IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
51 - 75 of 2031 Matches Previous Page  |  Next Page
Mobile Becomes A Key Success Imperative For CIOs
sponsored by Red Hat
WHITE PAPER: This report leverages Forrester's survey data to depict the current state of the CIO's mobile mind shift and their ability and willingness to support comprehensive mobile solutions. Learn why mobility is now the single most critical tool at your enterprise for your continued success and how to best use it by accessing now.
Posted: 19 Oct 2016 | Published: 12 Nov 2015

Red Hat

Printer and Embedded Device Security
sponsored by HP
WHITE PAPER: Many printers and embedded devices fail to meet today's enterprise security needs. Uncover five key security capability categories that should be addressed in order to ensure hackers aren't exposing these weak links.
Posted: 19 Oct 2016 | Published: 01 May 2015

HP

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: BYOD in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud through a multitude of devices. This infographic provides 9 BYOD security facts to help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016

Commvault

Tools and Techniques for Managing Apps Across Countless Delivery Methods, Endpoint Types, and OSes
sponsored by TechTarget
RESOURCE: This 11-page guide – curated by the editorial, objective experts at SearchMobileComputing.com – is jam-packed with invaluable tips for effectively managing today's mobility headaches in the face of vendor rhetoric, escalating user demands/expectations, and an increasing array of options for managing devices and delivering both apps and data.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

TechTarget

Enterprise Mobility: A Wealth of Opportunities for Financial Services
sponsored by Red Hat
EBOOK: This e-book details how developer tools, mobile app development platforms, microservice architectures, agile methods, open source software, cloud models and solution ecosystems are evolving to meet mobile demands. Additionally, learn seven factors to consider when implementing mobile initiatives at your enterprise.
Posted: 18 Oct 2016 | Published: 29 Feb 2016

Red Hat

Making the Case for Converging Enterprise Mobility and IoT Digital Initiatives
sponsored by Red Hat
RESEARCH CONTENT: This Pathfinder report focuses on two digital initiatives largely viewed as discrete but that share high potential: Enterprise mobility and Internet of Things. Learn how these two initiatives can help unlock the full potential of digital transformation for your enterprise.
Posted: 18 Oct 2016 | Published: 29 Feb 2016

Red Hat

Mobility Fuels Productivity Gains for Energy and Utilities
sponsored by Red Hat
EBOOK: Download this e-book to mobilize your enterprise with strategic mobile asset and workforce management. By reading on, you will learn 6 core strategies for mobile app development, including instruction on how to make use of device-specific functionality and integrate with multiple existing systems and domains.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

Red Hat

Desktop Virtualisation: The Essential Guide
sponsored by ComputerWeekly.com
EDITORIAL RESOURCE GUIDE: Desktop virtualisation, or virtual desktop infrastructure, has come of age, partly thanks to shifts in workplace practices. Employees are increasingly working remotely and need full access to corporate systems. It is often inconvenient to use the corporate laptop but the user still needs access to the systems offsite.
Posted: 14 Oct 2016 | Published: 14 Oct 2016

ComputerWeekly.com

5 Ways to Secure Your Mobile Endpoints
sponsored by Commvault
WHITE PAPER: Organizations know they should secure their users' mobile endpoint devices. But how? Discover the five crucial security features your organization must implement to confidently secure mobile devices and protect against all types of thieves.
Posted: 13 Oct 2016 | Published: 31 Dec 2015

Commvault

How EAM Is Making Operations More Efficient for Service-Oriented Businesses
sponsored by CraveInfoTech
WHITE PAPER: In service-oriented businesses such as utility companies, a lot of changes have to be made on the fly. Discover how utility companies are using enterprise asset management (EAM) to make their operations more efficient. Plus, learn how they are separating themselves from reliance on paper, tracking workers in the field, and much more.
Posted: 12 Oct 2016 | Published: 12 Oct 2016

CraveInfoTech

Modern Mobility e-zine – October 2016
sponsored by SearchMobileComputing
EZINE: HTML5 mobile development is on the rise, but the latest version of this programming language is not the only tool in a mobile developer's toolkit. It's not even the biggest one.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

SearchMobileComputing

Plug-and-Play POS: How Point-of-Sales is Entering a New Market Model
sponsored by Intel
WEBCAST: Discover how POS is entering the new IoT market model, and take advantage of plug-and-play POS to vastly improve the customer experience. Tune in as experts demonstrate 3 simple steps to POS implementation, and more.
Posted: 06 Oct 2016 | Premiered: Oct 6, 2016

Intel

UEM – The Art of Managing Diversity
sponsored by Matrix42
WHITE PAPER: Matrix42 asked more than 400 IT professionals who manage mobile devices and PCs/Laptops how they intend to deal with increased mobile device management and complexity of devices. This white paper provides the results of that research and other market insights so you can educate yourself on the current status of mobile device management.
Posted: 06 Oct 2016 | Published: 31 Dec 2015

Matrix42

Report: The 5 Use Cases and 14 Critical Capabilities of a BI and Analytics Platform
sponsored by Intel
WEBCAST: Future-proof your IoT strategy. Learn how to simplify IoT device management with a set of platforms which will provide seamless security and performance for intelligence at the edge—as well as point of sale (POS) devices for retail—enabling real-time analysis and tighter, more efficient process controls.
Posted: 05 Oct 2016 | Premiered: Jul 13, 2016

Intel

Economic Benefits of Virtualized Evolved Packet Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: This IDC white paper presents key opportunities and challenges facing mobile network operators as they address a shifting competitive landscape brought on by network virtualization.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Cisco Systems, Inc.

Why Employee Mobile Devices Are Undermining Your Enterprise Security Efforts
sponsored by Appthority
WHITE PAPER: This white paper explores the twin problems which most often lead to data breaches in mobile hardware: spear phishing and watering hole attacks. In addition, learn about a solution to stop them in their tracks by automating the scanning and analysis of employee mobile apps for risky behaviors, hidden actions, and mobile malware.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Appthority

Addressing Mobile App Risk
sponsored by Appthority
WHITE PAPER: Uncover why enterprises need to take a mobile first approach to the security of employees and the data they access/share via apps on their mobile devices.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

Appthority

How Converging Cloud, Mobile, and Social Trends are Impacting ERP
sponsored by Sage Software
WHITE PAPER: 4 influential trends – cloud and SaaS, mobility, social media, and big data – are converging as they impact enterprise resource planning and ERP vendors. Discover how to adapt your ERP strategy to incorporate SaaS, increased mobility, big data insights, and more in order to drive your business's innovation.
Posted: 29 Sep 2016 | Published: 31 Dec 2014

Sage Software

5 Steps to Keeping Your Data Safe with a Content Mobility Solution
sponsored by Hitachi Data Systems
DATA SHEET: Explore a 5 step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hitachi Data Systems

10 Surprising Facts About Our Mobile World
sponsored by LifeSize
RESOURCE: This infographic lays out 10 facts that may surprise you about the changing nature of enterprise mobility. Whether it's the staggering number of mobile subscribers or the incredible growth of mobile data usage, a clear understanding of the trajectory of mobile adoption will leave you sure embracing mobile computing is the right choice.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

LifeSize

Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Online Team Collaboration: Reaching New Levels With an All-In-One Platform
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper details the combination of persistent group messaging, private one-on-one chat, voice telephony, and video conferencing in a single unified experience. Access now to learn how to communicate in real time and collaborate using sophisticated yet easy-to-use tools.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

Cisco Systems, Inc.

EMM: Expanding Mobile Enterprise Strategy
sponsored by vmware airwatch
EGUIDE: In this expert e-guide you will learn how mobility has the potential to completely transform your businesses operations, and why it needs to go beyond EMM to do so. Additionally, discover why it's time to consider an EMM tool strategy in your enterprise.
Posted: 11 Oct 2016 | Published: 06 Oct 2016

vmware airwatch
51 - 75 of 2031 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement