IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 2037 Matches Previous Page  |  Next Page
Use Cases for Level 3: Adaptive Network Control Solutions
sponsored by Level 3 Communications, Inc.
CASE STUDY: See how a portfolio of SDN-Based applications can seamlessly address your network challenges. Particularly how mobile business environments can be improved by adding customized controls to the network.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Level 3 Communications, Inc.

A Look at the Top Mobile Security Obstacles
sponsored by TechTarget
RESOURCE: With employees bringing an increasing number of unsecure personal devices into the workplace each day, implementing proactive mobile security measures should be a top priority for every IT department. Fill out our brief Mobile Security Checklist to access our guide on minimizing mobile data security threats.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

TechTarget

5 Data Management Issues Challenging The HealthCare Industry
sponsored by Commvault
RESOURCE: Market and technology-driven advances have dramatically increased data volume, risk, and access needs for many organizations across all industries. Access this slide presentation to understand 5 data management challenges that healthcare must overcome in order to provide excellent patient care.
Posted: 26 Oct 2016 | Published: 29 Aug 2016

Commvault

Advice on Platform-as-a-Service Uses and Offerings
sponsored by ComputerWeekly.com
RESOURCE: IoT presents a strong use case for investing in PaaS, but it's only one in a crowd. Access our expert guide to find out how your organization can use PaaS for many types of application and cloud integration projects, and future uses.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

ComputerWeekly.com

Mobility Management Made Simple With IBM MaaS360
sponsored by IBM
VIDEO: In this webcast learn about a program that enables simple and intuitive application management while keeping mission-critical information safe without slowing down mobile development. Discover a software that allows for single-sign on, separates data for business security, and end-user peace of mind, and more.
Posted: 24 Oct 2016 | Premiered: 27 Apr 2016

IBM

Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content
sponsored by IBM
WHITE PAPER: This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

IBM

2016 Mobile Security & Business Transformation Study
sponsored by IBM
WHITE PAPER: Enterprise mobility has transformed security and business practices. Access the 2016 Mobile Security & Business Transformation Study, and learn what 200 respondents had to say about how organizations like yours can conduct -- and secure -- enterprise mobility.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

IBM

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: BYOD in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud through a multitude of devices. This infographic provides 9 BYOD security facts to help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016

Commvault

Tools and Techniques for Managing Apps Across Countless Delivery Methods, Endpoint Types, and OSes
sponsored by TechTarget
RESOURCE: This 11-page guide – curated by the editorial, objective experts at SearchMobileComputing.com – is jam-packed with invaluable tips for effectively managing today's mobility headaches in the face of vendor rhetoric, escalating user demands/expectations, and an increasing array of options for managing devices and delivering both apps and data.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget

Desktop Virtualisation: The Essential Guide
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

ComputerWeekly.com

5 Ways to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

Commvault

Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Appthority

Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Appthority

How Converging Cloud, Mobile, and Social Trends are Impacting ERP
sponsored by Sage Software
WHITE PAPER: 4 influential trends – cloud and SaaS, mobility, social media, and big data – are converging as they impact enterprise resource planning and ERP vendors. Discover how to adapt your ERP strategy to incorporate SaaS, increased mobility, big data insights, and more in order to drive your business's innovation.
Posted: 29 Sep 2016 | Published: 31 Dec 2014

Sage Software

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.
Posted: 23 Sep 2016 | Published: 16 Jun 2016

SearchMobileComputing

Case Study: Metro Diagnostic Imaging Adds Cloud to Mobile Van
sponsored by Ambra
CASE STUDY: Access this case study to learn how moving PACS to the cloud allowed Metro Diagnostic Imaging more flexibility and productivity for the mobile imaging service provider, ensuring imaging data is at the user's fingertips.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Ambra

The Holistic Patient Health Record: Image Enabling the EHR
sponsored by Ambra
EBOOK: Discover how to provide seamless access to data and images within the EHR with a unified cloud framework. Learn the most important functionalities to look for in a cloud-enabled EHR system that prioritizes quality imaging, including: single sign-on, mobile accessibility, seamless image exchange, and scalable disaster recovery.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Ambra

Windows 10 with EMM: TCO Toolkit
sponsored by MobileIron
WHITE PAPER: Read this whitepaper to learn how using EMM to secure and manage your PCs can significantly reduce total cost of ownership by up to 80% across three key areas such as IT operations, helpdesk administration and licensing costs.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

EMM: Expanding Mobile Enterprise Strategy
sponsored by vmware airwatch
EGUIDE: In this expert e-guide you will learn how mobility has the potential to completely transform your businesses operations, and why it needs to go beyond EMM to do so. Additionally, discover why it's time to consider an EMM tool strategy in your enterprise.
Posted: 11 Oct 2016 | Published: 06 Oct 2016

vmware airwatch

Modern Mobility e-zine – October 2016
sponsored by SearchMobileComputing
EZINE: HTML5 mobile development is on the rise, but the latest version of this programming language is not the only tool in a mobile developer's toolkit. It's not even the biggest one.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

SearchMobileComputing

Online Team Collaboration: Reaching New Levels With an All-In-One Platform
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the combination of persistent group messaging, private one-on-one chat, voice telephony, and video conferencing in a single unified experience. Access now to learn how to communicate in real time and collaborate using sophisticated yet easy-to-use tools.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

Cisco Systems, Inc.

Next-Generation Networking Trends
sponsored by Optus
EGUIDE: In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.
Posted: 20 Sep 2016 | Published: 13 Sep 2016

Optus

Modern Mobility e-zine – September 2016
sponsored by SearchMobileComputing
EZINE: Many companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. Read on as experts explore how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

SearchMobileComputing

Focusing on Application Security is More Important than Ever
sponsored by Onapsis
EGUIDE: This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.
Posted: 13 Sep 2016 | Published: 09 Sep 2016

Onapsis
151 - 175 of 2037 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement