IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
26 - 50 of 2032 Matches Previous Page  |  Next Page
Seamless Mobile Engagement for Midsize Companies
sponsored by Avaya
WHITE PAPER: Access this white paper to learn how you can implement a comprehensive collaboration solution that delivers seamless experience for voice, video, and mobility.
Posted: 25 Jun 2015 | Published: 28 Nov 2014

Avaya

Technical Considerations for Mobility in the Enterprise
sponsored by Data#3
WHITE PAPER: In this white paper, you'll learn how to look beyond MDM and security to see other important mobile components like workspace services and workspace delivery.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Data#3

Anywhere Access to SAP Applications
sponsored by Citrix
WHITE PAPER: This white paper explores how to enable your workforce to universally access SAP applications while centralizing management for increased security.
Posted: 24 Jun 2015 | Published: 07 May 2014

Citrix

Benefits And Criteria For Selecting The Right SSL VPN Products
sponsored by Pulse Secure
EGUIDE: Access this eGuide to learn the 4 key criteria for choosing the right SSL VPN for your business needs, and the key security benefits they can give you.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pulse Secure

Managing Mobility Means Understanding EMM
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert guide introduces the six aspects of enterprise mobility management and describes how you can effectively implement each aspect.
Posted: 23 Jun 2015 | Published: 31 Dec 2014

Dell, Inc. and Intel®

Overcome Three of Today's Biggest End User Pain Points
sponsored by Dell and Microsoft
WHITE PAPER: This resource reveals 3 of the most critical IT challenges centered around end users today, providing tips on addressing these pain points without spending too much time or money doing so.
Posted: 23 Jun 2015 | Published: 22 Jun 2015

Dell and Microsoft

The 5 Questions Mobile Businesses Are Asking
sponsored by Lookout
WHITE PAPER: In this white paper, you'll discover the 5 key questions that are most concerning to the lack of visibility in a mobile business.
Posted: 23 Jun 2015 | Published: 23 Jun 2015

Lookout

To Build or to Buy? That is the Mobile App Question
sponsored by SearchConsumerization.com
EBOOK: This mobile application deployment handbook helps IT and business leaders evaluate their mobile app development and delivery options.
Posted: 22 Jun 2015 | Published: 22 Jun 2015


India & BYOD: In a Maturing Market, Employee Satisfaction Is The Top Priority
sponsored by Intel
WHITE PAPER: Access this white paper to discover in-depth research into the substantial commitment to BYOD and CYOD throughout the Indian business world.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Intel

BYOD Challenges that Lurk Beyond Network Security
sponsored by Dell, Inc. and Intel®
EGUIDE: In this expert guide, discover five BYOD challenges that go beyond security.
Posted: 22 Jun 2015 | Published: 22 Jun 2015

Dell, Inc. and Intel®

Where MDM Fits Into Your Enterprise Mobile Strategy
sponsored by Dell, Inc. and Intel®
EGUIDE: This expert e-guide examines the roles MDM, mobile application management (MAM), and enterprise mobility management (EMM) play for several devices and operating systems. Access this exclusive resource now to learn how to best use this technology to secure the enterprise.
Posted: 22 Jun 2015 | Published: 10 Jun 2015

Dell, Inc. and Intel®

Wireless Infrastructure Implementation: Best Practices
sponsored by Intel
WHITE PAPER: Access this white paper to discover best practices and best-known methods for architecting a wireless infrastructure within your organization. Follow these practices to help you quickly and efficiently replace wired LAN access services in your workspace with WLAN to provide employees with secure, reliable connections to mobile devices.
Posted: 19 Jun 2015 | Published: 28 Nov 2014

Intel

Computer Weekly – 23 June 2015: Navigating complex IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the complexity of legacy IT is a problem for most CIOs, but is it an inevitable consequence of using technology to keep the business simple? IT leaders share their experiences. Windows 10 is out soon – we look at what it means for enterprise IT. And we examine the Open Data Platform for Hadoop. Read the issue now.
Posted: 19 Jun 2015 | Published: 19 Jun 2015

ComputerWeekly.com

Four Key Trends Impacting Mobile Infrastructure Strategy
sponsored by IBM
WHITE PAPER: Access this white paper for an in-depth look at the key building blocks of a successful mobile enterprise infrastructure solution, as well as the major trends and challenges of deployment in the modern business world.
Posted: 19 Jun 2015 | Published: 29 Aug 2014

IBM

Management Tips for your Mobility Initiative
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this exclusive e-guide to discover the importance of investing in mobile infrastructure and learn the steps to take in order to secure a mobile infrastructure within your organization. Additionally, explore ways to keep your mobility initiative under control.
Posted: 19 Jun 2015 | Published: 19 Jun 2015

Dell, Inc. and Intel®

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

A Closer Look at the New Enterprise Mobile Technology Stack
sponsored by Dell, Inc. and Intel®
EGUIDE: Access this exclusive e-guide to take a look at the wide array of enterprise mobile technology available and find out how to choose the right products and services. Discover how these technologies can work together to push your organization toward mobility.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

Dell, Inc. and Intel®

An IT Survival Guide: Big Chaos in Small Packages
sponsored by Lenovo and Microsoft
EGUIDE: Access this essential guide to discover at-home risk factors and how they can be addressed. Learn the steps that you can take to help minimize the risk of loss or destruction when devices leave work.
Posted: 18 Jun 2015 | Published: 30 Apr 2015

Lenovo and Microsoft

An IT Survival Guide: Big Chaos in Small Packages
sponsored by Lenovo and Microsoft
EGUIDE: Access this essential guide to discover at-home risk factors and how they can be addressed. Learn the steps that you can take to help minimize the risk of loss or destruction when devices leave work.
Posted: 18 Jun 2015 | Published: 30 Apr 2015

Lenovo and Microsoft

IDC EMM Buyer Case Study: CommunityOne Bank
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn how CommunityOne Bank, a medium-sized financial institution, benefits from an EMM solution that provides secure mobile device management (MDM) and flexible service delivery.
Posted: 18 Jun 2015 | Published: 31 Mar 2015

Good Technology

Applying IT Service Management Best Practices To Mobile
sponsored by Good Technology
WHITE PAPER: Access this white paper to discover the keys to mobilizing your ITSM approach to ensure the success of your mobile business initiatives.
Posted: 18 Jun 2015 | Published: 30 Sep 2014

Good Technology

Top Considerations for Defining a Successful BYOD Strategy
sponsored by Good Technology
WHITE PAPER: Access this white paper to learn the 6 key tips that show you how to implement a BYOD strategy that can ultimately deliver the business benefits you're looking for.
Posted: 18 Jun 2015 | Published: 31 Jul 2014

Good Technology

Assessing Mobile Maturity and Developing a Solid IT Model
sponsored by Good Technology
RESOURCE: In this white paper, you'll discover Gartner research into the key aspects of mobile maturity. Read on and learn how you can best evaluate your position in the mobile business world and create an appropriate IT model.
Posted: 18 Jun 2015 | Published: 30 Jun 2014

Good Technology

Case Study: How the Seattle Seahawks Drove Record Sales at New Pro Shop in One Day
sponsored by Honeywell
CASE STUDY: Discover how your organization can reap the benefits of mobile sales technology to increase your customer satisfaction in this exclusive case study. Read now to learn more.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Honeywell

Making the Most Out of Your Mobile Information Governance Strategy
sponsored by Symantec Corporation
EGUIDE: In this e-guide, you'll uncover five important tips that will help you to steer your mobile information governance strategy in the best direction. Read now to learn how to make the most out of your BYOD and security policies to fit your company's needs.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation
26 - 50 of 2032 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement