IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
226 - 250 of 1930 Matches Previous Page  | Next Page
How to Migrate from BlackBerry Enterprise Server v4.0 or v5.0
sponsored by BlackBerry
WHITE PAPER: This guide explores the benefits of BlackBerry's Enterprise Service 10 and how that solution can be implemented for your organization.
Posted: 18 Jul 2014 | Published: 29 Jul 2014

BlackBerry

Future Focus: What's Coming in EMM
sponsored by BlackBerry
WHITE PAPER: Explore the role of enterprise mobility management in today's IT landscape.
Posted: 18 Jul 2014 | Published: 19 Aug 2014

BlackBerry

Your New EMM Platform: How to Streamline the Migration
sponsored by BlackBerry
WHITE PAPER: Learn why implementation is so critical when evaluating enterprise mobility management solutions.
Posted: 18 Jul 2014 | Published: 29 Jul 2014

BlackBerry

The Critical Role of Support in your Enterprise Mobility Management Strategy
sponsored by BlackBerry
WHITE PAPER: This whitepaper examines the importance of support in EMM strategies and outlines the factors to consider before selecting a support solution to reinforce long term business objectives.
Posted: 18 Jul 2014 | Published: 29 Jul 2014

BlackBerry

Maintaining Control Over Mobility and the Cloud
sponsored by SearchConsumerization.com
EBOOK: Before you devise a mobile device management strategy, conduct an enterprise mobility assessment to see what's already in use and what access and security controls are needed.
Posted: 17 Jul 2014 | Published: 17 Jul 2014


Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Enterprise Mobility Management The Big Bang Theory
sponsored by IBM
WHITE PAPER: This informative resource discusses what it takes to build a successful enterprise mobility management strategy, examining how IT can best identify and support the business drivers that demand mobility.
Posted: 17 Jul 2014 | Published: 17 Jul 2014

IBM

Three Enterprise Mobility Management  Options: MDM, MAM, and MIM
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: The key to successful enterprise mobility management involves managing devices, applications, and information. Learn how to combine all three into one effective strategy.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


MDM Plus MAM Tools Equals a One-Two Punch for BYOD
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MDM enables business usage of BYOD, but adding a mobile application management tool will help break new ground, and this lesson outlines the most effective way to incorporate them all into one cohesive strategy.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


The Pros and Cons of Mobile Application Management
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: MAM technologies come with challenges and are not always the perfect solution for every app and IT department. Learn how to weigh the pros and cons of MAM technologies and decide if it is right for your company.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


Mobile Application Management: What It Is and How It Works
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this webcast discover the difference between dual persona and app wrapping, two approaches using virtualization for MAM.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Acronis® access uniting content and the mobile device
sponsored by Acronis
WHITE PAPER: The following white paper explores the importance of having the right content management solution in place to enable access to the content that was typically reserved for conventional computing. Learn how by implementing the right solution, workers can instantly access, sync, and share content across all devices within the enterprise.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Acronis

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: Learn how organizations protect and manage access to their enterprise and cloud applications during the BYOD phenomenon.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


Global Sporting Event Proceeds Smoothly Thanks to Stable IT and Dell Support Services
sponsored by Dell, Inc.
CASE STUDY: Explore this brief case study to learn how a large, global sporting event was able to design and operate a highly stable IT infrastructure with support from Dell, and how this sporting event was successful with their implementation of a virtualized data center and a desktop, mobile, and cloud computing strategy.
Posted: 08 Jul 2014 | Published: 31 Mar 2014

Dell, Inc.

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

CW500 IN THE CITY - Jason Scott-Taggart
sponsored by ComputerWeekly.com
PRESENTATION: Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support mobility and flexible working.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

Wherever it Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Transforming mobility management through a unified approach
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this exclusive whitepaper to learn how you can consolidate your mobility management approach into one unified source. Discover a solution that offers flexible end-to-end management that allows you to control complexity, manage security and compliance, and overall enable your workforce to truly benefit from a BYOD strategy and policy.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Dell, Inc. and Intel®

Enabling devices and device management for your mobility/BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how to enable your workers to get the most out of a BYOD policy by increasing flexibility without compromising compliance. This small guide provides tips and best practices to address compliance and manage your mobile environment effectively.
Posted: 11 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware
226 - 250 of 1930 Matches Previous Page    8 9 10 11 12 13    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement