IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 1994 Matches Previous Page  |  Next Page
10 Common Pitfalls of Endpoint Backup
sponsored by Druva Software
WHITE PAPER: Access this white paper to learn about the top 10 pitfalls commonly seen in endpoint backup and how to avoid them.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Druva Software

Future of Work
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Move Forward with BYOD Security
sponsored by BitGlass
WHITE PAPER: This exclusive resource explains why mobility and BYOD can be held back by sub-optimal security strategies, and offers one that was able to deliver rock-solid security without affecting end-user privacy. Read on to learn more.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

BitGlass

PCI Data Security Compliance & BYOD
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile compliance, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

BYOD Security: Free Your Employees and Secure Your Data
sponsored by BitGlass
WHITE PAPER: This exclusive security report takes an in-depth look at BYOD and mobile security, offering a strategy that was able to deliver both IT's and end-user's expectations. Read on to learn more.
Posted: 03 Feb 2015 | Published: 03 Feb 2015

BitGlass

Simplifying the Management of Macs and Mobile Devices
sponsored by Centrify Corporation
WHITE PAPER: This exclusive whitepaper takes an in-depth look at simplifying the management of Macs and mobile devices. Read on to learn more and take the first step towards improved mobile device management.
Posted: 02 Feb 2015 | Published: 02 Feb 2015

Centrify Corporation

Design a Blueprint for Building a Mobile Workforce
sponsored by SearchConsumerization.com
EBOOK: Mobile devices can improve productivity, but IT and vendors are catching up with enterprise mobility management strategies and products that must balance access with security.
Posted: 02 Feb 2015 | Published: 02 Feb 2015


iDisrupted
sponsored by ComputerWeekly.com
BOOK: iDisrupted looks at how technology will change the economy, business and even the human race.
Posted: 02 Feb 2015 | Published: 05 Feb 2015

ComputerWeekly.com

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Embracing BYOD with Mobile Device Management
sponsored by IBM
WEBCAST: This exclusive webcast takes an in-depth look at how organizations are embracing BYOD corporate philosophy and how dynamic mobile device management can take your strategy to the next level. View now to learn more.
Posted: 30 Jan 2015 | Premiered: Jan 30, 2015

IBM

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by SearchConsumerization.com
EBOOK: Mobility is expected to lead to greater employee efficiency, but are enterprises properly encouraging mobile workers and measuring the effects of mobile apps on productivity?
Posted: 28 Jan 2015 | Published: 28 Jan 2015


Mobile Applications: How to Stay Ahead of the Game
sponsored by Hewlett-Packard Company
VIDEO: This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Hewlett-Packard Company

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Enterprise Mobility Management: The Big Bang Theory
sponsored by IBM
WHITE PAPER: This exclusive white paper takes and in-depth look at how enterprise mobility is expanding, and why device management will become key for organizations. Read on to learn more.
Posted: 23 Jan 2015 | Published: 23 Jan 2015

IBM

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

Key Insights & Recommended Actions from the IBV CHRO Study
sponsored by IBM
WEBCAST: Access this webcast, New Expecations for a New Era, to answer the question: How does HR empower the business to help boost sales, improve customer satisfaction and loyalty, and improve employee satisfaction?
Posted: 20 Jan 2015 | Premiered: Jan 20, 2015

IBM

Case Study: Implementing Mobile File Management for Secure Remote File Access
sponsored by Acronis
CASE STUDY: Employees want the convenience of working from a mobile device, and employers want to make sure their corporate data is secure. Read on to learn about Bedford Industries, who wanted to incorporate tablets into its business, but wanted to keep important files safe.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Acronis

Cloud Mobility: Improve Mobile Collaboration and Capabilities
sponsored by IBM
WHITE PAPER: The following white paper explores the growing need for the mobile workforce to be connected to the enterprise network at all times and offers insight into a SmartCloud solution that intends to deliver just that. Read on to learn about the key mobility capabilities, benefits, and more.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

IBM

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Computer Weekly – 20 January 2015: FT sold on cloud benefits
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further expansion to meet its data warehousing needs. And we examine the emerging market for mobile application services in the cloud. Read the issue now.
Posted: 19 Jan 2015 | Published: 16 Jan 2015

ComputerWeekly.com

Bring Your Own Device: Driving Workforce Productivity with Bring Your Own Device (BYOD)
sponsored by Acronis
WHITE PAPER: In today's mobile world, workers want to work from anywhere- not just in the office. Bring Your Own Device (BYOD) policies increase employee productivity, but can also pose security risks. This white paper details to deploy a BYOD program that keeps information on mobile devices secure.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Acronis

Enterprise Mobility: Employee Engagement Essentials
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive research study conducted by Cisco offers a look at how employees feel about enterprise mobility.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Cisco Systems, Inc.
151 - 175 of 1994 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement