IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
176 - 200 of 1890 Matches Previous Page  |  Next Page
Beyond the Executive Suite: Video Conference Is Now Available To Virtually Everyone
sponsored by LifeSize
WHITE PAPER: This exclusive white paper takes a look at one executive suite that harnesses the power of video for all. Read on to learn more.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

LifeSize

Comprehensive Enterprise Mobile Management for iOS 8
sponsored by Citrix
WHITE PAPER: This exclusive white paper offers a comprehensive enterprise mobile management guide for iOS 8 devices. You'll also discover the key differences between iOS 7 and 8 in regards to mobile management. Read on to learn more.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Citrix

Infographic: Is Your Organization Ready to Enable a Mobile Workforce?
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource outlines the challenges of effective mobile management and takes a look at how desktop virtualization can help overcome these obstacles.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Cisco Systems, Inc.

Gartner Report: Best Practices for Choosing, Implementing and Using MDM and EMM
sponsored by Citrix
WHITE PAPER: This whitepaper looks at the best practices and provides a step-by-step approach for mobile and security specialists.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Citrix

ESG: Mobile Workspaces Deliver the Optimum User Experience While Enabling Mobility and Productivity
sponsored by Citrix
WHITE PAPER: This white paper offers a look at the momentum of mobility, as well as market trends and best practices for mobile workspaces. Read on to learn more.
Posted: 23 Oct 2014 | Published: 23 Oct 2014

Citrix

Optimize the Microsoft Lync 2013 user experience and improve return on investment
sponsored by Dell, Inc.
WHITE PAPER: This exclusive white paper addresses the opportunities and challenges of deploying UC&C, plus more.
Posted: 22 Oct 2014 | Published: 22 Oct 2014

Dell, Inc.

Augmented IVR – Second Life for Interactive Voice Response
sponsored by [24]7
WHITE PAPER: Find out how interactive voice response (IVR) and voice app infrastructures have brought both visual and voice resources into each customer's journey.
Posted: 22 Oct 2014 | Published: 30 Jun 2014

[24]7

Device Fingerprinting – Low-Friction, BYOD Authentication
sponsored by SecureAuth
WHITE PAPER: This white paper introduces SecureAuth's Device Fingerprinting, which features the flexibility, security, and convenience required to increase layers of authentication without creating high friction for users.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

SecureAuth

Getting to grips with BYOD
sponsored by ComputerWeekly.com
ANALYST REPORT: BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Adaptive IT
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The CEB, a member-based advisory company, which represents major IT users, explains adaptive IT – a new model developed from feedback from CIO's worldwide – in this presentation.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

ComputerWeekly.com

Wired and Wireless Network Convergence Classroom
sponsored by SearchNetworking.com
VIRTUAL ENVIRONMENT: This classroom examines the potential of using 802.11ac to replace your wired network.
Posted: 15 Oct 2014 | Premiered: 14 Oct 2014

SearchNetworking.com

Dell Higher Education Solutions Guide
sponsored by Dell, Inc. and Intel®
VIDEO: Accessing network data from remote locations anywhere is no longer a luxury, but an expectation. End-users expect to not only have the same experience from the network in a mobile setting, but also expect a fast and secure connection.
Posted: 14 Oct 2014 | Premiered: 22 Sep 2014

Dell, Inc. and Intel®

HIPAA Compliance and Data Security with BYOD
sponsored by BitGlass
WHITE PAPER: This white paper describes the push and pull between the productivity gains that BYOD offers modern healthcare organizations and the security and compliance risks that it presents. IT also explains how to devise a mobile security solution that will satisfy both IT departments and employees.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

BitGlass

European Channel MPS Priorities
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom examine MPS adoption amongst resellers in Europe, based on original Quocirca research, and discusses the challenges faced as they embark on their MPS journey.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Changing the Economics of Flash Storage
sponsored by Dell, Inc.
WHITE PAPER: Access this Q&A with Laura DuBois, program vice president of IDC's Storage research to learn more about use cases for flash storage.
Posted: 09 Oct 2014 | Published: 30 Nov 2013

Dell, Inc.

Vmware View Mobile Secure Desktop on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper examines the use of desktop virtualization as the answer to improving mobile support capabilities and evolving the workspace environment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VCE

Mobile Security Best Practices in a Healthcare Setting
sponsored by Insight
EGUIDE: This expert e-guide discusses 5 tips that you must consider when developing a mobile computing or healthcare BYOD strategy. Additionally, learn why device encryption, access control and third-party apps are common ways to manage and secure the smartphones and tablets used in a health care organization.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Insight

VDI Environments Addressing Mobile Devices in Healthcare
sponsored by RES Software
EGUIDE: In this expert e-guide, learn about desktop sharing, remote access, and one other key factor you should consider before implementing desktop virtualization. Additionally, learn how vendors are strengthening their virtual desktop infrastructure products to meet the demands imposed by healthcare applications.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

RES Software

Balancing wireless LAN troubleshooting strategies for BYOD
sponsored by Extreme Networks
EGUIDE: This expert E-Guide highlights the variety of tools available for proactive and responsive BYOD troubleshooting.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

Extreme Networks

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Presentation Transcript: Delivering Shared Sessions, Apps, and Virtual Desktops from the Cloud
sponsored by VMware, Inc.
TRANSCRIPT: Transitioning to virtual desktops is proving to be beneficial for organizations who are trying to maintain the level of security and control while providing a great end-user experience. This transcript outlines how a leading product offers a great end-user experience, simplicity to get started, and providing security and control capabilities.
Posted: 08 Oct 2014 | Published: 29 Aug 2014

VMware, Inc.

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

How to securely deliver applications and files to mobile and BYOD devices
sponsored by NComputing
WHITE PAPER: Employees are changing the way they do business because of the increasing mobility of the workforce, causing them to utilize tablets. This white paper outlines how unified workspaces are all about simplicity, affordability and productivity. See how a leading vendor utilizes unified workspaces to enhance productivity for end users and IT.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

NComputing
176 - 200 of 1890 Matches Previous Page    6 7 8 9 10 11    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement