IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
76 - 100 of 1877 Matches Previous Page  |  Next Page
Modern mobility E-zine – November/December
sponsored by SearchMobileComputing
EZINE: Access this month's issue of Modern Mobility E-Zine to find out why BYOD is no longer the centerpiece of mobile strategy, how to choose an EMM vendor, what to expect from mobility in 2016, and so much more.
Posted: 11 Nov 2015 | Published: 11 Nov 2015

SearchMobileComputing

Transforming Traditional Data Centers for More Successful App Rollouts
sponsored by F5 Networks
WHITE PAPER: Discover integrated strategies that transform the existing data center infrastructure to operationalize your network while maintaining high availability and predictable performance for existing applications.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

F5 Networks

Leverage Hybrid Computing to Accelerate Your Mobile Transformation
sponsored by IBM
WEBCAST: This informative webcast details the capabilities of the IBM MobileFirst Platform that enables you to harness the power and flexibility of hybrid computing to accelerate your mobile transformation. Watch now to learn more.
Posted: 05 Nov 2015 | Premiered: Aug 28, 2015

IBM

Accelerate Your Transformation into a Mobile Enterprise with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper will examine why becoming a mobile enterprise may be the best choice for your organization, how cloud can help you accelerate your transformation into a mobile enterprise, and the important things to consider when designing a mobile enterprise. Read on to learn more.
Posted: 05 Nov 2015 | Published: 30 Sep 2015

IBM

The Path to Becoming a Mobile Enterprise: API-Led Connectivity
sponsored by MuleSoft
WEBCAST: In this webcast, you'll gain access to an expert discussion on the opportunities that mobile can bring to your enterprise, as well as the biggest roadblocks that companies face on the journey to successful mobile delivery.
Posted: 03 Nov 2015 | Premiered: Feb 26, 2015

MuleSoft

Targeted Attack Protection: Bolstering Your Mobile Defenses
sponsored by Proofpoint, Inc.
WEBCAST: In this informative webcast, learn the top 6 malware apps users will encounter, how to secure Apple and Android devices, and mitigate malicious apps. Discover the top mobile app malware threats plaguing organizations and how to thwart them in their tracks before data leakage occurs.
Posted: 30 Oct 2015 | Premiered: Oct 7, 2015

Proofpoint, Inc.

Improve Your User Experience with Mobile Application Development
sponsored by IBM
WEBCAST: In this webcast, you will learn how transform customer information garnered from your mobile apps into actionable data. Access this video to accelerate the delivery of your mobile strategy provide users with a more engaging experience.
Posted: 30 Oct 2015 | Premiered: Jun 18, 2015

IBM

Enabling Enterprise Mobility with APIs
sponsored by MuleSoft
WHITE PAPER: This paper reviews the primary drivers and challenges faced by enterprises trying to initiate or support a mobile strategy, and the transformation stories of three market leaders who enabled mobility via API-led connectivity. Access this white paper now to devise a mobile strategy for your business.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

MuleSoft

Empower Data Protection with File Encryption and Bring Your Own Collaboration
sponsored by FinalCode
EGUIDE: This e-guide examines a security software that will ensure the highest level of enterprise file protection by encrypting documents individually. Learn why breach training can minimize damage when hackers attack, and access exclusive tips for creating a data classification policy.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

FinalCode

Supporting Workplace Productivity with Mobile Business Software
sponsored by Sage (UK) Limited
WHITE PAPER: In this white paper, you will discover how your business can support workplace productivity with mobile business software to help your employees become more effective. Access this resource now to learn why mobile ERP could be right for your business.
Posted: 22 Oct 2015 | Published: 31 Aug 2015

Sage (UK) Limited

The State of Mobile Security Maturity
sponsored by IBM
WHITE PAPER: This white paper reviews the blurred lines between personal and professional use of mobile devices as well as the inherent risks enterprise mobility poses to data, apps, and networks.
Posted: 19 Oct 2015 | Published: 31 Dec 2014

IBM

The Top 6 Tools Users Need For Mobile Files and How to Provide them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper discusses the six tools mobile users need from their file management apps and gives advice on maintaining security while providing each one.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

Overcome the Complexity of Managing Cloud Apps in the Enterprise
sponsored by BlackBerry
WHITE PAPER: This white paper demonstrates how you can solve IT management challenges with an Enterprise Identity platform, simplifying the management of cloud-based apps with a single point of control. Learn how to enable single sign-on for remote users.
Posted: 13 Oct 2015 | Published: 13 Oct 2015

BlackBerry

The Power of Collaboration with an Expiration Date and Data-Centric Security
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will learn the role of data-centric security in expiration collaboration. Access this paper now to see why the movement of consumers to apps like Snapchat clearly presages a similar move for enterprises to EFSS tools with real expiration built in.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: Take a deep look at recent malware attacks against file sharing systems and potential countermeasures to thwart them. Learn how to achieve secure mobile file sharing and mitigate the risk of information loss.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Increase Productivity and Reduce Risk with Secure File Sharing & Collaboration
sponsored by BlackBerry
WHITE PAPER: This white paper highlights an EFSS solution that allows you to take control over your data, combining the benefits of productivity and collaboration with security. Bolster your business against third-party threats with 6 steps for deploying secure EFSS.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

BlackBerry

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM
WHITE PAPER: Discover the cure to mobilephobia and how to holistically and securely manage the mobile enterprise in this exclusive white paper.
Posted: 02 Oct 2015 | Published: 01 Oct 2015

IBM

Mobile Consumer 2015
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Britain's mobile phone owners look at their devices nearly 1.1 billion times a day, the equivalent of 400 billion times a year, according to research from Deloitte.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

ComputerWeekly.com

Drive business growth with mobile workspaces
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this white paper to learn how mobile workspaces give employees the flexibility to work from anywhere, on any device, at any time while maintaining full security and compliance and discover a mobile workspace strategy that provides the tools to get started implementing an enterprise mobility strategy today.
Posted: 18 Sep 2015 | Published: 29 Aug 2014

Dell, Inc. and Intel®

Remote access your users will love
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper uncovers the growing user challenges with remote access strategies. Download now to learn the key features a remote access strategy should encompass that balances IT's requirements for security and manageability with users expectations and discover an end-to-end remote access strategy.
Posted: 17 Sep 2015 | Published: 29 Mar 2013

Dell, Inc. and Intel®

2015 State of the WAN Report: Emergence of Software-Defined WAN
sponsored by Citrix
WHITE PAPER: In this e-book, you will access the current state of the WAN for 2015, learn why WAN budgets are looking up, and see how much interest and momentum software-defined WAN (SD-WAN) is garnering. Read this report now to get an inside look at the factors driving and inhibiting change in the WAN.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Citrix

Case Study: A Fully-Integrated Approach to Forward-Thinking Healthcare
sponsored by Hitachi Data Systems
CASE STUDY: Ultimately, Carilion Clinic achieved their goals by unifying existing applications and optimizing data with analytics. Read on to discover details of their strategy and determine if your organization would benefit by adopting similar practices.
Posted: 11 Sep 2015 | Published: 30 Sep 2014

Hitachi Data Systems

Become a Technology Partner with Citrix and Expand Your Business Reach
sponsored by Citrix Ready
WEBCAST: This webinar describes how Citrix Ready showcases verified products that are trusted to enhance Citrix solutions for mobility, virtualization, networking, and cloud platforms. View now to learn how becoming a technology partner with Citrix can expand your business reach.
Posted: 09 Sep 2015 | Premiered: Nov 3, 2015

Citrix Ready

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology

Best Practices: Laptop and Mobile Backups Today
sponsored by SearchDataBackup.com
EBOOK: This handbook offers insight into what's available today for laptop and mobile backup, how vendors are addressing the challenges associated with backing up these devices and how to choose a solution that's right for you and your needs.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SearchDataBackup.com
76 - 100 of 1877 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement