IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
176 - 200 of 2029 Matches Previous Page  |  Next Page
How to Extract the Most Value from Your Mobile App Development Process
sponsored by OutSystems
EGUIDE: Over the next few years, mobile user experience is going to play a larger role in determining a business' success. Learn why user experience needs to stay a top priority at every stage of the app lifecycle and how to select the best mobile app development platform for your business needs.
Posted: 06 Jan 2017 | Published: 04 Jan 2017

OutSystems

Trends in Mobile User Authentication
sponsored by HID Global
EBRIEF: To keep pace with the escalation of mobile device use, IT departments need to explore new options that provide easy-to use yet highly secure authentication that works across all types of mobile devices. Access this resource to learn how to reduce multiple, complex passwords while enhancing safety and mobile security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

HID Global

Important Modern Trends in Digital Banking
sponsored by HID Global
EBRIEF: Learn the benefits of mobile banking, the significant threats that face its security, and what can be done to ensure its security such as multi-factor authentication, fraud protection and monitoring, device recognition software, and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

HID Global

Mobile application platforms: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: One of the mantras of modern enterprise application development is that business applications should be as easy to use as mass market consumer applications. Increasingly apps must be one step ahead of the user, pulling in context-specific information and providing a seamless user experience.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

ComputerWeekly.com

IT Project ANZ: Virtualisation
sponsored by ComputerWeekly.com
EGUIDE: Before cloud and big data began to dominate the IT headlines, virtualisation was all the rage in the enterprise space. While the focus may have shifted to these more fashionable technologies, virtualisation is once again gaining popularity, and the ANZ market is maturing faster than most.
Posted: 13 Nov 2016 | Published: 14 Nov 2016

ComputerWeekly.com

Mobilizing Care With Virtual Desktops
sponsored by SearchHealthIT.com
EBOOK: Desktop virtualization attracts clinicians and health IT professionals alike with time savings and technological streamlining. This exclusive handbook takes a look at three added issues about virtualization in healthcare settings – performance, caregiving, and hyper-convergence.
Posted: 08 Nov 2016 | Published: 28 Oct 2016

SearchHealthIT.com

Real Estate Development and Management Company Builds a Secure Mobile Foundation
sponsored by MobileIron
CASE STUDY: This case study details how a family-owned and operated real estate development and management company was able to use an advanced EMM platform to meet all of their critical mobility requirements, cut spending and more.
Posted: 08 Nov 2016 | Published: 30 Sep 2016

MobileIron

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Uncover an in-depth look into the modern threat landscape of mobile security, where it has come from and where it is going. Discover how new threats have emerged on the scene, what tactics they are using, and how to effectively counter them.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

MobileIron

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: To help IT Administrators understand how Android for Work will impact their organization, this white paper provides an overview of the new capabilities and recommendations for deploying and managing Android devices in the Enterprise.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Windows 10 with EMM: TCO Toolkit
sponsored by MobileIron
WHITE PAPER: Read this whitepaper to learn how using EMM to secure and manage your PCs can significantly reduce total cost of ownership by up to 80% across three key areas such as IT operations, helpdesk administration and licensing costs.
Posted: 02 Nov 2016 | Published: 30 Sep 2016

MobileIron

Support Top Talent By Implementing the Right Mobile Devices
sponsored by Lenovo
WHITE PAPER: This white paper highlights the key steps to a successful mobile workplace and mobile technology that can provide high performance, security and reliability.
Posted: 25 Oct 2016 | Published: 31 Aug 2016

Lenovo

How to Create a Happy, Connected Workforce
sponsored by Lenovo
EBOOK: Mobility is shaping the future workforce, and why not? Every employee gains a yearly average of 240 hours of productivity from mobile working. Access thie e-book to learn the 5 simple steps to create a connected workforce that is happy and productive.
Posted: 21 Oct 2016 | Published: 21 Oct 2016

Lenovo

Desktop Virtualisation: The Essential Guide
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

ComputerWeekly.com

Shifting IT from Cost Center to Innovation Center
sponsored by vmware airwatch
WEBCAST: Watch this webcast to explore how VMware IT is empowering users with IT-build internal apps and tools that have enhanced scalability. Discover how to make it simple for internal teams to rework existing technologies, create access to critical information across all your devices, and more.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Why AirWatch EMM is the Future of Mac Management
sponsored by vmware airwatch
WEBCAST: Watch this webinar to discover how the VMware AirWatch Mac Management platform for EMM enables IT departments to streamline device management.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

The Internet of Things: Make It Real in Your Enterprise
sponsored by vmware airwatch
WEBCAST: Learn how to help drive and enable IoT use cases in your organization, and how the convergence of EMM and IoT provides broader control and visibility over connected devices for smarter, real-time operational decisions.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

Leveraging Office 365 with VMware AirWatch®
sponsored by vmware airwatch
WEBCAST: As enterprises embrace adoption of Microsoft Office 365,  achieving a balance between security and user experience is often difficult. In this 60-minute webinar, discover how an enterprise mobility management tool easily integrates with both Office 365 and VMware Identity Manager to optimize user experience and ensure data security.
Posted: 16 Dec 2016 | Premiered: Jul 30, 2015

vmware airwatch

Ruggedized and Secure Mobile for Business Outcome-Focused Enterprise Retail Applications
sponsored by vmware airwatch
RESEARCH CONTENT: Explore this IDC white paper to find out why retailers are investing in the deployment of secure, ruggedized mobile devices as well as how paradigms like MDM play into their enterprise mobile strategies.
Posted: 16 Dec 2016 | Published: 30 Sep 2016

vmware airwatch

The 5 Next Big Things in Mobile Security
sponsored by vmware airwatch
WHITE PAPER: Security for mobile devices, applications, and content is a paramount concern in a mobility management strategy. This whitepaper covers the five next big trends in mobile security.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

Citrix ShareFile updates let businesses ditch paper processes
sponsored by Citrix
EGUIDE: Enterprise file sync-and-share (EFSS) platforms have seen widespread use in recent years. EFSS services have been optimizing features to help businesses more efficiently streamline workflows. In this e-guide learn about new features one platform has added and how they can help your organization digitize processes that are often paper-based.
Posted: 12 Dec 2016 | Published: 08 Dec 2016

Citrix

Seven features ECM systems need for a better experience
sponsored by Webinfinity
EGUIDE: Though many businesses have become more comfortable using enterprise content management (ECM) systems, there are still enhancements that can provide more value to your system. Discover 7 features that can improve your ECM system, including access on mobile devices, the ability to integrate with other systems, embedded BI analytics, and more.
Posted: 05 Dec 2016 | Published: 05 Dec 2016

Webinfinity

Dynamic Security Management for a Productive Mobile Workforce
sponsored by RES Software
WHITE PAPER: This white paper explores how to protect your business from advanced threats with a new approach to managing mobile security, identity and access management, and governance. Uncover key benefits that will increase IT's control and boost productivity, like app-level security against ransomware, secure onboarding, simplified compliance, and more.
Posted: 17 Nov 2016 | Published: 24 May 2016

RES Software

The SDN Charge and the New Role in Mobile Security
sponsored by Juniper Networks, Inc.
EGUIDE: Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.
Posted: 14 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.

Modern Mobility e-zine – November/December 2016
sponsored by SearchMobileComputing
EZINE: Pokémon Go brought augmented reality technology to the masses. Now, businesses can take advantage of AR to get more insight into users' activities and needs.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

SearchMobileComputing

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn
176 - 200 of 2029 Matches Previous Page    6 7 8 9 10 11    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement