IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
26 - 50 of 2024 Matches Previous Page  |  Next Page
Mobile Device Management for Windows Phone
sponsored by IBM MaaS360
DATA SHEET: If you are using Windows Phone at your business without the proper mobile device management, then you are missing out on the true benefits of workplace mobility. Access this data sheet that highlights one enterprise mobility management platform that provisions, manages and protects Windows Phone devices, apps and documents simply and efficiently.
Posted: 09 Aug 2016 | Published: 29 Feb 2016

IBM MaaS360

The Most Important Things You Need to Know About Enterprise Mobility Management
sponsored by IBM MaaS360
WEBCAST: Today, employees are using their devices to access corporate data and using company devices to access personal data. This usage presents new security risks that call for an integrated, comprehensive policy for managing mobile devices. View this webinar that discusses the mobile workplace and how to construct an effective and secure mobile policy.
Posted: 09 Aug 2016 | Premiered: Jun 30, 2016

IBM MaaS360

Mobilize SharePoint, Windows File Share, and Intranet for Robust Enterprise Collaboration
sponsored by IBM MaaS360
WHITE PAPER: Discover how you can unlock the potential of your enterprise systems and content. Explore the multifarious benefits of technology that enables simple, safe access to behind-the-firewall resources.
Posted: 09 Aug 2016 | Published: 29 Feb 2016

IBM MaaS360

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

Facing up to Mobile Security Challenges
sponsored by IBM MaaS360
WEBCAST: Expectations for mobile access to corporate data have never been greater. But, how do you enable your company with mobility and ensure security? View this webcast that details mobile security challenges and how to best prepare for them with a complete mobile strategy.
Posted: 09 Aug 2016 | Premiered: May 31, 2016

IBM MaaS360

The State of Support Services
sponsored by LogMeIn, Inc.
WHITE PAPER: Support service organizations must focus on support services transformation this year in 4 distinct areas to alleviate the pressure on executives and to ensure success. Access this white paper that details these 4 areas due for transformation and that highlights a tool that delivers on-demand remote support to users and devices anywhere, anytime.
Posted: 08 Aug 2016 | Published: 16 Aug 2016

LogMeIn, Inc.

Clientless Remote Support Software: A Key Service Desk Tool to Drive User Satisfaction and Productivity
sponsored by LogMeIn, Inc.
CASE STUDY: Discover how clientless remote software is changing the way two enterprises manage their devices to support end users in a holistic manner. Further, you'll see how security, features sets, and strong relationships underpin these tools.
Posted: 08 Aug 2016 | Published: 30 Oct 2015

LogMeIn, Inc.

Infographic: Top Use Cases for App Virtualization
sponsored by Citrix
WHITE PAPER: Finding FIPS compliant and Common Criteria certified app virtualization tools can help deliver end-to-end security and protection. Discover what else you can do with app virtualization to enable a secure, cost-effective, mobile, and simplified enterprise.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Citrix

Midmarket Enterprise Storage Array Buyers Guide
sponsored by Pure Storage
WHITE PAPER: This buyer's guide details the top ranking storage arrays from 10 storage providers. Access now to quickly compare their features and to find the storage solution that best suits your needs.
Posted: 08 Aug 2016 | Published: 08 Aug 2016

Pure Storage

The Move to Open Government Data
sponsored by Lenovo
PODCAST: In this podcast, Karin Geraghty, CIO for the Department of Environment, Water and Natural Resources at the Government of South Australia, discusses compliance, open data portals, the role of mobile devices in data collection, and more.
Posted: 08 Aug 2016 | Premiered: Aug 8, 2016

Lenovo

Managing Android devices in the enterprise
sponsored by ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 04 Aug 2016 | Published: 04 Aug 2016

ComputerWeekly.com

BYOD: Policy Formation and Enforcement
sponsored by IBM
EGUIDE: Once you decide to let your employees use their own mobile devices and PCs for work, it's essential that you employ a structured BYOD policy. Access this expert e-guide that details the issues to consider when implementing a BYOD policy and discover steps to enforce your policy after implementation.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Mobile App Delivery: Options to Consider and Potential Obstacles
sponsored by IBM
EGUIDE: Access this expert e-guide for four approaches to mobile app delivery that can provide the necessary oversight for mobile device users in the workplace. Also discover the potential obstacles related to deploying mobile apps.
Posted: 01 Aug 2016 | Published: 28 Jul 2016

IBM

BYOD: Keeping the Benefits While Staying Secure
sponsored by IBM
EGUIDE: In this e-guide, learn not only to maximize the benefits of BYOD for your enterprise, but also discover the how to mitigate the downsides and secure the traffic coming out of all these devices connecting to your network.
Posted: 29 Jul 2016 | Published: 28 Jul 2016

IBM

BYOD Security and Four Challenges to Consider Before Diving In
sponsored by IBM
EGUIDE: You've decided to allow BYOD, but you're concerned with data and device security. What should you do next? Access this expert guide that details the necessary steps to a trusted BYOD security policy and discover 4 BYOD challenges to consider before implementation.
Posted: 29 Jul 2016 | Published: 27 Jul 2016

IBM

The Advantages and Financial Obstacles of BYOD
sponsored by IBM
EGUIDE: Advantages such as cost savings and improved mobility will help BYOD become the norm in corporate end-user device provisioning. Access this expert e-guide for a look at the advantages of BYOD, plus the financial pros and cons of BYOD becoming a part of your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

BYOD: An Opportunity for IT Evolution and Business Advantage
sponsored by IBM
EGUIDE: Most IT departments are missing one of the main points of BYOD – that it allows for IT evolution. Access this expert e-guide for an explanation of how BYOD allows IT to reinvent itself and revolutionize how companies work. Read on to learn the main advantages BYOD offers, and why it will soon be the norm for your business.
Posted: 28 Jul 2016 | Published: 27 Jul 2016

IBM

APPLICATION DEVELOPMENT 101 Ch. 3: Building Apps That Meet Users' Needs
sponsored by SearchMobileComputing
EBOOK: Learn about successful mobile app development in this eBook chapter. All it takes is careful consideration of how users do their jobs and what they need in an app.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

SearchMobileComputing

Mobile Security: The Battle Beyond Malware, BYOD Security, and Conflicting Endpoint Management
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Combating the wrong enemy? Evolving threats and new attack surfaces demand your mobile security strategy keep pace. Discover three articles that break down mobile security into easily understandable fields including, mobile malware, BYOD security and endpoint management.
Posted: 27 Jul 2016 | Published: 21 Jul 2016

Check Point Software Technologies Ltd.

Enterprise Content Management Strategies for Integration, Access, and Control
sponsored by IBM
EGUIDE: Implementing the right ECM strategy can be difficult: it means striking the correct balance between accessibility, control, and data integration. In this e-guide, we explore the concept of ECM software integration, enabling you to share formerly siloed information. You'll learn how to optimize user access without sacrificing IT control.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

Cloud Enterprise Content Management: Streamlining Mobile Business Processes
sponsored by IBM
EGUIDE: Cloud-based ECM makes content available anywhere and anytime, a key feature in the era of proliferating mobile devices. But while identifying these benefits is one thing, actually implementing them is another. In this e-guide, we explore the challenges you face when adopting cloud ECM and the capabilities you can unlock like cloud file sharing.
Posted: 25 Jul 2016 | Published: 21 Jul 2016

IBM

VMware Workspace One Undercuts Other Management Approaches
sponsored by VMware
EGUIDE: The pricing of VMware Workspace One could have customers turning away from other management approaches. This e-guide takes a look at the pricing structure and feature capabilities of this Workspace platform and compares it to other approaches on the market.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

VMware

Significant Updates Accompany VMware Workspace ONE Announcement
sponsored by VMware
EGUIDE: With more people entering the age of the "digital workforce," companies are looking at ways to better enable their employees, giving them the flexibility, agility, and security to let them work wherever they choose. In this e-guide, learn how you can deliver digital workspaces with consumer simplicity and enterprise security.
Posted: 21 Jul 2016 | Published: 20 Jul 2016

VMware

What Will My Enterprise Mobile App Cost?
sponsored by Magenic
WHITE PAPER: Mobile app development is a complex undertaking where a myriad of decision points can impact cost; so unfortunately, there is no one simple formula for calculating a reliable estimate. However, this white paper explores 7 strategic perspectives that will help you factor in key cost considerations to safeguard your mobile app ROI.
Posted: 21 Jul 2016 | Published: 21 Jul 2016

Magenic
26 - 50 of 2024 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement