IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
51 - 75 of 1991 Matches Previous Page  | Next Page
Location: The New battlefield for Business & Digital Innovation
sponsored by Ruckus Wireless
WHITE PAPER: The shift from the physical world to the online (virtual) world has been emphasized with the emergence of mobile and social technologies.  Users are connected to the virtual world more than ever before, but at the same time still enjoy being 'offiline'.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Ruckus Wireless

Dealing with Density: The Move to Small-Cell Architectures
sponsored by Ruckus Wireless
WHITE PAPER: The expansion of mobile devices in the past decade relied heavily on innovations in the network.  The increase in traffic and stress on the network still proves to be a challenge for IT.
Posted: 08 Oct 2014 | Published: 08 Oct 2014

Ruckus Wireless

Video: Enterprise Mobility: A New Way to Work
sponsored by Workday
VIDEO: View the following brief video to get a firsthand look at an all-inclusive solution to application mobility and how it can deliver the functionality and simplicity required in today's high-paced market.
Posted: 07 Oct 2014 | Premiered: 19 Jun 2013

Workday

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
WHITE PAPER: This white paper describes how BitGlass partnered with AMAG Pharmaceuticals to resolve critical security and privacy issues following the company's adoption of Google Apps' cloud and BYOD tools.
Posted: 07 Oct 2014 | Published: 07 Oct 2014


Give Your Users What They Want with Cloud and Mobile
sponsored by IBM
WEBCAST: This informative webcast discusses how moving to the cloud can accelerate mobile adoption, as well as how to combine the power of cloud with the freedom and functionality of mobile.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

IBM

Vmware View Mobile Secure Desktop on Vblock Systems
sponsored by VCE
WHITE PAPER: This whitepaper examines the use of desktop virtualization as the answer to improving mobile support capabilities and evolving the workspace environment.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VCE

What VMware Horizon 6 can offer you
sponsored by VMware, Inc.
WHITE PAPER: This resource walks through the major trends impacting employee work styles, how the role of IT is changing to adapt, and a desktop virtualization strategy that can help support and optimize mobile capabilities.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

VMware, Inc.

Unified Workspaces: a better way to securely deliver applications and files to mobile and BYOD devices
sponsored by NComputing
WHITE PAPER: Employees are changing the way they do business because of the increasing mobility of the workforce, causing them to utilize tablets. This white paper outlines how unified workspaces are all about simplicity, affordability and productivity. See how a leading vendor utilizes unified workspaces to enhance productivity for end users and IT.
Posted: 06 Oct 2014 | Published: 30 Sep 2014

NComputing

oneSpace; A unified Workspace Solution for Hybrid Environments
sponsored by NComputing
VIDEO: Most employees want a tablet system that can combine their personal assets with business applications and files. This video gives you an in-depth look at a unified workspace for your tablet. See how a leading vendor can help to allow your tablet to make it accesible for both personal assets and business applications in a securely fashion.
Posted: 06 Oct 2014 | Premiered: 01 Oct 2014

NComputing

The Mobile First Approach to Business Intelligence
sponsored by Information Builders
WHITE PAPER: Access the following informative white paper to examine the current state of mobile BI applications and gives insight into the technology and strategies needed to ensure your mobile BI projects run as smoothly and effectively as possible.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Information Builders

Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

Enterprise Mobility Management Envelops Data as Well as Devices
sponsored by SearchConsumerization.com
EBOOK: IT admins may be confused about MDM, MIM and MAM, but each is part of the evolving mobility management market. BYOD policies must account for applications, data and devices.
Posted: 03 Oct 2014 | Published: 03 Oct 2014


CW Europe – October 2014 Edition
sponsored by ComputerWeekly.com
EZINE: BYOD policies: What's allowed and what's banned? As IT departments still try to come to terms with the notion of BYOD, CW Europe takes a look at what policies are being implemented to keep security under control.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

ComputerWeekly.com

IBM SmartCloud for Social Business Mobility
sponsored by IBM
WHITE PAPER: This white paper introduces one company's portfolio of online services, including scalable and security-rich email, web conferencing, and social collaboration, that can help to improve employee responsiveness and effectiveness in support of social business.
Posted: 02 Oct 2014 | Published: 30 Sep 2014

IBM

Meeting Workforce Demands: Why—and How—IT Should Modernize End-User Computing
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper will walk you through the four biggest trends affecting IT departments and how they manage end-user computing, and also offers the four best practices that will help you meet these challenges head on.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

VMware, Inc.

How Mobile Management Services Fill a Critical Security Need
sponsored by Global Knowledge
WHITE PAPER: For organizations considering Mobile Management Services (MMS), such an increase demonstrates why it's critical to address MMS adoption and deployment now, before unchecked proliferation can cause serious problems.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Global Knowledge

Mobile Business Intelligence 101: Proven Strategies and Use Cases
sponsored by Information Builders
WHITE PAPER: Access the following white paper to examine the growth of dependence for mobile BI and how it can offer either large competitive advantages or some serious headaches. Additionally, learn about the technology to consider and more.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Information Builders

Evolving Toward the Next Phase of Email
sponsored by IBM
WHITE PAPER: This white paper explores current email usage in the workplace, as well as corporate email's anticipated future, including a more cohesive user experience with integrated application functionality, social capabilities, and transparent accessibility.
Posted: 01 Oct 2014 | Published: 30 Jun 2014

IBM

Computer Weekly buyer's guide to endpoint security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this 11-page buyer's guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise's security policy.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

ComputerWeekly.com

Security in the New Mobile Ecosystem – A Ponemon Institute Study
sponsored by Raytheon Trusted Computer Solutions
WHITE PAPER: This study takes a look at over 600 IT security professionals who are highly involved in their organizations' mobile and enterprise security activities, and explains the current security status of mobile devices in the workplace.
Posted: 01 Oct 2014 | Published: 31 Aug 2014

Raytheon Trusted Computer Solutions

How to survive security risks within a BYOD environment
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: Mobile device security is a moving target, and requires organizations to stay up-to-date on not just the threats, but also on the technology that defends against those threats. So how do you do it? Consult the following white paper to find out now including the technology to consider and more.
Posted: 30 Sep 2014 | Published: 30 Sep 2014

Dell, Inc. and Windows 8 Pro

Improving Collaboration and Trimming Infrastructure Costs in a Hybrid Environment
sponsored by IBM
WHITE PAPER: This white paper describes how IBM SmartCloud services helped Brunswick Corporation, an employer of 16,000 worldwide, to cost-effectively support a variety of mobile devices, and also enabled them to move email, meeting, and other capabilities to the cloud while keeping other applications in-house.
Posted: 30 Sep 2014 | Published: 29 Nov 2013

IBM

Enabling Secure Enterprise Mobility
sponsored by Aruba Networks
WHITE PAPER: This exclusive whitepaper explores four things you must focus on to ensure secure enterprise mobility for your organization.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Aruba Networks

Best Approaches to BYOD and Mobile Security
sponsored by Citrix
EGUIDE: This exclusive e-guide offers advice on developing a strong mobile security plan and examines how some modern corporations approach BYOD and security.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Citrix
51 - 75 of 1991 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement