IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
26 - 50 of 2033 Matches Previous Page  |  Next Page
Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: In "Unified Endpoint Management for Dummies" you'll learn what UEM means, and why it's so important to have in a modern mobile-enabled enterprise as well as the 5 core features of a UEM system, 10 emerging uEM trends, and more.
Posted: 02 May 2017 | Published: 02 May 2017

IBM

Mobile Vision 2020: The Impact of Mobility, IoT, and AI on the Future of Business Transformation
sponsored by IBM
ANALYST REPORT: Learn how to secure disparate mobile endpoints in this report, and also illustrated is how to move from a siloed mobile management approach to a more consolidated and cognitive one. See how unified endpoint management (UEM) delivers the device-agnostic mobile approach enterprises need, and more.
Posted: 02 May 2017 | Published: 31 Mar 2017

IBM

UNDER THE MICROSCOPE:THE ANATOMY OF MOBILE STRATEGY
sponsored by Lenovo
EBOOK: In this eBook, you'll learn how to balance the growing mobility needs of end users and the needs of IT. And, learn how to everything in your mobile ecosystem is interconnected and how to manage performance, security, flexibility connectivity and durability.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Build Strong Security, Starting From The Device-Level
sponsored by Lenovo
EGUIDE: In this eGuide, take a look at physical security threats to which every computer—whether desktop PC, laptop or tablet— is vulnerable, and discover how to guard against them.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Unified Management of Endpoints, End Users and Everything in Between
sponsored by IBM
RESOURCE: Discover how to relieve traditional MDM shortcomings with cloud-based unified endpoint management (UEM). Read on to alleviate the pains of securing a heterogeneous pool of endpoints by learning how to choose the right UEM tool, manage wearables and IoT, consolidate security views, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Boost Your Mobile ROI with Powerful Cognitive Insights
sponsored by IBM
DATA SHEET: In this data sheet, learn how you can strike a balance between security and productivity by leveraging this MaaS program. Discover how you can contextual security alerts by comparing them against industry benchmarks, use machine learning and data mining to get a vast and detailed view of your security architecture, and more.
Posted: 01 May 2017 | Published: 31 Mar 2017

IBM

A Buying Guide For Next-Gen Remote Access
sponsored by Citrix
WHITE PAPER: In this eBook, learn how next-gen SSL VPNs can meet the needs of BYOD, mobility and cloud applications.
Posted: 28 Apr 2017 | Published: 30 Dec 2016

Citrix

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: Given the importance of mobile computing in keeping businesses competitive, it's more important than ever that organizations strike the appropriate balance between security and productivity. Access this whitepaper to uncover how to act upon security best practices, score your business' security infrastructure and more.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

Enterprise Case Study: Enabling a More Mobile Way of Working
sponsored by Citrix
WHITE PAPER: By reading this resource, you'll learn how EMM bolsters organizations looking to embrace digital workspaces, and examine how Worldpay reduced IT infrastructure complexities and transformed the way their employees work with an enterprise mobility investment predicated on BYO support and remote flexibility.
Posted: 27 Apr 2017 | Published: 08 Dec 2016

Citrix

Desktop and App Virtualization Integration for Comprehensive Enterprise Mobility
sponsored by Citrix
WHITE PAPER: Learn how to integrate your app and desktop virtualization into a secure EMM solution—enabling IT to store endpoints in a centralized data center or cloud so they can be easily managed at all times. Read on to empower the workforce with anytime, anywhere access to Windows desktops and apps with 5 instructions for integration.
Posted: 27 Apr 2017 | Published: 28 Feb 2016

Citrix

A Secure Ultrabook Suited For Demanding Field Environments
sponsored by Lenovo
CASE STUDY: Download this case study to find out what devices offered lightweight portability, security, and productivity enhancing features to enable Becker Electric's field technicians to get their jobs done, regardless of environment.
Posted: 27 Apr 2017 | Published: 27 Apr 2017

Lenovo

The State of Cloud Analytics 2016
sponsored by INFORMATICA
WHITE PAPER: Now that 2016 is well in the books and we're more than a quarter into 2017, it's a good time to take a look at how cloud is changing the ways in which we work. This research report from the Enterprise Management Associates covers the state of cloud analytics from 2016, the changes and challenges we saw, and how to prepare for the future.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

INFORMATICA

The Digital Workspace: Strategies for the Future of Workplace IT
sponsored by Citrix
WHITE PAPER: By downloading this resource, you'll receive guidance on the key principles of digital workspace implementation, as well as market drivers, challenges, and employee experience to account for when reimagining desktop environments. Read on to capture the benefits of cloud-ready digital workspaces now.
Posted: 26 Apr 2017 | Published: 26 Apr 2017

Citrix

Three Ways Businesses Can Lose Money on Printing Everyday
sponsored by TechData - Brother
WHITE PAPER: Up to 90 percent of centralized printers and copiers in small to medium sized business are underutilized, which could be costing your organization money. Download this infographic for 6 tips on how to optimize your output environment.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

TechData - Brother

Potential Vulnerabilities of Mobile Devices & Printing: Infographic
sponsored by TechData - Brother
WHITE PAPER: 70 percent of mid-market companies are concerned about securing documents on mobile devices. Yet, 40 percent do not authenticate at printing devices and 36 percent do not encrypt print jobs from mobile devices. Download this infographic to see why anytime, anywhere mobile workforce printing needs all the time, everywhere security.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

TechData - Brother

CS Permira
sponsored by Wandera
CASE STUDY: In this case study, find out how the use of data compression enabled a MLS team to reduce roaming data usage by 31% and allowed them to add additional devices to their data pools with no additional data usage or cost.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

Wandera

CS Whitecaps
sponsored by Wandera
CASE STUDY: In this case study, find out how the use of data compression enabled a MLS team to reduce roaming data usage by 31% and allowed them to add additional devices to their data pools with no additional data usage or cost.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

Wandera

Customer Experience Leader DirecTV Modernizes to Maintain Their Lead
sponsored by Capriza
CASE STUDY: In this concise case study, learn how DirecTV decided on a mobile app that streamlined processes by enabling real time box activation.
Posted: 20 Apr 2017 | Published: 30 Dec 2016

Capriza

Workforce Technology: Helping Employees Be More Effective Through Business and IT Compromise
sponsored by Dell EMC - CSG & DT
VIDEO: Business leaders are demanding more flexibility in workforce technology -- if only IT would not deny their requests for nonstandard applications and devices. Watch this 3-minute video to learn more.
Posted: 19 Apr 2017 | Premiered: 07 Apr 2017

Dell EMC - CSG & DT

Enterprise-Class Mobile Printing
sponsored by TechData - Lexmark
WHITE PAPER: As mobile devices become more powerful and prevalent across the business landscape, mobile printing has also grown. Your employees need the same level of printing experience and quality that they would get from a PC on their mobile device. Access this white paper to learn how to enable enterprise-class printing from any device.
Posted: 18 Apr 2017 | Published: 30 Dec 2016


Pediatric hospital aims to improve patient care with interactive scheduling
sponsored by TechData - Microsoft
CASE STUDY: Mobile devices are becoming increasingly valuable to in the healthcare services industry. In this case study, discover the impact of mobile collaboration has had on one hospital and what common benefits your organization stands to realize.
Posted: 18 Apr 2017 | Published: 31 Mar 2016

TechData - Microsoft

7 Factors Driving Proper Encryption Management
sponsored by WinMagic
RESOURCE: Learn 7 key factors in encryption management that are driving ingenuity, bolstering native encryption, unifying management and transforming security.
Posted: 17 Apr 2017 | Published: 17 Apr 2017

WinMagic

Array Networks Secure Cloud Access Case Study: Hitachi Federated Cloud
sponsored by Array Networks
CASE STUDY: If you are an IaaS provider or an MSP, download this case study to discover the technology that Hitachi Ltd implemented in order to maintain secure, scalable and extensible remote access as a service, extend the technology beyond administrative access to new applications, and more.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Array Networks Secure Remote Access Case Study: City of Santa Barbara
sponsored by Array Networks
CASE STUDY: The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks
26 - 50 of 2033 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement