IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
151 - 175 of 2076 Matches Previous Page  |  Next Page
Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
WHITE PAPER: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Mobility Joins the 27 Club: Three Steps to Effective Enterprise Mobility, Cubed
sponsored by VMware, Inc.
EGUIDE: Expert-level mobility comes in threes. Uncover three essentials for an effective mobile app strategy, three steps to a successful mobile initiative, and three steps to better mobile data protection.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

EMM: Only One Ingredient in the Mobile Enablement Stew
sponsored by IBM
EBOOK: Enterprise mobility management (EMM), it isn't the end-all, be-all for mobility strategies. Every company starting a mobile initiative needs an extensive, tailor-made plan to meet its specific needs and goals. Access our expert e-book that explains how to construct an effective mobile strategy and where EMM comes into play.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM

Bringing Windows Apps to Mobile Devices
sponsored by Citrix
EGUIDE: Cloud-hosted desktops are a whole new ballgame when it comes to management, security, and licensing. But how does it compare to traditional VDI? This e-guide details how VDI and DaaS strategies differ and reveals how a partnership now allows organizations to deliver Windows virtual desktops from the cloud.
Posted: 15 Jun 2016 | Published: 14 Jun 2016

Citrix

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

6 Components of Mobility Management Software
sponsored by Microsoft
EGUIDE: As enterprise mobility increases in adoption, formal mobile policy management systems are fading from the scene. In this e-guide, mobile computing expert Craig Mathias simplifies the broad range of management capabilities available for you to enable both flexibility and security.
Posted: 14 Jun 2016 | Published: 09 Jun 2016

Microsoft

Embrace True Business Mobility
sponsored by vmware airwatch
WHITE PAPER: Enterprise leaders must adopt a cohesive, purpose-built strategy to empower mobile users. Explore ways to work seamlessly across unified desktops and mobile device platforms.
Posted: 13 Jun 2016 | Published: 06 Jun 2016

vmware airwatch

VDI – Simplify Your Migration to Windows® 10 and Beyond
sponsored by Citrix
WHITE PAPER: Find out how VDI can help you to streamline your Windows 10 migration and discover three critical questions to answer surrounding your migration to Windows 10.
Posted: 13 Jun 2016 | Published: 31 Dec 2015

Citrix

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Affordable Business Transformation: "Just Right" IT for SMBs
sponsored by HPE and Intel®
CASE STUDY: Examine several case studies which demonstrate how to facilitate successful digital transformation in your small to midsize business (SMB). Whether your organization is in the retail, construction, beverage, or energy industry, discover how to make the most of your investments by directing your efforts in 4 key areas.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

HPE and Intel®

A Unified View of the Enterprise Network for Proactive Security
sponsored by Fortinet, Inc.
WHITE PAPER: Trends in mobility and cloud-host enterprise applications are prompting enterprises to reconsider how they deploy enterprise networks. Find out how these trends are changing approaches to network management, the need for more unified, proactive security and the challenges this all presents.
Posted: 08 Jun 2016 | Published: 31 Mar 2016

Fortinet, Inc.

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 08 Jun 2016 | Published: 01 Jun 2016

Fortinet, Inc.

6 Critical Trends in Smart Healthcare Technology
sponsored by Avaya
RESOURCE: Discover the technological solutions to deliver better patient outcomes. From patient satisfaction to mobility to security, technology's role in healthcare is changing rapidly as costs go up and demands of an aging population skyrocket. Explore this infographic to learn the six major trends in smart healthcare you need to know now.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Avaya

The Digital Roadmap Demands a New Kind of ITSM Support
sponsored by ServiceNow
EGUIDE: The IT service management (ITSM) times truly are a' changing, and traditional ITSM tactics just don't cut it in today's digitally disrupted marketplace. Discover in this expert guide how to boost IT service delivery in today's digitally enabled marketplace, see how SABRE technology redefines ITSM support.
Posted: 22 Jun 2016 | Published: 20 Jun 2016

ServiceNow

IBM MaaS360 Mobile Application Management
sponsored by IBM MaaS360
RESOURCE: Enterprises need the power to distribute, manage and secure mobile apps critical to their business on both personal and corporate-owned devices. Read on to learn how to ensure that mobile applications do not put your organization at risk and continue to be a benefit.
Posted: 21 Jun 2016 | Published: 29 Jan 2016

IBM MaaS360

Easily Access Behind-the-Firewall Resources
sponsored by IBM
WHITE PAPER: Discover a solution to facilitate mobile collaboration with authorization, encryption, and containerization policies. Read on to find how it provides protected mobile access to corporate data without device VPN, uses in-app VPN tunnels to existing enterprise systems, protects sensitive corporate data with robust security policies, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM

Secure Browser for Mobile Enterprise Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover how to address and reduce vulnerabilities from risky websites with a mobile browser solution. Read on to find how it uses a centralized management platform to deploy protected access to intranet and internet sites, controls the mobile internet experience though granular security policies, prevents attacks and malware, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Protect and Distribute BYOD documents
sponsored by IBM MaaS360
WHITE PAPER: Discover a scalable solution to mobile document protection that provides a secure way for users to collaborate on smartphones and tablets. Read on to learn how it can protect corporate documents from data leaks with containerization, centrally manage document distribution, selectively wipe managed documents, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

Secure Enterprise Email on Mobile Devices
sponsored by IBM MaaS360
WHITE PAPER: Discover the key to securing and controlling enterprise emails on mobile devices in a BYOD environment. Uncover the value of separating personal and corporate data on phones and tablets, using a single sign-on for authentication, and more.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

IBM MaaS360

BYOD Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a management solution that can streamline access, compliance, and protection for BYOD from a single screen. Learn how to provision, protect and manage your devices easily; configure email, calendar, contacts, Wi-Fi and VPN profiles to quickly onboard users; set security policies and enforce them with automated compliance actions; and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

Mobile Threat Management
sponsored by IBM MaaS360
WHITE PAPER: Discover a viable solution to the catastrophic damages that can be caused by malicious code infecting 11.6 million+ mobile devices today. Read on to find how to safely support both BYOD and corporate-owned devices, proactively manage mobile threats in near real-time, reduce the risk of sensitive data leakage of vital information, and more.
Posted: 16 Jun 2016 | Published: 31 Dec 2015

IBM MaaS360

BYOD Cross-Platform Security: Protecting Enterprise Data
sponsored by IBM MaaS360
WHITE PAPER: In era of BYOD, enterprises are faced with the challenge of sensitive data leakage. Uncover the key benefits every solution needs to consider, such as reducing the risk of sensitive data leakage, use of single sign-on for authentication, enable online and offline compliance, and more.
Posted: 15 Jun 2016 | Published: 15 Jun 2016

IBM MaaS360

Modern Mobility e-zine – June 2016
sponsored by SearchMobileComputing
EZINE: Windows 10 has injected more life into the market for 2-in-1 devices, which offer plenty of benefits for both IT and end users.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

SearchMobileComputing
151 - 175 of 2076 Matches Previous Page    5 6 7 8 9 10    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement