IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
201 - 225 of 2000 Matches Previous Page  |  Next Page
Future of Work
sponsored by ComputerWeekly.com
BOOK: In this extract from his book, The Future of Work, Jacob Morgan looks at the five key factors shaping the way we work.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

ComputerWeekly.com

Design a Blueprint for Building a Mobile Workforce
sponsored by SearchConsumerization.com
EBOOK: Mobile devices can improve productivity, but IT and vendors are catching up with enterprise mobility management strategies and products that must balance access with security.
Posted: 02 Feb 2015 | Published: 02 Feb 2015


iDisrupted
sponsored by ComputerWeekly.com
BOOK: iDisrupted looks at how technology will change the economy, business and even the human race.
Posted: 02 Feb 2015 | Published: 05 Feb 2015

ComputerWeekly.com

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 01 Feb 2015 | Published: 03 Mar 2014

Hewlett-Packard Company

Assuring Application Security: Deploying Code that Keeps Data Safe (Slashguide)
sponsored by Hewlett-Packard Company
WHITE PAPER: This SlashGuide discusses the evolution of malware attack surfaces, from endpoint to server to app; what to look for when sourcing or developing code; and which tests you should be performing now to keep malicious code out and enterprise data safe.
Posted: 01 Feb 2015 | Published: 18 Nov 2014

Hewlett-Packard Company

Embracing BYOD with Mobile Device Management
sponsored by IBM
WEBCAST: This exclusive webcast takes an in-depth look at how organizations are embracing BYOD corporate philosophy and how dynamic mobile device management can take your strategy to the next level. View now to learn more.
Posted: 30 Jan 2015 | Premiered: Jan 30, 2015

IBM

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by SearchConsumerization.com
EBOOK: Mobility is expected to lead to greater employee efficiency, but are enterprises properly encouraging mobile workers and measuring the effects of mobile apps on productivity?
Posted: 28 Jan 2015 | Published: 28 Jan 2015


Mobile Applications: How to Stay Ahead of the Game
sponsored by Hewlett-Packard Company
VIDEO: This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Hewlett-Packard Company

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

Key Insights & Recommended Actions from the IBV CHRO Study
sponsored by IBM
WEBCAST: Access this webcast, New Expecations for a New Era, to answer the question: How does HR empower the business to help boost sales, improve customer satisfaction and loyalty, and improve employee satisfaction?
Posted: 20 Jan 2015 | Premiered: Jan 20, 2015

IBM

Cloud Mobility: Improve Mobile Collaboration and Capabilities
sponsored by IBM
WHITE PAPER: The following white paper explores the growing need for the mobile workforce to be connected to the enterprise network at all times and offers insight into a SmartCloud solution that intends to deliver just that. Read on to learn about the key mobility capabilities, benefits, and more.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

IBM

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Making Your Enterprise Mobile Ready
sponsored by Accellion, Inc.
WHITE PAPER: Read this eBook to understand the needs and wants of a mobile workforce and the security policies and solutions enterprise IT should be considering.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

The Security Impact of Mobile Device Use by Employees
sponsored by Accellion, Inc.
WHITE PAPER: Read this report to learn about the behaviors that companies must address to prevent the misuse and abuse of their sensitive information and the recommendations to mitigate the risks created by these behaviors.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Accellion, Inc.

Mobile File Sharing Solutions: 7 Key Factors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the 7 key reasons why Accellion is selected over Dropbox to meet the need for a mobile, scalable, secure content management and sharing solution that extends enterprise security policies and controls to all devices.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

New Enterprise Imperative - Securing Mobile Content
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn the requirements for providing secure mobile access to ECM platforms and cloud storage services, and how to best enable mobile productivity for your work force
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Accellion, Inc.

The Aragon Research Globe for Mobile Content Management, 2014
sponsored by Accellion, Inc.
WHITE PAPER: A growing trend is the shift toward being able to manage mobile content as well as mobile devices and mobile apps. Managing critical content outside of repositories is what MCM is all about. Read the 2014 Aragon Research Globe Report for Mobile Content Management to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

Accellion, Inc.

Enterprise Mobility-as-a-Service
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Evolve Your UC Strategy with the Cloud
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper offers an in-depth look at the always-changing UC & C market and explains why UCC is something every organization should consider. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Building BI Dashboards: What to Do—and Not Do
sponsored by SearchBusinessAnalytics
EBOOK: Access this three-part expert guide to discover tips on how to plan and manage dashboard projects. Click through now to learn what goes into a good dashboard, design and project management mistakes, and explore the process of designing dashboards for mobile devices.
Posted: 12 Jan 2015 | Published: 07 Jan 2015

SearchBusinessAnalytics

2014 Connected World Technology Final Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive research study conducted by Cisco offers a look at how employees feel about enterprise mobility.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Cisco Systems, Inc.

Computer Weekly – 20 January 2015: FT sold on cloud benefits
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further expansion to meet its data warehousing needs. And we examine the emerging market for mobile application services in the cloud. Read the issue now.
Posted: 19 Jan 2015 | Published: 16 Jan 2015

ComputerWeekly.com
201 - 225 of 2000 Matches Previous Page    7 8 9 10 11 12    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement