IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 2020 Matches Previous Page  |  Next Page
IT Project ANZ: Virtualisation
sponsored by ComputerWeekly.com
EGUIDE: Before cloud and big data began to dominate the IT headlines, virtualisation was all the rage in the enterprise space. While the focus may have shifted to these more fashionable technologies, virtualisation is once again gaining popularity, and the ANZ market is maturing faster than most.
Posted: 13 Nov 2016 | Published: 14 Nov 2016

ComputerWeekly.com

How Utilities Have Used Machine Learning and The Internet of Things
sponsored by SAS
WHITE PAPER: In this resource, read about how 200 North American utility providers have leveraged IoT and machine learning, and use their successes and failures to help you get the most out of this new technology.
Posted: 11 Nov 2016 | Published: 30 Apr 2016

SAS

Mobilizing Care With Virtual Desktops
sponsored by SearchHealthIT.com
EBOOK: Desktop virtualization attracts clinicians and health IT professionals alike with time savings and technological streamlining. This exclusive handbook takes a look at three added issues about virtualization in healthcare settings – performance, caregiving, and hyper-convergence.
Posted: 08 Nov 2016 | Published: 28 Oct 2016

SearchHealthIT.com

Real Estate Development and Management Company Builds a Secure Mobile Foundation
sponsored by MobileIron
CASE STUDY: This case study details how a family-owned and operated real estate development and management company was able to use an advanced EMM platform to meet all of their critical mobility requirements, cut spending and more.
Posted: 08 Nov 2016 | Published: 30 Sep 2016

MobileIron

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

MobileIron

It's a Mobile World: Is Your Sales Team Equipped For Success?
sponsored by Infor
RESOURCE: 74% of sales organizations have already enabled mobile CRM access. Does your organization fit into that majority, or is it at risk for falling behind? Learn about the state of mobility today and the importance of mobile CRM access for your sales team.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Infor

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: To help IT Administrators understand how Android for Work will impact their organization, this white paper provides an overview of the new capabilities and recommendations for deploying and managing Android devices in the Enterprise.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Windows 10 with EMM: TCO Toolkit
sponsored by MobileIron
WHITE PAPER: Read this whitepaper to learn how using EMM to secure and manage your PCs can significantly reduce total cost of ownership by up to 80% across three key areas such as IT operations, helpdesk administration and licensing costs.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Use Cases for Level 3: Adaptive Network Control Solutions
sponsored by Level 3 Communications, Inc.
CASE STUDY: See how a portfolio of SDN-Based applications can seamlessly address your network challenges. Particularly how mobile business environments can be improved by adding customized controls to the network.
Posted: 31 Oct 2016 | Published: 31 Oct 2016

Level 3 Communications, Inc.

A Look at the Top Mobile Security Obstacles
sponsored by TechTarget
RESOURCE: With employees bringing an increasing number of unsecure personal devices into the workplace each day, implementing proactive mobile security measures should be a top priority for every IT department. Fill out our brief Mobile Security Checklist to access our guide on minimizing mobile data security threats.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

TechTarget

5 Data Management Issues Challenging The HealthCare Industry
sponsored by Commvault
RESOURCE: Market and technology-driven advances have dramatically increased data volume, risk, and access needs for many organizations across all industries. Access this slide presentation to understand 5 data management challenges that healthcare must overcome in order to provide excellent patient care.
Posted: 26 Oct 2016 | Published: 29 Aug 2016

Commvault

Advice on Platform-as-a-Service Uses and Offerings
sponsored by ComputerWeekly.com
RESOURCE: IoT presents a strong use case for investing in PaaS, but it's only one in a crowd. Access our expert guide to find out how your organization can use PaaS for many types of application and cloud integration projects, and future uses.
Posted: 26 Oct 2016 | Published: 26 Oct 2016

ComputerWeekly.com

Tools and Techniques for Managing Apps Across Countless Delivery Methods, Endpoint Types, and OSes
sponsored by TechTarget
RESOURCE: This 11-page guide – curated by the editorial, objective experts at SearchMobileComputing.com – is jam-packed with invaluable tips for effectively managing today's mobility headaches in the face of vendor rhetoric, escalating user demands/expectations, and an increasing array of options for managing devices and delivering both apps and data.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget

Desktop Virtualisation: The Essential Guide
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

ComputerWeekly.com

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by SearchMobileComputing
EBOOK: Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.
Posted: 23 Sep 2016 | Published: 16 Jun 2016

SearchMobileComputing

Modern Mobility e-zine – November/December 2016
sponsored by SearchMobileComputing
EZINE: Pokémon Go brought augmented reality technology to the masses. Now, businesses can take advantage of AR to get more insight into users' activities and needs.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

SearchMobileComputing

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

EMM: Expanding Mobile Enterprise Strategy
sponsored by vmware airwatch
EGUIDE: In this expert e-guide you will learn how mobility has the potential to completely transform your businesses operations, and why it needs to go beyond EMM to do so. Additionally, discover why it's time to consider an EMM tool strategy in your enterprise.
Posted: 11 Oct 2016 | Published: 06 Oct 2016

vmware airwatch

Modern Mobility e-zine – October 2016
sponsored by SearchMobileComputing
EZINE: HTML5 mobile development is on the rise, but the latest version of this programming language is not the only tool in a mobile developer's toolkit. It's not even the biggest one.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

SearchMobileComputing

Online Team Collaboration: Reaching New Levels With an All-In-One Platform
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the combination of persistent group messaging, private one-on-one chat, voice telephony, and video conferencing in a single unified experience. Access now to learn how to communicate in real time and collaborate using sophisticated yet easy-to-use tools.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

Cisco Systems, Inc.

Next-Generation Networking Trends
sponsored by Optus
EGUIDE: In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory.
Posted: 20 Sep 2016 | Published: 13 Sep 2016

Optus

Modern Mobility e-zine – September 2016
sponsored by SearchMobileComputing
EZINE: Many companies are looking to the top enterprise software vendors for guidance when mobilizing their core business apps. Read on as experts explore how SAP, Oracle, IBM and Microsoft are making moves to help IT tailor essential software for smartphones and tablets.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

SearchMobileComputing

Focusing on Application Security is More Important than Ever
sponsored by Onapsis
EGUIDE: This e-guide explains how these threats can be eliminated by focusing security protocol on user-to-app interaction instead of a singular network perimeter. See how you can protect your information by enforcing network identification, maintain flexible security protocols to adapt to the continually changing attacks, and more.
Posted: 13 Sep 2016 | Published: 09 Sep 2016

Onapsis

The Rise of Cloud-Based Application Security Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide explores the vulnerabilities presented by mobile apps, and the steps security professionals can take to ensure those vulnerabilities are not exploited. Find out how you can improve your security practices by focusing on protecting mobile devices, discovering vulnerabilities without the aid of an HTTP(S) interface, and more.
Posted: 12 Sep 2016 | Published: 06 Sep 2016

Onapsis

Are You Complacent About Mobile Threats?
sponsored by Lookout
EGUIDE: In this expert guide, learn how a lackadaisical attitude towards mobile security can prove to be catastrophic to enterprises as mobile threats continue to exploit known vulnerabilities to gut profits.
Posted: 12 Sep 2016 | Published: 09 Sep 2016

Lookout
151 - 175 of 2020 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement