IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
26 - 50 of 1900 Matches Previous Page  |  Next Page
The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Desktops in the Mobile Age: Create a Mobile First Strategy
sponsored by VMware, Inc.
RESOURCE: In this resource, you will formulate a desktop management strategy that shifts critical business applications, operations, and processes to a mobile platform. Read on to evolve your business into a mobile-first enterprise and learn how to leverage the cloud for central management of apps and data.
Posted: 11 Jan 2016 | Published: 31 Oct 2014

VMware, Inc.

Choosing the Best Business Mobile Technology
sponsored by Magenic
WHITE PAPER: As business organizations continue to expand their mobile practices, finding a suitable mobile technology is vitally important. Access this whitepaper to see which of these tools should be used and when. Read on to see how mobile tools and vendors shape up.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

Magenic

Collaboration and Messaging Apps in the Enterprise
sponsored by Magnet
EGUIDE: In this expert e-guide, learn how new, real-time collaboration tools are driving greater productivity in the business, but more importantly, learn why CIOs should still keep an eye on the consumer messaging market.
Posted: 04 Jan 2016 | Published: 04 Jan 2016


Best Practices for Communication and Engagement in Healthcare
sponsored by 8x8, Inc.
EGUIDE: In this expert e-guide, discover how healthcare providers are overcoming the security risks imposed by today's electronic methods of communication – specifically telemedicine – in order to safeguard physician-patient communication.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

8x8, Inc.

Mobile Apps: Measure, Focus, Improve
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, learn why the "mobile moment" - that instant when users first determine their love or hatred for your mobile app - dictates the success of your application and ultimately your business. Discover facts that will help you tame the complexities of user experience measurements.
Posted: 29 Dec 2015 | Published: 29 Dec 2015

Hewlett Packard Enterprise

How Risky Mobile Apps Steal Data and Spy on Users
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores the dangers of malicious mobile apps and gives you advice on avoiding them. Discover what threats are lurking in your users' app stores and how you can keep those threats out of your network.
Posted: 28 Dec 2015 | Published: 28 Dec 2015

Proofpoint, Inc.

BYOD & the Cloud: Security Harmony
sponsored by NaviSite, Inc.
WHITE PAPER: This white paper examines how enterprise mobility management (EMM), desktop-as-a-service (DaaS), and a managed Office 365 implementation help address these challenges play a critical role in making BYOD a success. Discover how to enhance your BYOD strategy in this resourceful white paper.
Posted: 21 Dec 2015 | Published: 08 Dec 2015

NaviSite, Inc.

Global 2000 Company Secures Mobile Without Invading Privacy
sponsored by BitGlass
WHITE PAPER: This white paper examines how one global 2000 segements, tracks, and secure corporate data without sacrificing user privacy on their devices. Read on to learn how they guaranteed security and compliance without visibility into personal device activity.
Posted: 15 Dec 2015 | Published: 02 Dec 2015

BitGlass

Empowering User Collaborative Experiences with Voice and Video
sponsored by Polycom, Inc.
WHITE PAPER: This white paper surveys a host of voice and video collaboration solutions that will enable highly intuitive, secure, and scalable personal and group collaboration. Continue reading to learn how to drive interoperability in your organization.
Posted: 15 Dec 2015 | Published: 19 Aug 2015

Polycom, Inc.

Requirements for Selecting a Universal Enterprise App Store
sponsored by Flexera Software
WHITE PAPER: This white paper discusses the challenges in today's application delivery and how you can overcome them with an enterprise app store. Read on to explore key criteria that an enterprise app store must meet in order to resolve today's app delivery challenges.
Posted: 14 Dec 2015 | Published: 14 Dec 2015

Flexera Software

Mobile Worker Privacy Survey
sponsored by OptioLabs
WHITE PAPER: This survey report examines how mobile workers perceive the risks associated with using sensitive data in public places and how they go about mitigating those risks.
Posted: 10 Dec 2015 | Published: 31 Dec 2012

OptioLabs

Mobility Brings New Ways to Tackle IT Security Threats
sponsored by IBM
EGUIDE: This expert e-guide examines the security benefits of mobile app management (MAM), mobile content management (MCM), and identity and access management (IAM). View now to learn how these three mobile security approaches allow entitled access to the allocated resources while blocking malicious threats and users.
Posted: 09 Dec 2015 | Published: 02 Dec 2015

IBM

A Security Approach to Safeguard the Endpoint Explosion
sponsored by Fortinet, Inc.
VIDEO: 33 billion network connected devices are expected by 2020. Tune into this video to learn new ways to protect your organization against internal and external threats, and uncover a portfolio of strategies to ensure your network is protected.
Posted: 09 Dec 2015 | Premiered: 09 Dec 2015

Fortinet, Inc.

How Do You Anchor Mobile Network Optimization?
sponsored by Vodafone
EGUIDE: This expert e-Guide discusses how to build a successful mobile strategy that reflects your need to support users completing jobs on various devices from numerous locations.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Vodafone

Enterprise Mobile Security for Dummies
sponsored by Skycure
WEBCAST: In this webcast, you'll gain insight into the confusing and evolving mobile security landscape. View now to learn a step-by-step guide to achieve holistic mobile security and review a checklist for evaluating mobile security strategies.
Posted: 07 Dec 2015 | Premiered: Mar 19, 2015

Skycure

An Expert E-Guide on Workforce Mobility and the Boons of Mobile App Deployment
sponsored by Vodafone
EGUIDE: In this exclusive e-guide, you will learn the best strategies for mobile app deployment, and determine how to best boost productivity in your enterprise with mobile apps. Access this expert guide to regain secure control over your mobility.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Vodafone

Vendor Comparison: Selecting Collaboration Technologies
sponsored by Polycom, Inc.
WHITE PAPER: This white paper serves a guide in selecting the right unified communications technologies for your business, and outlines several conference room-ready sound stations and telephones to fit your organization.
Posted: 06 Dec 2015 | Published: 24 Apr 2015

Polycom, Inc.

How to Predict, Detect, and Protect Against Mobile Cyber Attacks
sponsored by Skycure
WEBCAST: This webcast explores the current enterprise mobility management (EMM) strategies available as well as the benefits of implementing active threat detection to stop malware attacks as they come into the enterprise. Download now to learn how to secure all endpoints within the organizational walls and beyond.
Posted: 04 Dec 2015 | Premiered: Oct 28, 2015

Skycure

Case study - Narita International Airport Improves Service with IBM Domino Mobile Apps
sponsored by IBM
CASE STUDY: In the following case study, learn how Narita International Airport – a major hub connecting 35 countries and 98 cities – was able to give their patrol agents access to information quickly and effectively on their mobile devices to ultimately drive faster customer response time and improve overall satisfaction.
Posted: 04 Dec 2015 | Published: 04 Dec 2015

IBM

The Four Horsemen of Mobile Security
sponsored by Skycure
WEBCAST: In this webcast, hear from security professionals as they explore today's mobile threat landscape and describe alternative security strategies.
Posted: 03 Dec 2015 | Premiered: Jun 25, 2015

Skycure

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Mobile Security – What Works and What Doesn’t?
sponsored by IBM
EGUIDE: Should your organization be more worried about mobile malware, or Wi-FI mast stations? Find out where the true mobile security dangers lie in this expert e-guide - as well as which defenses work to mitigate these threats.
Posted: 03 Dec 2015 | Published: 25 Nov 2015

IBM

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM
26 - 50 of 1900 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement