IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
176 - 200 of 2020 Matches Previous Page  | Next Page
Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Adaptive IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The CEB, a member-based advisory company, which represents major IT users, explains adaptive IT – a new model developed from feedback from CIO's worldwide – in this presentation.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Performance optimized 802.11ac/n Dual-Radio 3x3:3access point with internal antenna option
sponsored by Aerohive Networks
WHITE PAPER: This white paper details a network solution that was able to deliver rock solid connection even in the most high-density environments. Read on to learn more.
Posted: 16 Oct 2014 | Published: 16 Oct 2014

Aerohive Networks

Wired and Wireless Network Convergence Classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom examines the potential of using 802.11ac to replace your wired network.
Posted: 15 Oct 2014 | Premiered: 14 Oct 2014

SearchNetworking.com

Mobilizing Your Workforce
sponsored by 1e Inc
WHITE PAPER: Access this white paper to learn about the benefits of implementing a bring-your-own-PC (BYOPC) policy within your organization. Discover the security challenges of BYOPC, when to implement BYOPC, 5 steps to successful BYOPC, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

1e Inc

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software

Cloud-Managed Mobility Platform for Education
sponsored by Aerohive Networks
WHITE PAPER: This white paper outlines the major trends impacting the education sector surrounding mobile devices and modernised infrastructures.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

Retail Shopping Has Become More Personal, Relevant and Profitable
sponsored by Aerohive Networks
WHITE PAPER: This white paper reveals a strategy that defines a cloud-based approach to personalising the retail experience for every customer.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Aerohive Networks

European Channel MPS Priorities
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom examine MPS adoption amongst resellers in Europe, based on original Quocirca research, and discusses the challenges faced as they embark on their MPS journey.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Presentation Transcript: Delivering Shared Sessions, Apps, and Virtual Desktops from the Cloud
sponsored by VMware, Inc.
TRANSCRIPT: Transitioning to virtual desktops is proving to be beneficial for organizations who are trying to maintain the level of security and control while providing a great end-user experience. This transcript outlines how a leading product offers a great end-user experience, simplicity to get started, and providing security and control capabilities.
Posted: 08 Oct 2014 | Published: 29 Aug 2014

VMware, Inc.

Adopt Social Cloud Capabilities to Drive Rapid Innovation and Accelerate Time-to-Value for Your Business
sponsored by IBM
WEBCAST: Mobile and social technologies have led us to change the way we work not only by ourselves, but with others.  Adopting a social cloud early can provide rapid innovation for your business.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

IBM

Video: Enterprise Mobility: A New Way to Work
sponsored by Workday
VIDEO: View the following brief video to get a firsthand look at an all-inclusive solution to application mobility and how it can deliver the functionality and simplicity required in today's high-paced market.
Posted: 07 Oct 2014 | Premiered: 19 Jun 2013

Workday

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Vmware View Mobile Secure Desktop on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper examines the use of desktop virtualization as the answer to improving mobile support capabilities and evolving the workspace environment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VCE

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

How to securely deliver applications and files to mobile and BYOD devices
sponsored by NComputing
WHITE PAPER: Employees are changing the way they do business because of the increasing mobility of the workforce, causing them to utilize tablets. This white paper outlines how unified workspaces are all about simplicity, affordability and productivity. See how a leading vendor utilizes unified workspaces to enhance productivity for end users and IT.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

NComputing

How a unified workspace solution is built for hybrid environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

The Mobile First Approach to Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access the following informative white paper to examine the current state of mobile BI applications and gives insight into the technology and strategies needed to ensure your mobile BI projects run as smoothly and effectively as possible.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Information Builders

Enterprise Mobility Management Envelops Data as Well as Devices
sponsored by SearchConsumerization.com
EBOOK: IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices. Access this expert white paper for essential tips and tricks to mobile management in the modern world.
Posted: 03 Oct 2014 | Published: 03 Oct 2014


CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks
176 - 200 of 2020 Matches Previous Page    6 7 8 9 10 11    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement