IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device ManagementReports
51 - 75 of 2065 Matches Previous Page  | Next Page
IBM CIO Office
sponsored by IBM
CASE STUDY: This exclusive case study takes an in-depth look at how one office was able to on-board 15,00 devices during the first day of deployment. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Addressing NIST and DOD Requirements for Mobile Device Management (MDM)
sponsored by IBM
WHITE PAPER: Read this exclusive white paper to gain key insights on the security risks associated with mobile device policies, as well as an in-depth look at one solution that was able to drive rock-solid security without risking network performance and end-user satisfaction. Read on to learn more.
Posted: 11 Nov 2014 | Published: 11 Nov 2014

IBM

Seizing Opportunities and Eliminating Risks with BYOD and Mobile Security
sponsored by Gemalto
WHITE PAPER: This white paper distills the complexities of BYOD scenarios into three common use cases. Read on to find actionable mobile security ideas that fit your own organization's specific requirements in order to reduce threats in this dynamic landscape.
Posted: 11 Nov 2014 | Published: 10 Nov 2014

Gemalto

The Developer’s Guide to Enabling the Mobile-First Enterprise
sponsored by Kidozen
WHITE PAPER: The following white paper examines the requisite infrastructure, essential middleware components, and best practices developers need to embrace to enable a mobile-first enterprise.
Posted: 11 Nov 2014 | Published: 11 Nov 2014


Security University: Mobile Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Lisa Phifer explores innovative approaches to achieve secure mobility, from EMM and BYOA to enterprise cloud and dual persona.
Posted: 11 Nov 2014 | Premiered: 14 Nov 2014

SearchSecurity.com

Effectively Managing BYOD in your Organization
sponsored by TechTarget
RESOURCE: Does your organization know how to improve efficiency and safe money through the use of employees using tablets and smartphones for work? Take our brief survey on mobile devices and in return you will gain immediate access to our eguide, Juggling management and benefits of BYOD in the enterprise & beyond.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

TechTarget

Closing Security Gaps in Mobile Applications
sponsored by CA Technologies.
WHITE PAPER: This exclusive whitepaper takes an in-depth look at mobile security.  Read on to learn more.
Posted: 10 Nov 2014 | Published: 10 Nov 2014

CA Technologies.

EMA Research Report: Enabling Unified Endpoint and Service Management for a Mobile Workforce
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at enabling unified endpoint and service management for mobile workers. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

FrontRange Solutions Inc.

2014 Gartner Magic Quadrant for Client Management Tools
sponsored by IBM
WHITE PAPER: In this exclusive white paper, join Gartner analysts Kevin Knox and Terrence Cosgrove as they take an in-depth look at the client management tools market. They provide a vendor comparison, as well as strengths and weaknesses for leading vendors. Read on to learn more.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

IBM

Preparing K - 12 Education Infrastructure for Online Assessment: The Top Five Technology Priorities
sponsored by Insight
WHITE PAPER: This Center for Digital Education (CDE) paper points to the top 5 technology priorities school districts need to focus on for online assessment. This paper provides steps that budget-conscious and resource-limited districts can take to create a technology-enhanced environment while meeting standards for assessment.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Insight

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Enterprise Mobility & BYOD:Four Biggest Challenges—And How to Solve Them
sponsored by FrontRange Solutions Inc.
WHITE PAPER: This exclusive white paper reviews the 4 biggest challenges of enterpise mobility management and BYOD, and how to solve them. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

FrontRange Solutions Inc.

Four reasons to go beyond VMware Horizon with Citrix XenApp and XenDesktop
sponsored by Citrix
WHITE PAPER: Explore this white paper to compare two leading solutions for virtual desktops and applications. Discover four ways in how they measured up to each other.
Posted: 06 Nov 2014 | Published: 29 Aug 2014

Citrix

Enterprise Mobility: Enable Productivity without Sacrificing Protection
sponsored by Symantec
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and discusses why your organization should embrace it. Read on to learn more.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Symantec

5 Must Haves For EMM (Webcast)
sponsored by Symantec
WEBCAST: This exclusive webcast takes an in-depth look at understanding the enterprise mobility management (EMM) market and offers 5 must-haves for an EMM solution.  Read on to learn more.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Symantec

Expert Tips for a Successful BYOD Security Policy
sponsored by 1e Inc
EGUIDE: This exclusive e-guide offers an in-depth look at BYOD security policies and best practices. Read on to learn more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

1e Inc

Choosing a Secure Workspace Approach
sponsored by Dell Software
WHITE PAPER: Learn how to choose a secure workspace solution that enables you to maintain security, reduce IT complexity and still deliver the responsiveness and flexibility your employees need for anytime, anywhere productivity. Read this insightful white paper for details.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Dell Software

Fortify Your Mobile Device Data Protection Efforts
sponsored by SearchDataBackup.com
EBOOK: Assuming that end users aren't keeping much data on their endpoint devices is a losing proposition. Perhaps more importantly, it's a risk that IT administrators cannot afford to take.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

SearchDataBackup.com

Maximizing Mobility's Rewards While Minimizing its Risks
sponsored by Symantec
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and how you can maximize the rewards associated with it. Read on to learn more.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

Symantec

The Pillars of a Next-Generation Enterprise Mobility Solution
sponsored by Symantec
WHITE PAPER: This exclusive white paper details the key factors that go into a next-generation enterprise mobility solution, as well as a best practice approach to mobility. Read on to learn m
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Symantec

IDC: Device Proliferation and the Important Role of Thin Clients
sponsored by Citrix
WHITE PAPER: This exclusive white paper takes an in-depth look at enterprise mobility and how it's used in organizations to drive the best benefits possible. Read on to learn more.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Citrix

Cloud Services InfoPaper
sponsored by Equinix
WHITE PAPER: Check out this white paper to learn how you can make a successful move to the cloud. You'll get insight into a 3 step approach to planning and executing your cloud deployment strategy.
Posted: 03 Nov 2014 | Published: 31 Oct 2014

Equinix

Location-Based Services: Enhance the Customer Experience
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive white paper takes an in-depth look at location-based services (LBS) that promise a budding customer-centric mobility solution in early adopters. Read on to learn more.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

Cisco Systems, Inc.

Scale-out systems that put data to work
sponsored by IBM
WHITE PAPER: This resource highlights a solution that is the first generation of systems with processors designed for Big Data.
Posted: 31 Oct 2014 | Published: 17 Apr 2014

IBM

Don't Lose the Data: Six Ways You May Be Losing Mobile Data and Don't Even Know It
sponsored by Symantec
WHITE PAPER: This white paper briefly reviews the top six threats to your mobile workforce, matching real-world hazards with really helpful ways you cantake action and achieve the security your business requires.
Posted: 04 Nov 2014 | Published: 04 Nov 2014

Symantec
51 - 75 of 2065 Matches Previous Page    1 2 3 4 5 6    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement