IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
51 - 75 of 1984 Matches Previous Page  | Next Page
Vmware View Mobile Secure Desktop on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper examines the use of desktop virtualization as the answer to improving mobile support capabilities and evolving the workspace environment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VCE

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

Unified Workspaces: a better way to securely deliver applications and files to mobile and BYOD devices
sponsored by NComputing
WHITE PAPER: Employees are changing the way they do business because of the increasing mobility of the workforce, causing them to utilize tablets. This white paper outlines how unified workspaces are all about simplicity, affordability and productivity. See how a leading vendor utilizes unified workspaces to enhance productivity for end users and IT.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

NComputing

oneSpace; A unified Workspace Solution for Hybrid Environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

The Mobile First Approach to Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access the following informative white paper to examine the current state of mobile BI applications and gives insight into the technology and strategies needed to ensure your mobile BI projects run as smoothly and effectively as possible.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Information Builders

Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

Enterprise Mobility Management Envelops Data as Well as Devices
sponsored by SearchConsumerization.com
EBOOK: IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices.
Posted: 03 Oct 2014 | Published: 03 Oct 2014


CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper will walk you through the four biggest trends affecting IT departments and how they manage end-user computing, and also offers the four best practices that will help you meet these challenges head on.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

VMware, Inc.

How Mobile Management Services Fill a Critical Security Need
sponsored by Global Knowledge
WHITE PAPER: For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked proliferation can cause serious problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Global Knowledge

Mobile Business Intelligence 101: Proven Strategies and Use Cases
sponsored by Information Builders
WHITE PAPER: Access the following white paper to examine the growth of dependence for mobile BI and how it can offer either large competitive advantages or some serious headaches. Additionally, learn about the technology to consider and more.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Information Builders

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Enabling Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Aruba Networks

Leveraging VMware to Support Changing Workstyles
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper walks through the major trends affecting computing methods in the workplace and explains how Desktops-as-a-Service can help you securely deliver desktops and apps to end users through a unified workspace with little to no upfront capital costs.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

VMware, Inc.

Accelerating Mobile Development with PaaS, SaaS and IaaS
sponsored by IBM
EGUIDE: In this e-guide, experts highlight how Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS), and Infrastructure-as-a-Service (IaaS) can jumpstart your mobile app development processes and get your software out the door faster.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

IBM

Social Engineering in IT Security
sponsored by ComputerWeekly.com
BOOK: This extract from Sharon Conheady's book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how organisations can protect themselves.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

ComputerWeekly.com

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

ComputerWeekly.com

Leverage the Power of APIs to Turbocharge Your Mobile Strategy
sponsored by Intel® Services
WHITE PAPER: This guide examines how today's top organizations are handling API management, including a breakdown of the "seven steps" required to build a successful API program.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Intel® Services

Mobility Customer Success Stories: BYOD and Mobility
sponsored by Cisco Systems, Inc.
WHITE PAPER: Let's face it; Employees bring their own devices into work and want to be able to connect to corporate networks. There are a lot of vendors in mind when deciding on a BYOD strategy, and the best fit depends on your company.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Cisco Systems, Inc.

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix
51 - 75 of 1984 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement