Workforce
sponsored by SearchConsumerization.com
EBOOK: Mobile devices can improve productivity, but IT and vendors are catching up with enterprise mobility management strategies and products that must balance access with security.
Posted: 02 Feb 2015 | Published: 02 Feb 2015


iDisrupted
sponsored by ComputerWeekly.com
BOOK: iDisrupted looks at how technology will change the economy, business and even the human race.
Posted: 02 Feb 2015 | Published: 05 Feb 2015

ComputerWeekly.com

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by SearchConsumerization.com
EBOOK: Mobility is expected to lead to greater employee efficiency, but are enterprises properly encouraging mobile workers and measuring the effects of mobile apps on productivity?
Posted: 28 Jan 2015 | Published: 28 Jan 2015


Mobile Applications: How to Stay Ahead of the Game
sponsored by Hewlett-Packard Company
VIDEO: This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Hewlett-Packard Company

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

2014 Connected World Technology Final Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive research study conducted by Cisco offers a look at how employees feel about enterprise mobility.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Cisco Systems, Inc.

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Computer Weekly – 20 January 2015: FT sold on cloud benefits
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further expansion to meet its data warehousing needs. And we examine the emerging market for mobile application services in the cloud. Read the issue now.
Posted: 19 Jan 2015 | Published: 16 Jan 2015

ComputerWeekly.com

Mobile File Sharing Solutions: 7 Key Factors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 7 key reasons why Accellion is selected over Dropbox to meet the need for a mobile, scalable, secure content management and sharing solution that extends enterprise security policies and controls to all devices.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

New Enterprise Imperative - Securing Mobile Content
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the requirements for providing secure mobile access to ECM platforms and cloud storage services, and how to best enable mobile productivity for your work force
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

The Aragon Research Globe for Mobile Content Management, 2014
sponsored by Accellion, Inc.
WHITE PAPER: A growing trend is the shift toward being able to manage mobile content as well as mobile devices and mobile apps. Managing critical content outside of repositories is what MCM is all about. Read the 2014 Aragon Research Globe Report for Mobile Content Management to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Accellion, Inc.

How new F&A Solutions Can Help CFOs Improve Forecasting Performance
sponsored by Anaplan
WHITE PAPER: Access this white paper to find out how new FP&A software can help CFOs improve forecasting performance and provide universal access through mobile devices and increasingly powerful analytics while lowering the entry barriers to software deployment.
Posted: 13 Jan 2015 | Published: 31 May 2014

Anaplan

Enterprise Mobility-as-a-Service
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data
126 - 150 of 1902 Matches Previous Page    4 5 6 7 8 9    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement