IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
51 - 75 of 1953 Matches Previous Page  | Next Page
Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Enabaling Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Aruba Networks

Leveraging VMware to Support Changing Workstyles
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper walks through the major trends affecting computing methods in the workplace and explains how Desktops-as-a-Service can help you securely deliver desktops and apps to end users through a unified workspace with little to no upfront capital costs.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

VMware, Inc.

Accelerating Mobile Development with PaaS, SaaS and IaaS
sponsored by IBM
EGUIDE: In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

IBM

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Leverage the Power of APIs to Turbocharge Your Mobile Strategy
sponsored by Intel® Services
WHITE PAPER: This guide examines how today's top organizations are handling API management, including a breakdown of the "seven steps" required to build a successful API program.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Intel® Services

Selecting Which Mobile Devices to Test
sponsored by Orasi
WHITE PAPER: Mobile application testing presents a variety of unique challenges – the most formidable of which is supporting every device running any operating system. This whitepaper considers strategic opportunities to help development teams choose which mobile devices to test to achieve maximum efficiency.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Orasi

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Mobile Fraud Trends and Impact
sponsored by iovation, Inc.
WHITE PAPER: Device intelligence uncovers hidden layers of risk in mobile transactions from both web browsers and mobile applications. Get his report to learn more about mobile fraud—risks, insights and priorities.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

Making the Move from Legacy AAA Platforms to Policy Management
sponsored by Aruba Networks
WHITE PAPER: This white paper discusses how the use of policy management in a mobile environment provides a simpler, more cost-effective method of ensuring that productivity isn't lost due to denied access.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Aruba Networks

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a device-based solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

It’s All About the App: Mobile Security That Helps Enable the Business
sponsored by CA Technologies.
WHITE PAPER: In this white paper, explore the endless possibilities of implementing mobile initiatives into your business while keeping security initiatives in mind.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

CA Technologies.

What's Next for Mobile Application Development
sponsored by IBM
EGUIDE: This expert e-guide offers best practices for building cost-effective mobile applications.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Jumpstart Your Mobile Application Development Project
sponsored by IBM
EGUIDE: This expert e-guide explores how to handle the explosive growth in the mobile application development landscape.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

IBM

Mobile Point of Care: Choosing Devices for Collaborative Workflows
sponsored by Insight
VIDEO: Check out the following resource to hear from Dr. Mark Blatt as he intends to walk through the proper steps for mobile point of care device selection and shares how to choose the right mobile device for your workflow environment.
Posted: 25 Sep 2014 | Premiered: 25 Sep 2014

Insight

Enterprise Security: Attacking the problems of application and mobile security
sponsored by Orasi
WHITE PAPER: Mobile devices, applications, and the network infrastructure are particularly vulnerable to attack and intrusion – and can all too often be the weak link in an otherwise secure enterprise infrastructure. This in-depth resource dives into trends in enterprise security, focusing on mobile systems and malware.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Orasi

How 4 Citrix Customers Solved the Enterprise Mobility Challenge
sponsored by Citrix
WHITE PAPER: For mobile workers to truly be productive, they need on-the-go access to apps and data, even on their personal devices.  Enterprises need a way to deliver these other types of apps on mobile devices now- but IT rarely has the time or budget to build mobile versions.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Citrix

The Definitive Guide to Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: Enterprise organizations today are allowing a new generation of users - known as the mobile generation - to maximize productivity by relying on mobile devices for every aspect of work and personal communication.  However, networking security concerns are emerging.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

Aruba Networks

IT Leaders Look Towards Implementing an Enterprise Mobility Strategy
sponsored by CA Technologies.
WHITE PAPER: The following survey detailed mobile information compiled from 1,300 senior IT decision makers from 21 different countries worldwide.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

CA Technologies.

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.
51 - 75 of 1953 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement