IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
226 - 250 of 2074 Matches Previous Page  |  Next Page
Mobile Goes Back to the Future With SOA
sponsored by SearchSOA.com
EBOOK: SOA principles remain relevant, even in the mobile world.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

SearchSOA.com

The State of Enterprise Mobile Threats
sponsored by Lookout
WHITE PAPER: Access this white paper to learn everything you need to know about the current state of mobile security threats for both iOS and Android.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Lookout

Anywhere Access to SAP Applications
sponsored by Citrix
WHITE PAPER: This white paper explores how to enable your workforce to universally access SAP applications while centralizing management for increased security.
Posted: 24 Jun 2015 | Published: 07 May 2014

Citrix

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

Computer Weekly – 23 June 2015: Navigating complex IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the complexity of legacy IT is a problem for most CIOs, but is it an inevitable consequence of using technology to keep the business simple? IT leaders share their experiences. Windows 10 is out soon – we look at what it means for enterprise IT. And we examine the Open Data Platform for Hadoop. Read the issue now.
Posted: 19 Jun 2015 | Published: 18 May 2015

ComputerWeekly.com

How to Create a Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores how a secure mobile enterprise increases productivity and collaboration while opening the doors to business transformation, competitive advantage and improved performance.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

Do Mobile Enterprise Services Increase BYOD Initiatives' Chances of Success?
sponsored by IBM
RESEARCH CONTENT: This Forrester research report explores the impact of a leading company's mobile enterprise services on the success of BYOD initiatives in two large organizations.
Posted: 17 Jun 2015 | Published: 31 May 2013

IBM

Authentication Strategy: Balancing Security and Convenience
sponsored by CA Technologies.
WHITE PAPER: This white paper explores advanced authentication methods to mitigate new and emerging threats.
Posted: 12 Jun 2015 | Published: 04 Dec 2014

CA Technologies.

How to Protect Data from Ransomware and Defend Against the Digital Invasion
sponsored by Malwarebytes Corporation
EGUIDE: This e-guide can help you stay ahead of new cyber-threat developments by telling you all you need to know about ransomware, new digital threats, and more.
Posted: 12 Jun 2015 | Published: 12 Jun 2015


Case Study: How Varian Medical Systems Employees Became More Productive with Mobile Solutions
sponsored by MobileIron
WHITE PAPER: In this white paper, you'll learn how Varian Medical Systems made its employees more productive with mobile devices while staying in control of devices and applications.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

MobileIron

Modern Mobility E-Zine – June 2015
sponsored by SearchMobileComputing
EZINE: Mobility is a whole new animal when it comes to security, and IT shops need to change their methods from the desktop age. Learn how security methods have evolved with mobility.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

SearchMobileComputing

Study: How to make mobile successful within the organisation – what every CEO needs to know
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Matrix42

How Windows Server stacks up in a changing IT landscape
sponsored by Dell and Microsoft
EGUIDE: Access this e-guide to explore the role of Active Directory, how Microsoft is moving into mobile device management, and how the cloud is changing the IT landscape now and for the future.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Dell and Microsoft

Untangling Work and Personal Data with Enterprise MAM
sponsored by SearchMobileComputing
EBOOK: This exclusive three-part guide explains how and why IT should use MAM to control applications from start to finish. Read on here to see how your business can securely enable successful enterprise mobility, and get an inside look at an MAM comparison: app wrapping versus containerization.
Posted: 01 Jun 2015 | Published: 01 Jun 2015

SearchMobileComputing

How to Securely Integrate Mobility into Your Organization
sponsored by Accelerite
EGUIDE: In this expert guide, Brian Katz offers advice to help businesses choose the right vendor to meet their needs. As a bonus, you'll learn how wearables will start to affect the business world, and what to do about it.
Posted: 29 May 2015 | Published: 29 May 2015

Accelerite

Securing the Mobile-First Experience
sponsored by HID
RESOURCE: This brief infographic outlines the current mobile security challenges landscape and today's popular defense strategies being implemented. Access now to explore the benefits of several new and alternative approaches.
Posted: 26 May 2015 | Published: 01 Apr 2015

HID

Workspace Aggregators: Easily Manage Apps, End Users
sponsored by Matrix42
WHITE PAPER: Access this white paper to find out how workspace aggregators can help your IT department easily manage enterprise apps while improving costs, boosting productivity, and minimizing complexity.
Posted: 26 May 2015 | Published: 26 May 2015

Matrix42

Unify Your Network for a Mobile Enterprise
sponsored by Alcatel-Lucent Enterprise
WHITE PAPER: Access this white paper to discover how you can overcome the network challenges associated with the BYOD and mobility movements.
Posted: 22 May 2015 | Published: 30 Aug 2013

Alcatel-Lucent Enterprise

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

Security and Unlocking the Value of the Mobile Workforce
sponsored by EE
WHITE PAPER: In this white paper, explore the benefits and challenges of mobile computing and why MDM needs to transition to enterprise mobility management (EMM) to secure apps and content. Continue reading to learn more.
Posted: 19 May 2015 | Published: 18 Mar 2015

EE

How to Secure the Enterprise With Threat Intelligence and Protection Software
sponsored by AVG Technologies
EGUIDE: This expert guide can help you stay secure in today's threat landscape by helping you build a strong, layered security system that includes threat intelligence and multiple forms of endpoint protection.
Posted: 19 May 2015 | Published: 19 May 2015

AVG Technologies

As Enterprise Mobility Usage Escalates, So Does Security Risk
sponsored by HID
WHITE PAPER: In this expert white paper, examine how to tame the mobile security beast through two-factor authentication and single-sign-on approaches. Continue reading to learn how other organizations are bringing harmony to the UX vs. IT security debate and other steps you can take to protect data and apps.
Posted: 18 May 2015 | Published: 08 May 2015

HID

Android for Work: Top 8 Security Considerations Every CISO Should Know
sponsored by MobileIron
WHITE PAPER: Access this white paper to learn how Android for Work and the Lollipop, the latest version of the Android OS, are cleaning up your most feared security concerns.
Posted: 14 May 2015 | Published: 14 May 2015

MobileIron

What Android for Work Means for the Enterprise
sponsored by MobileIron
WHITE PAPER: Access this white paper now to learn why the latest version of Android and the new Android for Work program can simplify your mobile management efforts.
Posted: 13 May 2015 | Published: 13 May 2015

MobileIron

How MSPs Can Stay Relevant in the Era of Cloud Computing
sponsored by AVG Technologies
WHITE PAPER: Read this white paper to discover the five services an MSP can provide to keep itself relevant in the face of changing IT needs.
Posted: 13 May 2015 | Published: 13 May 2015

AVG Technologies
226 - 250 of 2074 Matches Previous Page    8 9 10 11 12 13    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement