IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
176 - 200 of 1949 Matches Previous Page  | Next Page
Enterprise Mobility & BYOD: Four Biggest Challenges— And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: Discover four key challenges associated with enterprise mobility and how to solve them usingthe most effective EMM solution.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

FrontRange Solutions Inc.

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER: This exclusive resource discusses an application delivery controller that is optimized for the intense new demands of today's network infrastructures, allowing your organization to provide workers with the resources they need.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Citrix

11 Best Practices for Mobily Device Management
sponsored by IBM
WHITE PAPER: This informative resource examines how to construct an effective MDM plan, outlining 11 best practices that can help guarantee success.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

IBM

Future Focus: What's Coming in EMM
sponsored by BlackBerry
WHITE PAPER: Explore the role of enterprise mobility management in today's IT landscape.
Posted: 18 Jul 2014 | Published: 19 Aug 2014

BlackBerry

Maintaining Control Over Mobility and the Cloud
sponsored by SearchConsumerization.com
EBOOK: Before you devise a mobile device management strategy, conduct an enterprise mobility assessment to see what's already in use and what access and security controls are needed.
Posted: 17 Jul 2014 | Published: 17 Jul 2014


Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Enterprise Mobility Management The Big Bang Theory
sponsored by IBM
WHITE PAPER: This informative resource discusses what it takes to build a successful enterprise mobility management strategy, examining how IT can best identify and support the business drivers that demand mobility.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Three Enterprise Mobility Management  Options: MDM, MAM, and MIM
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: The key to successful enterprise mobility management involves managing devices, applications, and information. Learn how to combine all three into one effective strategy.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


MDM Plus MAM Tools Equals a One-Two Punch for BYOD
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MDM enables business usage of BYOD, but adding a mobile application management tool will help break new ground, and this lesson outlines the most effective way to incorporate them all into one cohesive strategy.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


The Pros and Cons of Mobile Application Management
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MAM technologies come with challenges and are not always the perfect solution for every app and IT department. Learn how to weigh the pros and cons of MAM technologies and decide if it is right for your company.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


Mobile Application Management: What It Is and How It Works
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this webcast discover the difference between dual persona and app wrapping, two approaches using virtualization for MAM.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Acronis® access uniting content and the mobile device
sponsored by Acronis
WHITE PAPER: The following white paper explores the importance of having the right content management solution in place to enable access to the content that was typically reserved for conventional computing. Learn how by implementing the right solution, workers can instantly access, sync, and share content across all devices within the enterprise.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Acronis

Unisphere Research: SHARE and GUIDE SHARE EUROPE Mobile Computing Survey
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at the effects that today's mobile devices can have on a corporate IT environment, discussing common problems that you will run into and what your organization can do to easily overcome them.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

IBM

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Enterprise File Synchronization and Sharing
sponsored by Accellion, Inc.
WHITE PAPER: This white paper discusses the current maturation of the enterprise file synchronization and sharing (EFFS) market, which will benefit organizations looking for solutions to support their increasingly mobile workforce and support BYOD initiatives.
Posted: 11 Jul 2014 | Published: 02 Jul 2014

Accellion, Inc.

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


The Apple-ization of the Enterprise: Understanding IT’s New World
sponsored by Code42
WHITE PAPER: Access this white paper to learn about a new set of tools and applications that can help you keep your end-users happy while also satisfying the demands of senior management and auditors. It's time to stop fighting the "Apple-ization of the Enterprise" and start enjoying the benefits that this trend can deliver.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

Code42

The Promises and Pitfalls of BYOD
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.
Posted: 18 Jul 2014 | Published: 07 Feb 2014

Dell, Inc. and Intel®

Transforming mobility management through a unified approach
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this exclusive whitepaper to learn how you can consolidate your mobility management approach into one unified source. Discover a solution that offers flexible end-to-end management that allows you to control complexity, manage security and compliance, and overall enable your workforce to truly benefit from a BYOD strategy and policy.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Dell, Inc. and Intel®

Enabling devices and device management for your mobility/BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how to enable your workers to get the most out of a BYOD policy by increasing flexibility without compromising compliance. This small guide provides tips and best practices to address compliance and manage your mobile environment effectively.
Posted: 11 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware
176 - 200 of 1949 Matches Previous Page    6 7 8 9 10 11    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement