IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
201 - 225 of 2023 Matches Previous Page  |  Next Page
Federal Agencies Have a BYOD Program, Like It or Not
sponsored by Lookout
RESEARCH CONTENT: Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

The Future of Enterprise Mobile Security: Predictions for 2016 and Beyond
sponsored by Lookout
WHITE PAPER: Understanding and successfully combatting security threats that mobility creates is paramount for continued protection of sensitive company and customer data. This white paper provides Lookout's mobile cybersecurity predictions for 2016 to 2019, so you can futureproof your enterprise.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

The Practical Guide to Enterprise Mobile Security
sponsored by Lookout
ESSENTIAL GUIDE: Access this white paper now to learn how IT admins can fulfill their dual (and evolving) role of both enabling end-user and device productivity while reducing risk through the adoption of modern-enterprise mobile security practices.
Posted: 31 Aug 2016 | Published: 31 May 2016

Lookout

Deliver High Quality Virtual Apps On Low Cost Devices
sponsored by Citrix
VIDEO: Virtual apps and desktops can deliver an exceptional user experience on low cost devices when deployed successfully. Watch this video that discusses how optimized virtual performance can be easily achieved by employing a secure, mobility solution.
Posted: 31 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Securely Access Business Apps and Data with BYOD
sponsored by Citrix
VIDEO: Discover how to give your employees secure mobile access to all your virtual applications anytime, anywhere, and meet IT security guidelines that allow workers remote access for secure end user computing.
Posted: 31 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Deliver Secure Applications to Boost Business Productivity on Mobile Devices
sponsored by Citrix
VIDEO: Tune into this video to discover how to enforce mobile business productivity with virtual application deployment that keeps apps and data secure in the data center. Watch now to assure your mobile workforce of a user-friendly experience with secure remote access, enterprise file sync and share, and more.
Posted: 30 Aug 2016 | Premiered: 16 Aug 2016

Citrix

Delivering Virtual Apps to Any Mobile Workspace
sponsored by Citrix
VIDEO: Learn how to deliver secure virtual applications and data to any corporate or personal device in your organization. Tune into this brief video to transform your employees' mobile workspaces to promote better productivity, and foster a new level of collaboration among your mobile and remote workers.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Five Signs It’s Time for Mobile Workspace Delivery
sponsored by Citrix
WHITE PAPER: Virtualization helped you address secure remote access and bring-your-own device (BYOD) initiatives while helping simplify IT. Learn the questions every IT organization needs to be asking about a mobile workspace strategy today.
Posted: 25 Aug 2016 | Published: 29 Jul 2016

Citrix

Mobile Security and Risk Review
sponsored by MobileIron
WHITE PAPER: Mobility is now a fact of life in every global enterprise, but mobile access is not without risk, and IT organizations can no longer afford to overlook these risks. Learn about emerging risks, uncover a list the top blacklisted consumer apps, and get tips on how to protect your assets against mobile risks and threats.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

MobileIron

CW Nordics August 2016
sponsored by ComputerWeekly.com
EBOOK: The Nordic countries are renowned for being home to thriving tech startup scenes so it is hardly surprising that IT is a disruptive force in the region.
Posted: 09 Aug 2016 | Published: 10 Aug 2016

ComputerWeekly.com

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 06 Sep 2016 | Published: 02 Sep 2016

Medfusion

Transforming User IT Support: Bringing Users and Resolution Closer Together
sponsored by IBM
WHITE PAPER: This white paper provides an in-depth look at the right-to-left strategy components designed to help IT leaders evaluate their support environments. Discover ways to demonstrate quantitative improvement in productivity and cost savings.
Posted: 02 Sep 2016 | Published: 31 Dec 2014

IBM

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
PODCAST: Explore the impact of mobile devices and cloud apps on your organization, both logistically and culturally. Expert Brian Posey will also explain what organizations need to do to modernize their mobile network infrastructure to support the transformation to the digital workplace.
Posted: 01 Sep 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

IBM Managed Mobility Services for Mac: Integrate and Manage Mac Devices Across Your Enterprise
sponsored by IBM
WHITE PAPER: Discover a streamlined method for delivering, setting up, configuring, supporting, and managing Mac devices in this white paper. Explore the benefits that IBM's managed mobility services offering can provide, including improved employee satisfaction and productivity, reduced risk to corporate data while enabling device preference, and more.
Posted: 01 Sep 2016 | Published: 29 Apr 2016

IBM

Improve Mobile Infrastructure with an Analytics Workshop
sponsored by IBM
WHITE PAPER: Proprietary analytics tools can help identify and clarify your mobile challenges. Uncover a workshop designed to put mobile business in motion with four steps, including data collection, analysis, and more.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

IBM

Mobile Devices, Cloud Apps, and the Digital Workplace
sponsored by Hewlett Packard Enterprise
WEBCAST: This webcast explores the impact of mobile devices and cloud apps have on your organization, your network, and the security pros charged with safeguarding it all. There will be a special emphasis on vertical industries such as retail and education, plus a deep dive into healthcare.
Posted: 26 Aug 2016 | Premiered: Aug 19, 2016

Hewlett Packard Enterprise

The Top Enterprise Mobility Management Suites Compared: An Expert Evaluation
sponsored by vmware airwatch
WHITE PAPER: In this exclusive Magic Quadrant report on enterprise mobility management suites, learn Gartner's take on the top 10+ vendors available. Inside uncover the strengths and cautions of each respected vendor and come out with a far better understanding of which systems can offer you the greatest return on investment.
Posted: 25 Aug 2016 | Published: 19 Aug 2016

vmware airwatch

Five Ways to Secure Mobile Data with EMM
sponsored by Hewlett Packard Enterprise
EGUIDE: For most organizations it's a matter of when, not if, their data will be attacked. But enterprise mobility management (EMM) tools can help keep mobile data secure. This e-guide details five ways to secure mobile data with EMM.
Posted: 22 Aug 2016 | Published: 19 Aug 2016

Hewlett Packard Enterprise

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Are you like many other who think enterprise mobility management (EMM) can be a centerpiece of your mobile enterprise security strategy? Find out why EMM alone is not enough.
Posted: 18 Aug 2016 | Published: 15 Aug 2016

Hewlett Packard - Intel Xeon

Three Essentials For An Effective Mobile App Strategy
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: Whether or not you think your organization will experience a large spike in mobile app demand, it's important that a mobile app strategy is in your future. This expert e-guide details three parts to every effective mobile app strategy.
Posted: 18 Aug 2016 | Published: 12 Aug 2016

Hewlett Packard - Intel Xeon

IT Needs to Change its Mindset Around Mobile Data Access
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.
Posted: 17 Aug 2016 | Published: 16 Aug 2016

Hewlett Packard - Intel Xeon

Radicati Enterprise Mobility Management Magic Quadrant 2016
sponsored by vmware airwatch
RESEARCH CONTENT: With a wealth of Enterprise Mobility Management (EMM) vendors out there, how do you choose the right one for your business? This report offers an in-depth view of vendors in the EMM market in the context of BYOD office employee use. Access now and discover evaluations of the leading vendors in this market.
Posted: 16 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

Five Essential Elements of Mobile Security
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

The 11 EMM Providers That Matter Most And How They Stack Up
sponsored by vmware airwatch
WHITE PAPER: Selecting the right partner for your enterprise mobile management (EMM) can be extremely difficult. An array of vendors exists that widely varies in both offerings and overall quality. Access this report that provides an evaluation of the 11 most significant EMM vendors (based on 25-criteria) to ensure you make the best decision.
Posted: 15 Aug 2016 | Published: 31 Dec 2015

vmware airwatch

Lifecycle Management Best Practices for Mobile Apps
sponsored by IBM
WHITE PAPER: This white paper explores the role of app security in mobile app lifecycle management. From design through deployment, learn about the proactive best practices that can simplify and strengthen the development process.
Posted: 11 Aug 2016 | Published: 31 Mar 2016

IBM
201 - 225 of 2023 Matches Previous Page    7 8 9 10 11 12    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement