IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 
Definition continues below.
Mobile Device Management Reports
76 - 100 of 1896 Matches Previous Page  |  Next Page
eBook: How Customer Experience Impacts Your Identity and Access Management Practices
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper discusses how customer experience influences IAM and security and examines the actions you can take to deliver secure, seamless experience for your customers.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Learn why NSS Labs Recommends NetScaler AppFirewall
sponsored by Citrix
WEBCAST: This exclusive webcast takes an in-depth look at application firewalls and includes a study of how one web application firewall (WAF) was able to toe the line and meet industry standards. Read on to learn more.
Posted: 28 Jan 2015 | Premiered: Jan 26, 2015

Citrix

How to Empower Mobile Workers With Remote Desktop Apps
sponsored by SearchConsumerization.com
EBOOK: Mobility is expected to lead to greater employee efficiency, but are enterprises properly encouraging mobile workers and measuring the effects of mobile apps on productivity?
Posted: 28 Jan 2015 | Published: 28 Jan 2015


Mobile Applications: How to Stay Ahead of the Game
sponsored by Hewlett-Packard Company
VIDEO: This video reveals the importance of mobile application testing and monitoring, and how IT professionals can perform tests remotely through real life mobile devices.
Posted: 27 Jan 2015 | Premiered: 27 Jan 2015

Hewlett-Packard Company

Mobile Computing Strategies in Manufacturing
sponsored by Epicor Software Corporation
EGUIDE: This expert e-guide offers advice for manufacturing firms interested in developing a mobile computing strategy and how to find the right role for mobile business applications in manufacturing.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Epicor Software Corporation

Top Advice for Implementing Mobile ERP
sponsored by Epicor Software Corporation
EGUIDE: Access this in-depth, expert e-guide to learn more about mobile and cloud technologies and how these technologies can ease ERP woes.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Epicor Software Corporation

Is Your Printing/Imaging Environment Exposing Your Sensitive Data?
sponsored by Hewlett-Packard Limited
WHITE PAPER: This exclusive white paper dives into some of the toughest challenges with data security.  Read on to learn more.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Hewlett-Packard Limited

Evolve Your Mobile Mindset: Deliver the Service Your Customers Expect
sponsored by [24]7
WHITE PAPER: This exclusive white paper looks at the changes sales and services must make in creating a mobile mindset.
Posted: 23 Jan 2015 | Published: 15 Dec 2014

[24]7

No Magic Required for Effective Mobile Content Management Strategy
sponsored by IBM
EGUIDE: Mobile devices are now mainstream in terms of enabling organizations' content. In this solution spotlight, Steve Weissman of Holly Group shares expert guidelines for developing a mobile content management strategy that will accelerate workforces and business processes.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

IBM

Usability, Security Balance Needed in Mobile Content Management
sponsored by IBM
EGUIDE: Before organizations implement a mobile content management strategy, there are a few things to consider. In this solution spotlight, Steve Weissman of Holly Group shares an expert outlook on the necessary security changes to be made, including protecting the information itself, as well as securing the devices.
Posted: 22 Jan 2015 | Published: 22 Jan 2015

IBM

Enterprises Need Layered Security Framework to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: Access this white paper to discover why there are so many data breaches and what can be done to better defend against cyber-attacks in the future. Find out how an end-to-end layered security strategy can help your organization to better protect endpoints across the enterprise.
Posted: 22 Jan 2015 | Published: 28 Nov 2014

Absolute Software

Empowering the Mobile Workforce: Hosted Voice Solutions Help Boost Productivity and Customer Service
sponsored by Comcast
WHITE PAPER: This exclusive white paper takes an in-depth look at a future weapon for mobility: the cloud.  Read on to learn more.
Posted: 20 Jan 2015 | Published: 20 Jan 2015

Comcast

Mobility: The New Standard for Engaging and Inspiring Better Business
sponsored by Epicor Software Corporation
VIDEO: The newest trends in mobile applications are being leveraged to enable more effective data analytics, stronger collaboration, faster decision making, and increased customer satisfaction. Watch this video to get Constellation research specialist R "Ray" Wong's advice.
Posted: 19 Jan 2015 | Premiered: 19 Jan 2015

Epicor Software Corporation

Case Study: Implementing Mobile File Management for Secure Remote File Access
sponsored by Acronis
CASE STUDY: Employees want the convenience of working from a mobile device, and employers want to make sure their corporate data is secure. Read on to learn about Bedford Industries, who wanted to incorporate tablets into its business, but wanted to keep important files safe.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Acronis

The Cost of a Data Breach: Healthcare Settlements Involving Lost or Stolen Devices
sponsored by Absolute Software
WHITE PAPER: With the rise of electronic medical records and portable devices, 39% of Healthcare security incidents are caused by stolen or misplaced endpoints. This white paper examines three recent data breaches listed on the U.S. Department of Health and Human Services' website directly related to stolen or misplaced devices.
Posted: 19 Jan 2015 | Published: 19 Jan 2015

Absolute Software

Why IT Leaders Should Take Strategic Action in Mobile and Endpoint Computing in 2015
sponsored by Absolute Software
WHITE PAPER: This white paper explains why enterprises should develop a broader-based, long-term endpoint strategy that connects to business goals, processes, and practices.
Posted: 19 Jan 2015 | Published: 25 Apr 2014

Absolute Software

Computer Weekly – 20 January 2015: FT sold on cloud benefits
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the Financial Times CTO about the publisher's successful move to the public cloud and plans for further expansion to meet its data warehousing needs. And we examine the emerging market for mobile application services in the cloud. Read the issue now.
Posted: 19 Jan 2015 | Published: 16 Jan 2015

ComputerWeekly.com

Bring Your Own Device: Driving Workforce Productivity with Bring Your Own Device (BYOD)
sponsored by Acronis
WHITE PAPER: In today's mobile world, workers want to work from anywhere- not just in the office. Bring Your Own Device (BYOD) policies increase employee productivity, but can also pose security risks. This white paper details to deploy a BYOD program that keeps information on mobile devices secure.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Acronis

Promoting Visibility And Efficiency With Mobile ERP
sponsored by Epicor Software Corporation
WHITE PAPER: Access this white paper to learn more about the major benefits of bringing mobility and ERP together, including what it can do for your data integration and reporting capabilities.
Posted: 16 Jan 2015 | Published: 29 Jan 2011

Epicor Software Corporation

Increase your Competitiveness with a Mobilized Workforce
sponsored by Acronis
CASE STUDY: Today, more and more of the workforce is working remotely. Between remote access to files, BYOD, and file sharing, IT can become overwhelmed with managing corporate data and keeping it secure. This white paper details a case study that features The Morse Group and their mobile workforce.
Posted: 15 Jan 2015 | Published: 15 Jan 2015

Acronis

Building data-driven applications in the cloud - Four characteristics of top-notch big data cloud solutions
sponsored by IBM
WHITE PAPER: This white paper explains why businesses need cloud-enabled big data analysis systems that are flexible, simple, secure and open. Read on to learn more.
Posted: 15 Jan 2015 | Published: 30 Sep 2014

IBM

Endpoint Data Protection: A Buyer's Checklist
sponsored by CommVault
WHITE PAPER: This exclusive white paper takes an in-depth look a end point security for enterprise mobility, and why end point data backup is critical for organizations today. Read on to learn more.
Posted: 14 Jan 2015 | Published: 14 Jan 2015

CommVault

How new F&A Solutions Can Help CFOs Improve Forecasting Performance
sponsored by Anaplan
WHITE PAPER: Access this white paper to find out how new FP&A software can help CFOs improve forecasting performance and provide universal access through mobile devices and increasingly powerful analytics while lowering the entry barriers to software deployment.
Posted: 13 Jan 2015 | Published: 31 May 2014

Anaplan

Enterprise Mobility-as-a-Service
sponsored by Dimension Data
PRODUCT OVERVIEW: This exclusive white paper dives into Enterprise Mobility-as-a-Service (EMaaS) and explains the benefits that come along with this new option. Read on to learn more.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Dimension Data

Enterprise Mobility: Employee Engagement Essentials
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive research study conducted by Cisco offers a look at how employees feel about enterprise mobility.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Cisco Systems, Inc.
76 - 100 of 1896 Matches Previous Page    2 3 4 5 6 7    Next Page
 
MOBILE DEVICE MANAGEMENT DEFINITION (continued): …  the operation of conventional cell phones, smart phones and similar devices as easily as is done with desktop computers.The ideal mobile device management tool:Is compatible with all common handheld device operating platforms and applications. Can function through multiple service providers. Can be implemented directly over the air, targeting specific devices as necessary.Can deploy next-generation hardware, operating platforms and applications quickly.Can add or remove devices from the system as necessary to ensure optimum network efficiency and security.Getting started with mobile device managementTo … 
Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement