IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
51 - 75 of 1845 Matches Previous Page  | Next Page
Implementing mobility/BYOD programs while maintaining regulatory compliance
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Explore this in-depth resource to learn how you can deploy your own BYOD or mobility program. Discover how to select the right devices for your employees, and effectively manage mobile security within the network. Read on now to learn more.
Posted: 10 Jul 2014 | Published: 28 Feb 2014

Dell, Inc. and Intel®

Deliver Secure Service without Sacrificing Mobility or Collaboration
sponsored by Citrix and Microsoft
WHITE PAPER: This document gives technical overview of a secure and robust enterprise solution that enables mobility and collaboration without sacrificing IT control. Unlike consumer-style file sync and sharing tools, this enterprise approach delivers secure service and store enterprise data in the optimal location to meet polices and compliance requirements.
Posted: 10 Jul 2014 | Published: 31 Jan 2014

Citrix and Microsoft

Buyer's Checklist: Mobile Application Platforms
sponsored by IBM
WHITE PAPER: View this buyer's guide to mobile application platforms, so you can be prepared with the right technology to develop, deploy, test, and manage mobile applications for your enterprise users. Use this checklist to compare key capabilities against one leading platform against others of your choosing.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

IBM

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

State of the Art on Managing Endpoints
sponsored by Dell and VMware
EGUIDE: This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
Posted: 09 Jul 2014 | Published: 21 Jun 2013

Dell and VMware

The Next Mobility Model: COPE Challenges BYOD
sponsored by SearchConsumerization.com
EBOOK: Now that the dust has settled around bring your own device, some IT shops have turned to the COPE, or corporate-owned, personally enabled, approach to mobile device management.
Posted: 09 Jul 2014 | Published: 09 Jul 2014


The Apple-ization of the Enterprise: Understanding IT’s New World
sponsored by Code42
WHITE PAPER: Access this white paper to learn about a new set of tools and applications that can help you keep your end-users happy while also satisfying the demands of senior management and auditors. It's time to stop fighting the "Apple-ization of the Enterprise" and start enjoying the benefits that this trend can deliver.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

Code42

Global Sporting Event Proceeds Smoothly Thanks to Stable IT and Dell Support Services
sponsored by Dell, Inc.
CASE STUDY: Explore this brief case study to learn how a large, global sporting event was able to design and operate a highly stable IT infrastructure with support from Dell, and how this sporting event was successful with their implementation of a virtualized data center and a desktop, mobile, and cloud computing strategy.
Posted: 08 Jul 2014 | Published: 31 Mar 2014

Dell, Inc.

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Business Applications and Tablet Adoption: A Survey of IT Professionals at Small and Mid-Sized Organizations
sponsored by NComputing
WHITE PAPER: This exclusive survey takes an in-depth look at the current trends a challenges that small and mid-sized businesses face when adopting tablets into the enterprise, discussing best practices, how to overcome common issues, and much more.
Posted: 08 Jul 2014 | Published: 07 Jul 2014

NComputing

Tablets in the Enterprise: A Checklist for Successful Deployment
sponsored by Code42
WHITE PAPER: This white paper provides the 7 steps organizations need to take in order to ensure that the data that is being stored on their tablets remains properly stored and protected.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

CW500 IN THE CITY - Jason Scott-Taggart
sponsored by ComputerWeekly.com
PRESENTATION: Jason Scott-Taggart, head of IT service management at Worldpay looks at how Barclays met the challenge of implementing technologies to support mobility and flexible working.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

ComputerWeekly.com

Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER: View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011

Veracode, Inc.

Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET: This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Veracode, Inc.

Mobile Application Security Survey Results
sponsored by Veracode, Inc.
WHITE PAPER: In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.
Posted: 07 Jul 2014 | Published: 30 Jun 2013

Veracode, Inc.

Wherever it Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Computer Weekly – 8 July 2014: The most influential women in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our annual list of the 25 most influential women in UK IT – female IT leaders making a difference to the digital economy. We look at how to integrate iPads into the corporate IT infrastructure. And we profile enterprise software upstart Workday as it challenges Oracle and SAP. Read the issue now.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

ComputerWeekly.com

A Practical Introduction to Enterprise Mobility Management
sponsored by Code42
WHITE PAPER: Check out this white paper to get a breakdown of how mobile device management (MDM) and mobile app management (MAM) can address today's challenges. Read on to get guidelines on how enterprise mobility management technology applies to your environment.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

The Mobile Scenario: Innovation Plus Agility Equals Opportunity
sponsored by Gartner
WEBCAST: This exclusive Gartner Symposium/ITxpo presentation discusses how organizations can best utilize the latest mobile capabilities to enable greater operational efficiency and employee satisfaction while also increasing security and cutting overall costs.
Posted: 07 Jul 2014 | Premiered: Jul 7, 2014

Gartner

Citrix solutions for healthcare
sponsored by Citrix/IBM/Atlantis Computing
WHITE PAPER: This informative paper examines a series of mobile solutions designed to help transform healthcare IT, enabling secure, reliable mobile access anytime, anywhere.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Citrix/IBM/Atlantis Computing

Thin Clients, Zero Clients, Tablets, Ultra-thin Laptops and Healthcare BYOD
sponsored by Dell, Inc.
WHITE PAPER: This exclusive white paper examines how healthcare organizations can fit mobile devices into their environment effectively so that they can reap the benefits of BYOD without compromising any IT requirements.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Dell, Inc.

Enterprise Endpoint Backup Checklist
sponsored by Code42
WHITE PAPER: Check out this white paper to learn the 12 must-have features for enterprise endpoint backup restores and management.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

Rethinking IT Integration for Cloud, Big Data, Mobile and Social Technologies
sponsored by IBM
WHITE PAPER: Find out how cloud, big data, mobile and social technologies can impact B2B and internal integration strategies.
Posted: 07 Jul 2014 | Published: 31 May 2014

IBM

IBM SmartCloud Desktop Infrastructure Reference Architecture: Citrix VDI-in-a-Box powered by IBM System x
sponsored by IBM and Intel.
WHITE PAPER: This brief whitepaper looks at powerful and effective features of a combined hardware and software desktop virtualization platform that provides organizations with an all-in-one VDI strategy for simplified, efficient deployment.
Posted: 07 Jul 2014 | Published: 03 Jun 2013

IBM and Intel.
51 - 75 of 1845 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement