IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 2049 Matches Previous Page  |  Next Page
What Will My Enterprise Mobile App Cost?
sponsored by Magenic
WHITE PAPER: Mobile app development is a complex undertaking where a myriad of decision points can impact cost; so unfortunately, there is no one simple formula for calculating a reliable estimate. However, this white paper explores 7 strategic perspectives that will help you factor in key cost considerations to safeguard your mobile app ROI.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Magenic

Operational Process Transformation for Dummies
sponsored by K2
ESSENTIAL GUIDE: In today's marketplace, outdated processes that cause delays. Access this essential guide that explains how to optimize your critical processes by selecting an automated approach to business process management.
Posted: 19 Jul 2016 | Published: 01 Jun 2016

K2

HR Process Efficiency for Dummies
sponsored by K2
ESSENTIAL GUIDE: HR leaders in 2016 and beyond will need to leverage technology to eliminate their manual processes and free up time to focus on what the business needs. Access this guide that details how HR can successfully utilize technology to automate a multitude of essential business processes.
Posted: 18 Jul 2016 | Published: 01 Jun 2016

K2

API Strategies for Enhancing Monolithic Application Systems
sponsored by IBM
WEBCAST: This webcast explores the use of APIs for enabling more efficient data transport, even for monolithic systems. Discover how you can enable continuous delivery and enhance scalability. Plus, learn about the best language for building microservices and microservice APIs.
Posted: 13 Jul 2016 | Premiered: Jul 13, 2016

IBM

Four Reasons it's Time to Move Beyond Excel
sponsored by Salesforce.com
WHITE PAPER: Excel works great for inputting data and crunching numbers, but it simply can't provide a comprehensive view of your data. In this white paper, discover how you can visualize data like never before and uncover hidden insights. Learn how you can explore sales data on any device, accelerate time to value, and ultimately, see the whole picture.
Posted: 07 Jul 2016 | Published: 07 Jul 2016

Salesforce.com

Unify to Simplify: One Management Tool for All Devices
sponsored by SearchMobileComputing
EBOOK: Get started learning about unified endpoint management in our expert guide, providing tips on key features, frontrunners, and endpoint management techniques. Access now and discover how you can manage PCs, tablets, and smartphones from one management console, saving your company time and money.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

SearchMobileComputing

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Enterprise Content Management Strategies for Integration, Access, and Control
sponsored by IBM
EGUIDE: Implementing the right ECM strategy can be difficult: it means striking the correct balance between accessibility, control, and data integration. In this e-guide, we explore the concept of ECM software integration, enabling you to share formerly siloed information. You'll learn how to optimize user access without sacrificing IT control.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

VMware Workspace One Undercuts Other Management Approaches
sponsored by VMware
EGUIDE: The pricing of VMware Workspace One could have customers turning away from other management approaches. This e-guide takes a look at the pricing structure and feature capabilities of this Workspace platform and compares it to other approaches on the market.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

VMware

Significant Updates Accompany VMware Workspace ONE Announcement
sponsored by VMware
EGUIDE: With more people entering the age of the "digital workforce," companies are looking at ways to better enable their employees, giving them the flexibility, agility, and security to let them work wherever they choose. In this e-guide, learn how you can deliver digital workspaces with consumer simplicity and enterprise security.
Posted: 21 Jul 2016 | Published: 20 Jul 2016

VMware

Special Report: Managing Mobile Devices
sponsored by IBM
EGUIDE: Identify how new mobile support services can help organizations ensure operations run smoothly. Even more importantly, you'll see how the enterprise can be fortified against costly errors and immense management costs.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

IBM

Understand the Hype around Mobile Data Security Threats
sponsored by Check Point Software Technologies Ltd.
EGUIDE: In this expert e-guide, we explore some of the most effective security practices for assessing and managing mobile data security threats. Learn about the root cause for many big data breaches and gain access to 6 tips for radically improving endpoint device security.
Posted: 12 Jul 2016 | Published: 29 Jun 2016

Check Point Software Technologies Ltd.

Modern Mobility e-zine – July 2016
sponsored by SearchMobileComputing
EZINE: In this month's cover story of Modern Mobility E-zine, Editor-in-chief Colin Steele discusses how the mobile workforce is changing the rules on privacy and security in today's workplace. You'll also get access to articles featuring, why layered security is the best defense for mobile security, the value of social collaboration tools, and more.
Posted: 12 Jul 2016 | Published: 12 Jul 2016

SearchMobileComputing

Don't Run A 21st Century Business With 20th Century Phones
sponsored by Avaya CenturyLink
RESOURCE: Explore the top 5 business benefits you will receive by making the switch to VoIP from PBX—fulfilling the need for higher performance standards, simpler network operations, and seamless incorporation of new communications apps. Read on to see why you should consider VoIP.
Posted: 07 Jul 2016 | Published: 22 Apr 2016

Avaya CenturyLink

The Solution for Engagement
sponsored by Avaya CenturyLink
WHITE PAPER: Your methods of communication are the connective tissue that holds your enterprise together. This white paper details how communications are evolving and how new platforms can benefit your business by delivering complete solutions that enable you to implement widespread engagement capabilities.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Tools to Simplify Mobile Application Development
sponsored by IBM
EBOOK: There are many approaches and tools for mobile app development that companies can deploy to support devs and admins in their quest to enable mobility.
Posted: 28 Jun 2016 | Published: 28 Jun 2016

IBM

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

6 Critical Trends in Smart Healthcare Technology
sponsored by Avaya
RESOURCE: Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Avaya

The Digital Roadmap Demands a New Kind of ITSM Support
sponsored by ServiceNow
EGUIDE: The IT service management (ITSM) times truly are a' changing, and traditional ITSM tactics just don't cut it in today's digitally disrupted marketplace. Discover in this expert guide how to boost IT service delivery in today's digitally enabled marketplace, see how SABRE technology redefines ITSM support.
Posted: 22 Jun 2016 | Published: 20 Jun 2016

ServiceNow

IBM MaaS360 Mobile Application Management
sponsored by IBM MaaS360
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM MaaS360

9 Essential Elements for Effective Enterprise Mobility
sponsored by VMware, Inc.
EGUIDE: Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.
151 - 175 of 2049 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement