IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
26 - 50 of 2055 Matches Previous Page  |  Next Page
Enterprise Mobility Management: Top considerations and challenges
sponsored by Microsoft
EGUIDE: Download this expert e-guide to take a look at the top 5 considerations for implementing an EMM strategy, and learn how to overcome challenges such as managing too many devices, BYOD, and lack of policies.
Posted: 27 Oct 2017 | Published: 23 Oct 2017

Microsoft

Crafting the most effective mobile strategy
sponsored by Microsoft
EGUIDE: In this expert e-guide you'll discover how to make the most of mobility in your organization. You'll discover how to assure mobile employee productivity, how mobile cloud computing infrastructures enable modern workers, and 4 ways to break through barriers to business mobility.
Posted: 27 Oct 2017 | Published: 23 Oct 2017

Microsoft

Explore the latest enterprise mobile security technology
sponsored by SearchMobileComputing
EBOOK: As cyber threats continue to evolve, mobile device management and mobile security tools need to evolve as well. This handbook offers a new approach to mobile security, which offers IT more granular control over data and devices, making it easier to weed out threats.
Posted: 25 Oct 2017 | Published: 26 Oct 2017

SearchMobileComputing

Möbius Partners Helps Sally Beauty Deploy Digital Workspace to Empower BYOD & Work Productivity
sponsored by Mobius Partners
VIDEO: Download this video to discover the VDI technology that Sally Beauty adopted to deploy digital workspaces to empower employees who bring their own devices (BYOD) and enhance productivity and security across the organization.
Posted: 24 Oct 2017 | Premiered: 17 Apr 2017

Mobius Partners

Marcher Marches On: The Anatomy of a Banker Malware
sponsored by Check Point Software Technologies Ltd.
RESOURCE: Inside, get a breakdown of the mobile banking malware known as Marcher. Learn how Marcher gets into mobile devices using flash phishing, what harm it can cause once inserted into your device, and more.
Posted: 20 Oct 2017 | Published: 28 Apr 2016

Check Point Software Technologies Ltd.

Learn How You can Simplify Mobile Security
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: This white paper outlines what one new mobile threat protection product "SandBlast Mobile" offers.
Posted: 19 Oct 2017 | Published: 13 Jul 2017

Check Point Software Technologies Ltd.

4 Ways to Ensure a Smooth Windows 10 Migration
sponsored by Citrix
RESOURCE: Download this resource to discover a workspace suite that can help enable a smooth Windows 10 transition with a 4-pronged approach to address challenges with app migration, managing Windows 10 desktops, managing all devices, and securing company data.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

Maximizing Your Workspace Investment with Office 365
sponsored by Citrix
WHITE PAPER: By downloading this white paper, you'll learn how to overcome Office 365 migration concerns—including secure app access and mobile policy controls—by using a desktop virtualization suite that will implement SSO to boost productivity, enact multi-factor authentication, and more. Access your copy here.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

VDI—Simplify your migration to Windows 10 and beyond
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to streamline OS migrations now and in the future with a virtualized infrastructure that simplifies BYOD, app compatibility and desktop management.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Citrix

How to Get the Most Value from an Office 365 Investment
sponsored by Citrix
RESOURCE: Download this infographic to learn in a nutshell how to achieve faster Office 365 migration, easier maintenance, and improved security with a desktop management suite that will also automate app compatibility tests, encrypt data in motion, and more.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Citrix

Desktop Virtualization: Reduce Costs, Improve Efficiencies with Proven VDI Solutions
sponsored by Citrix
WHITE PAPER: VDI addresses a number of common business challenges, which include enabling mobile workstyles without compromising security, streamlining desktop management efforts, and enhancing the end-user experience through self-service access to applications and desktops. Download this white paper to see how your organization stands to benefit.
Posted: 13 Oct 2017 | Published: 31 Dec 2015

Citrix

Mobile Malware in the UK
sponsored by Lookout
WHITE PAPER: The average malware infection on a mobile device costs £6,400. With the rise of employees using mobile devices for work, companies need to be aware of the high cost and vulnerability of malware attacks. This white paper offers a malware case study to help organizations fight back against mobile threats.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Lookout

Access e-zine: October 2017
sponsored by SearchEnterpriseDesktop
EZINE: Today's mobile application development tools focus on workflow and micro apps, which pare down business processes to present users with the key data they need.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

SearchEnterpriseDesktop

A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

CW ASEAN - October 2017: Juggling in the cloud
sponsored by ComputerWeekly.com
EZINE: In this month's issue of CW ASEAN, we take a look at what organisations need to do to overcome the complex task of pulling together a seamlessly integrated data management strategy.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

ComputerWeekly.com

File Sharing Service Eases IT Migration to Windows 10
sponsored by Citrix
WHITE PAPER: Download this white paper to discover a file sharing, storage and sync service that will support your mobile workforce's secure data storage and sharing needs for Windows 10 and beyond in terms of security, flexibility, productivity and Office 365 integration.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Citrix

Mobile Device Inventory: The First Step in Enterprise Mobile Management
sponsored by Snow Software
WHITE PAPER: Read on to examine the need for collecting and reporting on mobile inventory and how it needs to be part of an enterprise-wide software asset management (SAM) program. You'll discover a maturity path for managing mobile devices in a SAM context, and more inside.
Posted: 12 Oct 2017 | Published: 31 Dec 2016

Snow Software

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
PODCAST: 50% of CEOs expect their industries to be unrecognizably transformed by digital transformation. This podcast delves into how businesses are undergoing a massive digital shift due to the connected world of mobility and cloud. Uncover the top 5 security challenges organizations are facing.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

Mobile Application Development at the Speed of Business with Containers
sponsored by Red Hat
EBOOK: Discover how to use container and cloud technologies to build quality mobile apps quickly. Learn how to power your native and mobile app development initiatives with microservices, enterprise-grade containers, DevOps, APIs, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

Red Hat

Prove Yourself: Identity in a Mobile-Cloud World
sponsored by VMware
EBOOK: The reality of implementing a digital workplace is that authenticating users is going to become more difficult. Access this e-book to learn how to handle identity and access management in a world that revolves around mobility and the cloud.
Posted: 03 Oct 2017 | Published: 31 Jul 2017

VMware

The Human Factor in IT Security: How Employees Are Making Businesses Vulnerable from Within
sponsored by Kaspersky Lab
WHITE PAPER: 52% of businesses admit that employees are their biggest weakness in IT security, with their careless actions putting data and networks at risk. In this white paper gain insight into how to address the "human factor" dilemma and eliminate employee irresponsibility by following the right steps forward.
Posted: 03 Oct 2017 | Published: 03 Oct 2017

Kaspersky Lab

Comprehensive Mobile-Cloud Enterprise Security
sponsored by MobileIron
WHITE PAPER: Organizations need a comprehensive, unified platform designed from the ground up to secure mobile apps, devices, and cloud services. Download this white paper to discover a mobile-cloud security platform that can prevent data loss, enhance the UX, and simplify compliance reporting.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

MobileIron

Enterprise Mobility Trends to Watch in 2017: Q&A with Sumit Dhawan
sponsored by VMware
WHITE PAPER: Download this Q&A to find out how companies can turn problematic realities such as shadow IT and BYO trends, into real business value.  And, discover additional insights into key enterprise mobility trends to watch—and how to take action.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

VMware

6 Things That Will Accelerate Enterprise Mobility Security Adoption
sponsored by SyncDog
WHITE PAPER: According to a recent Gartner press release, 75% of mobile applications do not include basic security testing. Are you equipped to handle a massive cybersecurity breach from mobile device vulnerability? Security experts believe the marketplace isn't prepared.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

SyncDog
26 - 50 of 2055 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement