IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 2032 Matches Previous Page  |  Next Page
Geospatial Analytics
sponsored by IBM
SOFTWARE DOWNLOAD: Discover how you can leverage real-time geospatial analytics to track when devices enter or leave defined regions with this trial software. Explore the capability of monitoring device locations in real time, and control region monitoring using geospatial ATI.
Posted: 01 May 2015 | Premiered: 18 Dec 2014

IBM

5 Traps to Avoid in your 2015 Mobile App Program
sponsored by Good Technology
WHITE PAPER: Access this white paper now to learn the 5 traps you absolutely must avoid if you want a successful mobile app program.
Posted: 01 May 2015 | Published: 30 Jan 2015

Good Technology

Mobile Trends for Mid-Market Organizations
sponsored by Good Technology
WHITE PAPER: In this white paper, you'll discover in-depth research into the mid-market mobility scene. Read more and see how you can take advantage of trends that your competitors may not be exploring or haven't perfected.
Posted: 30 Apr 2015 | Published: 29 Aug 2014

Good Technology

Protecting Healthcare Data in a Mobile World
sponsored by Absolute Software
WHITE PAPER: In this white paper, find essential information you need to build a comprehensive security system for today's healthcare climate.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

Absolute Software

Mitigating Legal and Business Risks of Cyber Breaches
sponsored by UnitedLex
WEBCAST: In this webcast, a panel of experts discusses real case studies illuminating how legal and IT can collaborate to mitigate the business and legal liabilities of a cyber-breach.
Posted: 30 Apr 2015 | Premiered: Apr 1, 2015

UnitedLex

Highlighting Trends in Mobility, App and Device Preference
sponsored by Good Technology
WHITE PAPER: Access this white paper now to discover all of the latest mobile trends and learn why security is quickly becoming the greatest concern for decision makers.
Posted: 30 Apr 2015 | Published: 27 Feb 2015

Good Technology

Taking Strategic Action for Mobile Endpoint Management
sponsored by Absolute Software
WHITE PAPER: In this white paper, find five steps to creating a proactive, comprehensive endpoint management strategy.
Posted: 30 Apr 2015 | Published: 25 Apr 2014

Absolute Software

Critical Capabilities for Mobile Application Development Platforms
sponsored by Kony
WHITE PAPER: Inside this Gartner report, you'll discover ratings of 11 different platforms based on 4 different use cases. Read on to see how each of these platforms performed and to choose the one that will be best for your enterprise.
Posted: 29 Apr 2015 | Published: 24 Dec 2014

Kony

College Gets Top-Class Software Management Tools
sponsored by Dell, Inc. and Intel®
CASE STUDY: Access this case study to find out how a higher education institution adopted an end-to-end system of technologies to ensure each laptop performed at their best and were free of unauthorized software.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Selecting a Mobile App Development Platform Solution
sponsored by Kony
WHITE PAPER: This decision matrix analyzes 12 different mobile application development platforms and identifies the leaders and challengers in the industry in 2015.
Posted: 29 Apr 2015 | Published: 16 Feb 2015

Kony

10 New Rules for Mobile Strategy and Success
sponsored by Kony
WHITE PAPER: In this white paper, discover ten essential tips for creating an innovative, impactful mobile strategy.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

Kony

Mobile Load Testing Challenges
sponsored by Neotys
WHITE PAPER: This white paper elaborates on the challenges of mobile load testing and gives suggestions for overcoming those challenges.
Posted: 29 Apr 2015 | Published: 31 Dec 2014

Neotys

Securing the Mobile Enterprise Environment
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to explore best practices for addressing security issues for the mobile enterprise environment, including those for establishing secure mobile access and mobile device security. Discover solutions designed to help your organization maintain tight network and mobile device security while still enhancing employee productivity.
Posted: 29 Apr 2015 | Published: 30 Sep 2014

Dell, Inc. and Intel®

Why a Secure Enterprise Workspace is the Best Approach for Mobile Productivity
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Inside this white paper, explore how a secure enterprise workspace can help to improve mobile productivity while meeting your organizations requirements for security, manageability, and configurability.
Posted: 28 Apr 2015 | Published: 27 Feb 2015

Dell, Inc. and Intel®

The Importance of BYOD Security
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide highlights BYOD security strategies that can help organizations enable a truly secure BYOD environment, especially through the use of VPN and strong BYOD management policies.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Enterprise Mobility Management: Mobile Security Is Here To Stay
sponsored by SHI International Corporation
WHITE PAPER: This expert eGuide explores how enterprise mobility management should be used as a means to deliver a secure BYODs experience through the use of defined security policies, richer management suites and greater integration to enable secure mobility.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

SHI International Corporation

Bring Your Own Device: Policy Considerations
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn everything you need to know when building a clear and concise policy document for your BYOD strategy.
Posted: 28 Apr 2015 | Published: 13 Jun 2014

Good Technology

The Secure Mobile Enterprise
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and Intel®

Choosing an EMM strategy
sponsored by BlackBerry
EGUIDE: In this expert guide, you'll learn the pros and cons of BYOD and COPE programs and discover one potential solution to your EMM woes.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

BlackBerry

The Benefits of Cloud Mobility Management
sponsored by BlackBerry
WEBCAST: In this webcast, discover how cloud EMM works and what benefits it provides.
Posted: 24 Apr 2015 | Premiered: Apr 9, 2015

BlackBerry

5 Steps to Building an Effective Enterprise Mobility Strategy
sponsored by Kony
WHITE PAPER: This guide outlines the 5 steps that enterprises need to take to keep up with the pace of mobile technology, stay competitive, exceed users' expectations, and achieve important business objectives.
Posted: 24 Apr 2015 | Published: 24 Apr 2015

Kony

Securing #GenMobile: Is Your Business Running the Risk?
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines a 5 step mobile security strategy to mitigating the risks created by #GenMobile. View now to learn how to adapt your data protection to prevent loss.
Posted: 23 Apr 2015 | Published: 25 Feb 2015

Aruba Networks

How to Enable Mobile Productivity with Limited IT Resources
sponsored by BlackBerry
WEBCAST: Access this webcast now to learn how you can enjoy affordable mobile device management capable of providing easy app deployment, shared network storage, and security you can trust.
Posted: 22 Apr 2015 | Premiered: Apr 22, 2015

BlackBerry

The Future of Enterprise Mobility Management
sponsored by BlackBerry
WEBCAST: Tune in to discover the results of the Forrester Wave: Enterprise Mobility Management Q3 report for even more insight into crafting an EMM strategy.
Posted: 22 Apr 2015 | Premiered: Feb 17, 2015

BlackBerry

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry
151 - 175 of 2032 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement