IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
201 - 225 of 2018 Matches Previous Page  | Next Page
IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper will walk you through the four biggest trends affecting IT departments and how they manage end-user computing, and also offers the four best practices that will help you meet these challenges head on.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

VMware, Inc.

Mobile Business Intelligence 101: Proven Strategies and Use Cases
sponsored by Information Builders
WHITE PAPER: Access the following white paper to examine the growth of dependence for mobile BI and how it can offer either large competitive advantages or some serious headaches. Additionally, learn about the technology to consider and more.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Information Builders

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Enabling Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Aruba Networks

Leveraging VMware to Support Changing Workstyles
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper walks through the major trends affecting computing methods in the workplace and explains how Desktops-as-a-Service can help you securely deliver desktops and apps to end users through a unified workspace with little to no upfront capital costs.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

VMware, Inc.

Accelerating Mobile Development with PaaS, SaaS and IaaS
sponsored by IBM
EGUIDE: In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

IBM

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

IT Leaders Look Towards Implementing an Enterprise Mobility Strategy
sponsored by CA Technologies.
WHITE PAPER: The following survey detailed mobile information compiled from 1,300 senior IT decision makers from 21 different countries worldwide.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

CA Technologies.

Netsurit Moves 12,000 Devices to N-Able
sponsored by N-able Technologies
WHITE PAPER: This case study explains how one MSP was able to leverage the IT channel's #1 RMM and MSP professional services automation (PSA) platform.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

N-able Technologies

Breaking Geographical Barriers in Government with Desktop Virtualization
sponsored by Dell
WHITE PAPER: This whitepaper explains how desktop virtualization can help organizations – specifically government institutions - move application processing from a physical desktop to the data center in order to fulfill the “anywhere, anytime” demands of mobile employees.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

Dell

From MDM to Automation, CPI Charts Course for Managed Services Success with N-Able
sponsored by N-able Technologies
WHITE PAPER: This case study details how one organization was able to transition from a break-fix model to managed services by leveraging the IT channel's #1 RMM and MSP service automation platform.
Posted: 18 Sep 2014 | Published: 18 Sep 2014

N-able Technologies

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix

What's Next for Mobile Application Development
sponsored by IBM
EGUIDE: This expert e-guide offers best practices for building cost-effective mobile applications.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Jumpstart Your Mobile Application Development Project
sponsored by IBM
EGUIDE: This expert e-guide explores how to handle the explosive growth in the mobile application development landscape.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Everything You Need to Know about Enterprise Mobility Management
sponsored by CA Technologies.
EBOOK: Enterprise mobility management (EMM) strategies encompass several challenging problems for IT. From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.
Posted: 18 Sep 2014 | Published: 11 Sep 2014

CA Technologies.

A New Set of Network Security Challenges
sponsored by Icomm Technologies
WHITE PAPER: Today, workers demand access from devices beyond the firewall.  Smart phones, tablets, and laptops of all types.  However, the biggest challenge is finding a balance between productive and security.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Icomm Technologies
201 - 225 of 2018 Matches Previous Page    7 8 9 10 11 12    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement