IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
26 - 50 of 2008 Matches Previous Page  | Next Page
BYOD 101: Why BYOD is Changing the Business World
sponsored by Citrix
WHITE PAPER: This exclusive white paper examines the BYOD movement and why it makes perfect sense for business. Read on to learn more.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Citrix

Going mobile: The challenges of mobile app development for business
sponsored by Hewlett-Packard Limited
PODCAST: Listen to the following podcasts to hear from Editor in Chief at Computer Weekly, Bryan Glick as he discusses the current state of mobile applications for business including how these businesses are making better use of them, what challenges face mobile app development, and much more.
Posted: 13 Nov 2014 | Premiered: Jul 15, 2014

Hewlett-Packard Limited

Identify Data Backup Solutions for Today’s Challenges
sponsored by Dell Software
EGUIDE: In this e-guide, explore these modern challenges with independent backup expert Brian Posey. This primer will present challenges such as backing up virtual servers, protecting large volumes of data and backing up mobile devices. Learn what challenges you must be aware of to ensure your data backup strategy is thorough.
Posted: 13 Nov 2014 | Published: 13 Nov 2014

Dell Software

Going mobile: The challenges of mobile app development for business
sponsored by Hewlett-Packard Limited
WEBCAST: Tune into the following video to join Editor in Chief at Computer Weekly, Bryan Glick as he discusses the current state of mobile applications for business including how these businesses are making better use of them, what challenges face mobile app development, and much more.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

Hewlett-Packard Limited

Developing a Mobile Content Management Strategy that Improves Workforce and Business
sponsored by IBM
EGUIDE: Access the following solution spotlight to learn about the best tips on creating an effective mobile content management strategy from experts in the space, including Tom Wentworth, chief marketing officer for Ektron.
Posted: 12 Nov 2014 | Published: 12 Nov 2014

IBM

Mobile App Analytics
sponsored by CA Technologies.
VIDEO: View this video to discover a mobile analytics solution that provides details to the key questions about your mobile app that you're interested in regard to device, network, issue location, and affected users.
Posted: 11 Nov 2014 | Premiered: 06 Oct 2014

CA Technologies.

BYOD: A Complex Environment to Deploy Secure Solutions
sponsored by Gemalto
WHITE PAPER: This white paper gives an overview of a number of problems associated with mobile security, as well as several potential solutions. Read on to learn how to maximize security for mobile endpoints within your enterprise, and how to successfully implement these solutions in a rapidly changing mobile enterprise market.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

Gemalto

The Emergence of the Third-Generation Enterprise Mobile Platform
sponsored by Kidozen
WHITE PAPER: The following white paper explores the mobility shift within the enterprise and provides key considerations for mobile architect and developers to use to ensure that they can make the most out of the new mobility trend.
Posted: 11 Nov 2014 | Published: 11 Nov 2014


Mobilizing Business Data
sponsored by Kidozen
WHITE PAPER: The following white paper covers the emerging models and best practices for managing the enterprise data sources used by your enterprise mobile applications.
Posted: 11 Nov 2014 | Published: 11 Nov 2014


IBM CIO Office
sponsored by IBM
CASE STUDY: This exclusive case study takes an in-depth look at how one office was able to on-board 15,00 devices during the first day of deployment. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

The Developer’s Guide to Enabling the Mobile-First Enterprise
sponsored by Kidozen
WHITE PAPER: The following white paper examines the requisite infrastructure, essential middleware components, and best practices developers need to embrace to enable a mobile-first enterprise.
Posted: 11 Nov 2014 | Published: 11 Nov 2014


Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Effectively Managing BYOD in your Organization
sponsored by TechTarget
RESOURCE: Does your organization know how to improve efficiency and safe money through the use of employees using tablets and smartphones for work? Take our brief survey on mobile devices and in return you will gain immediate access to our eguide, Juggling management and benefits of BYOD in the enterprise & beyond.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Closing Security Gaps in Mobile Applications
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper takes an in-depth look at mobile security.  Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

CA Technologies.

EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

FrontRange Solutions Inc.

2014 Gartner Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: In this exclusive white paper, join Gartner analysts Kevin Knox and Terrence Cosgrove as they take an in-depth look at the client management tools market. They provide a vendor comparison, as well as strengths and weaknesses for leading vendors. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

IBM

Preparing K - 12 Education Infrastructure for Online Assessment: The Top Five Technology Priorities
sponsored by Insight
WHITE PAPER: This Center for Digital Education (CDE) paper points to the top 5 technology priorities school districts need to focus on for online assessment. This paper provides steps that budget-conscious and resource-limited districts can take to create a technology-enhanced environment while meeting standards for assessment.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Insight

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Enterprise Mobility & BYOD:Four Biggest Challenges—And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper reviews the 4 biggest challenges of enterpise mobility management and BYOD, and how to solve them. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

FrontRange Solutions Inc.

Four reasons to go beyond VMware Horizon with Citrix XenApp and XenDesktop
sponsored by Citrix
WHITE PAPER: Explore this white paper to compare two leading solutions for virtual desktops and applications. Discover four ways in how they measured up to each other.
Posted: 06 Nov 2014 | Published: 29 Aug 2014

Citrix

Enterprise Mobility: Enable Productivity without Sacrificing Protection
sponsored by Symantec
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and discusses why your organization should embrace it. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Symantec

5 Must Haves For EMM (Webcast)
sponsored by Symantec
WEBCAST: This exclusive webcast takes an in-depth look at understanding the enterprise mobility management (EMM) market and offers 5 must-haves for an EMM solution.  Read on to learn more.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Symantec

Expert Tips for a Successful BYOD Security Policy
sponsored by 1e Inc
EGUIDE: This exclusive e-guide offers an in-depth look at BYOD security policies and best practices. Read on to learn more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

1e Inc
26 - 50 of 2008 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement