IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
26 - 50 of 1800 Matches Previous Page  | Next Page
Mobile Application Management: What It Is and How It Works
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this webcast discover the difference between dual persona and app wrapping, two approaches using virtualization for MAM.
Posted: 16 Jul 2014 | Premiered: 16 Jul 2014


The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Acronis® access uniting content and the mobile device
sponsored by Acronis
WHITE PAPER: The following white paper explores the importance of having the right content management solution in place to enable access to the content that was typically reserved for conventional computing. Learn how by implementing the right solution, workers can instantly access, sync, and share content across all devices within the enterprise.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

Acronis

Unisphere Research: SHARE and GUIDE SHARE EUROPE Mobile Computing Survey
sponsored by IBM
WHITE PAPER: This exclusive white paper takes an in-depth look at the effects that today's mobile devices can have on a corporate IT environment, discussing common problems that you will run into and what your organization can do to easily overcome them.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

IBM

Computer Weekly – 15 July 2014: Time for an upgrade? Why you should buy IT now
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as competitive pressures and new technologies drive down IT prices, we find out why now is a great time to buy IT. We examine why going digital means a different approach to IT management. And we hear the latest best practices for improving your customer engagement with IT. Read the issue now.
Posted: 14 Jul 2014 | Published: 14 Jul 2014

ComputerWeekly.com

Transforming mobility management through a unified approach
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this exclusive whitepaper to learn how you can consolidate your mobility management approach into one unified source. Discover a solution that offers flexible end-to-end management that allows you to control complexity, manage security and compliance, and overall enable your workforce to truly benefit from a BYOD strategy and policy.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Dell, Inc. and Intel®

Enabling devices and device management for your mobility/BYOD program
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how to enable your workers to get the most out of a BYOD policy by increasing flexibility without compromising compliance. This small guide provides tips and best practices to address compliance and manage your mobile environment effectively.
Posted: 11 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
sponsored by HID
WHITE PAPER: In this white paper, explore how one authentication solution allows organizations to establish trust in their user identities when utilizing mobile device access.
Posted: 11 Jul 2014 | Published: 28 Mar 2014

HID

Enterprise File Synchronization and Sharing
sponsored by Accellion, Inc.
WHITE PAPER: This white paper discusses the current maturation of the enterprise file synchronization and sharing (EFFS) market, which will benefit organizations looking for solutions to support their increasingly mobile workforce and support BYOD initiatives.
Posted: 11 Jul 2014 | Published: 02 Jul 2014

Accellion, Inc.

Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Buyer's Checklist: Mobile Application Platforms
sponsored by IBM
WHITE PAPER: View this buyer's guide to mobile application platforms, so you can be prepared with the right technology to develop, deploy, test, and manage mobile applications for your enterprise users. Use this checklist to compare key capabilities against one leading platform against others of your choosing.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

IBM

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


The Apple-ization of the Enterprise: Understanding IT’s New World
sponsored by Code42
WHITE PAPER: Access this white paper to learn about a new set of tools and applications that can help you keep your end-users happy while also satisfying the demands of senior management and auditors. It's time to stop fighting the "Apple-ization of the Enterprise" and start enjoying the benefits that this trend can deliver.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

Code42

Global Sporting Event Proceeds Smoothly Thanks to Stable IT and Dell Support Services
sponsored by Dell, Inc.
CASE STUDY: Explore this brief case study to learn how a large, global sporting event was able to design and operate a highly stable IT infrastructure with support from Dell, and how this sporting event was successful with their implementation of a virtualized data center and a desktop, mobile, and cloud computing strategy.
Posted: 08 Jul 2014 | Published: 31 Mar 2014

Dell, Inc.

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Business Applications and Tablet Adoption: A Survey of IT Professionals at Small and Mid-Sized Organizations
sponsored by NComputing
WHITE PAPER: This exclusive survey takes an in-depth look at the current trends a challenges that small and mid-sized businesses face when adopting tablets into the enterprise, discussing best practices, how to overcome common issues, and much more.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

NComputing

Tablets in the Enterprise: A Checklist for Successful Deployment
sponsored by Code42
WHITE PAPER: This white paper provides the 7 steps organizations need to take in order to ensure that the data that is being stored on their tablets remains properly stored and protected.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

CW500 IN THE CITY - Jason Scott-Taggart
sponsored by ComputerWeekly.com
PRESENTATION: Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support mobility and flexible working.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET: This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Mobile Application Security Survey Results
sponsored by Veracode, Inc.
WHITE PAPER: In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.
Posted: 07 Jul 2014 | Published: 30 Jun 2013

Veracode, Inc.
26 - 50 of 1800 Matches Previous Page    1 2 3 4 5    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement