IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
51 - 75 of 2027 Matches Previous Page  |  Next Page
macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Best-of-Breed Enterprise Mac Management
sponsored by JAMF
WHITE PAPER: Download this white paper to discover a full Mac client management tool built to support the underlying architecture of macOS from the ground up, that gives IT administrators the flexibility to gather inventory data in a way that's extendable and customizable, integrated, actionable and auditable.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

How to implement a user-choice program
sponsored by JAMF
WHITE PAPER: 72% say being able to choose their own devices makes employees more productive. How does this work? This e-book delivers five steps to creating and implementing a technology choice program in your organization. Learn how to streamline deployments, management, security, and more.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

Better Together: Managing Your Devices as an Ecosystem
sponsored by JAMF
EBOOK: Your employees are using multiple devices to work, and that means managing multiple platforms. Every major operating system provider is looking to provide a unique experience to its users and there is no single management tool designed to support everything. Access this e-book to learn how to manage your devices as a single ecosystem.
Posted: 16 Aug 2017 | Published: 16 Aug 2017

JAMF

CW ASEAN - August 2017: Growing the IoT
sponsored by ComputerWeekly.com
EBOOK: Despite the allure of IoT, adoption of the technology is still in its infancy in Southeast Asia. According to an industry survey, 51% of organisations in the region say they still need to better understand the benefits of IoT. In this month's issue of CW ASEAN, we look at the conditions necessary for IoT to gain broader adoption in the region.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ComputerWeekly.com

IDC Spotlight : Mercy Health Systems: Innovative Mobile Applications to Enhance Patient Care
sponsored by VMware
ANALYST REPORT: Mercy Health System in St. Louis embarked on a journey to improve the increasingly difficult-to-manage combination of corporate and personal devices as "bring your own device" (BYOD) became more popular. Download this IDC Spotlight to learn how Mercy was able to improve security of devices, improve satisfaction, and more.
Posted: 10 Aug 2017 | Published: 31 Mar 2017

VMware

CW ANZ - August 2017: Get to grips with IoT
sponsored by ComputerWeekly.com
EZINE: While IoT may have benefited industries such as oil and gas, issues such as connectivity are holding back adoption in Australia. In this month's CW ANZ, we look at the state of adoption of IoT in Australia and efforts that have been undertaken to address adoption barriers. Also, read more about OVH's plans to expand its footprint in Asia-Pacific.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

ComputerWeekly.com

Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

MobileIron

Mitigate Mobile Cloud App Risks
sponsored by MobileIron
VIDEO: Mobile apps are becoming the number one way employees are accessing cloud services, creating a new threat vector that you need to overcome: mobile app-to-cloud risk. This webcast explores 3 ways employees can introduce vulnerabilities by using cloud apps on mobile devices.
Posted: 07 Aug 2017 | Premiered: 07 Aug 2017

MobileIron

Tools and Techniques for Managing Apps Across Countless Delivery Methods, Endpoint Types, and OSes
sponsored by TechTarget
RESOURCE: This 11-page guide – curated by the editorial, objective experts at SearchMobileComputing.com – is jam-packed with invaluable tips for effectively managing today's mobility headaches in the face of vendor rhetoric, escalating user demands/expectations, and an increasing array of options for managing devices and delivering both apps and data.
Posted: 02 Aug 2017 | Published: 18 Oct 2016

TechTarget

Enterprise Mobility for Digital Transformation
sponsored by AdvizeX Technologies
WEBCAST: One of the primary components of a successful digital transformation is a strong mobility strategy. Your employees demand anywhere, anytime access to the applications and data they need on any device. Watch this webinar, as mobility experts delve into enterprise mobility and how to significantly increase your organization's business agility.
Posted: 31 Jul 2017 | Premiered: Mar 22, 2017

AdvizeX Technologies

Unified Endpoint Management for Dummies
sponsored by IBM
EBOOK: Learn about unified endpoint management (UEM) and how it helps you manage and secure the growing number of devices, apps, and data within your organization. Discover 5 core features of effective UEM, how to monitor endpoints and end-users, how to protect content and proprietary data, and more.
Posted: 24 Jul 2017 | Published: 24 Jul 2017

IBM

The Digital Workspace and Future Employee Experience
sponsored by Citrix
ANALYST REPORT: Download this Oxford Economics report to discover what some of the top leaders in digital workspaces are doing, to stay ahead of the rapidly changing demands of on-the-go employees.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

Citrix

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com

Is your IT Security Affecting your Workforce Productivity?
sponsored by Dell EMC and Intel®
RESOURCE: 65% of devices lack data protection capabilities according to this Forrester Research infographic. Is your IT security affecting your workforce productivity?
Posted: 17 Jul 2017 | Published: 30 Sep 2016

Dell EMC and Intel®

Virtual, mobile healthcare apps: The challenges, what makes a successful mobile app
sponsored by Blue Cedar
EGUIDE: Download this e-guide to discover the challenges facing mobile in healthcare and what a mobile application needs to truly be successful and stand out in the healthcare space.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Evolution of the EMM Industry
sponsored by MobileIron
RESOURCE: Download this resource to see how the EMM industry has evolved over the years, how vendors in the space compare, and what makes the top vendor stand out from the competition.
Posted: 28 Jun 2017 | Published: 09 Jun 2017

MobileIron

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
sponsored by ComputerWeekly.com
EZINE: Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

ComputerWeekly.com

The Mobile Risk Matrix
sponsored by Lookout
RESOURCE: Download this mobile risk matrix to gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities to your organizations' apps, devices, network, web and content.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

Uniting IT and App Development for Mobile App Strategies
sponsored by SearchEnterpriseDesktop
EZINE: The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

SearchEnterpriseDesktop

Get Connected: Building your Digital Workplace
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: This report surveyed 182 organizations on how their employees are adopting IoT, and how it is (or isn't) fitting into their digital transformation initiatives.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

Hewlett Packard Enterprise
51 - 75 of 2027 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement