IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
76 - 100 of 1982 Matches Previous Page  |  Next Page
5 Ways to Improve Business Continuity
sponsored by Mitel Networks Limited
WHITE PAPER: This guide provides 5 ways you can improve business continuity by relocating or distributing your workforce. Learn about improving availability with mobile devices, creating a disaster recovery site, and more.
Posted: 11 Mar 2016 | Published: 30 Dec 2014

Mitel Networks Limited

Why IT Should Watch Out for Wearables
sponsored by SearchMobileComputing
EBOOK: Wearable computers such as Google Glass and Apple's Watch could all make their way into the enterprise. For now, they're a non-issue, but they could be big in the future.
Posted: 10 Mar 2016 | Published: 10 Mar 2016

SearchMobileComputing

Five Ways to Attract and Retain the Best People
sponsored by Mitel Networks Limited
WHITE PAPER: Access this resource to discover 5 strategies to attract and retain the best employees with the promise of enterprise mobility. Learn how to expand your hiring pool from local to global, provide your workers with a virtual workspace, and more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Mitel Networks Limited

Five Ways to Improve Reachability in Your Organization
sponsored by Mitel Networks Limited
WHITE PAPER: The truth is that being mobile doesn't equate to being productive: being reachable does. From this white paper, gain insight into 5 ways to improve reachability in your organization, and maximize productivity based on the mobile devices your employees already bring to the office.
Posted: 10 Mar 2016 | Published: 31 Dec 2014

Mitel Networks Limited

How to Handle a Ransomware Hijacking
sponsored by ESET
WHITE PAPER: This white paper reinforces the important precautions of secure mobile management in the enterprise. Uncover the global state of ransomware attacks, preventative measures you can take, and what to do if your organization gets infected.
Posted: 09 Mar 2016 | Published: 09 Mar 2016

ESET

The Wireless 802.11ac Buyer's Guide
sponsored by Extreme Networks
RESOURCE: Access this buyer's guide for 802.11ac Wave 2, and discover how it can provide you with higher speeds and bandwidth to support latency-sensitive video and voice traffic, and mobile devices. Read on to accommodate for the increased density demands of clients and address several considerations before planning your installation.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

Extreme Networks

Modern Mobility E-zine – March 2016
sponsored by SearchMobileComputing
EZINE: Learn how three companies found success mobilizing complex business processes and how their mobile apps made workers more productive.
Posted: 08 Mar 2016 | Published: 08 Mar 2016

SearchMobileComputing

Modern Mobility: Five Ways to Be More Productive at Work
sponsored by Mitel Networks Limited
WHITE PAPER: In this white paper, you will discover five ways you can improve employee productivity in your organization by maximizing on BYOD and optimizing enterprise mobility policies for remote work. Read on to improve mobile networking and communication experience for your workers.
Posted: 08 Mar 2016 | Published: 31 Dec 2014

Mitel Networks Limited

2016 Cyberthreat Defense Report
sponsored by LogRhythm, Inc.
WHITE PAPER: This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.
Posted: 07 Mar 2016 | Published: 02 Mar 2016

LogRhythm, Inc.

Secure Retail Eases the BlackBerry to iOS Transition
sponsored by IBM MaaS360
CASE STUDY: In this white paper, you will discover a comprehensive security solution for iOS devices that has a clean and intuitive interface with easy reporting and usage tracking for expense management. Read on to meet your key functionality requirements for your mobile policies and safely incorporate iOS into your MDM.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

IBM MaaS360

RailCom Meets Client Needs While Ensuring Corporate Data and Device Security
sponsored by IBM MaaS360
CASE STUDY: In this case study, you will learn how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based EMM solution. Read on to discover how your business can deploy remote wipe, SIM card blocking, and more.
Posted: 07 Mar 2016 | Published: 07 Mar 2016

IBM MaaS360

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover several mobile application lifecycle management (MALM) best practices for organizations with BYOD policies. Read on to discover the benefits of MALM, including single sign-on for all enterprise apps, real-time security reporting, and more.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Mobility Is Moving Fast: Seven Questions that Prepare you for BYOD
sponsored by IBM MaaS360
WHITE PAPER: Clearly BYOD is here to stay, and its usage only escalates. In this white paper, you will discover 7 questions you should first answer before deploying BYOD in your organization and rolling out all the capabilities that accompany it. Access this paper to strategize your enterprise mobility.
Posted: 04 Mar 2016 | Published: 31 Dec 2011

IBM MaaS360

Develop More Effective Enterprise Mobile Programs
sponsored by IBM MaaS360
WHITE PAPER: This "how-to" guide highlights ways your business can create an effective and sustainable mobile enterprise program in four steps including defining your mobile strategy and secure day-to-day support.
Posted: 04 Mar 2016 | Published: 30 Nov 2012

IBM MaaS360

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Providing Mobile Data Access
sponsored by SearchMobileComputing
EBOOK: Data is king for today's workers, but getting mobile data access isn't always as easy as it should be. Shops can turn to cloud services, MCM or in-app storage to get the job done.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

SearchMobileComputing

The ABCs of Mobile Device Management
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you learn about the basics of Mobile Device Management (MDM) and gain a broad perspective on MDM as a whole, including expert advice on Over-the-Air (OTA) configuration, wiping corporate data on mobile devices, and much more.
Posted: 03 Mar 2016 | Published: 03 Mar 2016

IBM MaaS360

Mobile Device Management Policies: Best Practices Guide
sponsored by IBM MaaS360
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Embracing BYOD with Mobile Device Management
sponsored by IBM MaaS360
VIDEO: In this brief video, you will discover how to offer your end-users simple BYOD enrollment for their personal devices with an MDM platform, as well as hand your IT full control of mobile devices running on iOS and Android. Tune in to secure your organization's data with compliant endpoint access.
Posted: 03 Mar 2016 | Premiered: 03 Mar 2016

IBM MaaS360

Thinking Outside the Container: How to Overcome MDM Limitations
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to overcome the limitations of current container-based MDM/MAM solutions. Access this paper to implement MAM/MDM solutions that don't contain the user and constrain the benefits of mobility, and which empower the user by enabling the new capabilities found in the native mobile OS.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Matrix42

Continuous Monitoring and Threat Mitigation with Next-Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: In this white paper, discover how to transform your disparate security technology silos into a more unified and automated system that continuously monitors and mitigates threats with next-generation NAC. Read on to learn how to enable BYOD adoption and support IT-GRC framework specifications.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

ForeScout Technologies, Inc.

A Guide to Mobile Application Delivery and Investment Protection
sponsored by Matrix42
WHITE PAPER: In this white paper, you will discover how to integrate your mobile applications management (MAM) into your existing infrastructures to allow remote management of app delivery, security, configuration and access – without the need for proprietary proxy servers.
Posted: 02 Mar 2016 | Published: 31 Dec 2015

Matrix42

Assess Devices and Users To Get Started on a Mobility Program
sponsored by SearchEnterpriseDesktop
EGUIDE: While IT administrators have managed user identities, endpoint devices, applications, and data for years, mobile technology has brought dramatic growth and corresponding challenges. This exclusive e-guide takes a look at the shifting workplace environment as mobile devices have increasingly become popular.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

SearchEnterpriseDesktop

Geolocation and Mobile BPM: Benefits & Challenges
sponsored by HERE
EGUIDE: In this expert e-guide, Steve Weissman discusses the benefits that geolocation brings to mobile business process management. Learn how geolocation enables you to make customer service more specific and targeted and enhances business intelligence with geodata.
Posted: 01 Mar 2016 | Published: 25 Feb 2016

HERE
76 - 100 of 1982 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement