IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
1 - 25 of 1524 Matches Previous Page  |  Next Page
Endpoint Protection
sponsored by Malwarebytes
WHITE PAPER: Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.
Posted: 17 Jan 2020 | Published: 30 Jun 2019

Malwarebytes

Here are the Work Elements You’ll See in a Mobile App DevelopmentAgreement
sponsored by CMOLDS
RESOURCE: Communication between the developer and the client often determines whether the vision of the product is actualized or not. Mobile app development agreements are one way to ensure this communication happens reliably. Read this white paper now to learn what exactly you should include in your mobile app agreement.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

CMOLDS

Lookout Phishing and Content Protection
sponsored by Lookout Inc.
DATA SHEET: While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.
Posted: 09 Jan 2020 | Published: 25 Oct 2018

Lookout Inc.

Mobile Phishing Killchain
sponsored by Lookout Inc.
RESOURCE: To an attacker looking to execute a phishing attack, mobile devices are an easy target. Continue to this infographic, which follows the lifecycle of a mobile phishing attack from inception to data breach and discover the security measures that could’ve been taken.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

Lookout Inc.

Mobile Phishing 2018: Myths and Facts Facing Every Modern Enterprise Today
sponsored by Lookout Inc.
WHITE PAPER: Mobile devices have opened a profitable new window of opportunity for criminals executing phishing attacks. This white paper explores the common myths and facts around mobile phishing to help your organization identify and remediate threats.
Posted: 09 Jan 2020 | Published: 20 Mar 2018

Lookout Inc.

Preventing Unknown, Zero-Day Attacks
sponsored by Checkpoint Software Technologies
DATA SHEET: The increasing reliance of mobile devices to conduct business operations organizations vulnerable to hackers who would look to expose these weaknesses. In this solution brief, learn more about the benefits and features of Check Point SandBlast Mobile and discover how it compares to similar industry offerings.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Checkpoint Software Technologies

The 2020 Vision: The Next Decade for Mobile Intelligence
sponsored by MicroStrategy
WHITE PAPER: By 2022, its estimated that over half of organizations will be forced to re-examine the role of mobile devices within their workforce – and with good reason. Inside this research report, learn more about this impending “mobile imperative” and what it will mean for your organization in the not-so-distant future.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

MicroStrategy

The changing mobile platform landscape
sponsored by ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Perspectives from HIMSS 2019
sponsored by TechData - HPE
WHITE PAPER: There’s one critical rule of healthcare: put the patient first. Open this whitepaper to read about Dr. Rucker’s speech at the 2019 HIMSS, which highlights how healthcare must leverage IT mobile device interconnectivity to deliver premium care with instant personal health data accessibility for patients.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE

Device as a Service
sponsored by NWN Corporation
PRODUCT OVERVIEW: Download this white paper to learn how organizations are using device-as-a-service (DaaS) solutions to streamline endpoint management and device security responsibilities – and keep overhead and operational costs at a minimum.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

NWN Corporation

UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up
sponsored by PortSys
RESOURCE: US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

PortSys

When MDM is Not Enough: Context is Key
sponsored by PortSys
RESOURCE: While Mobile Device Management (MDM) helps to manage a smartphone or tablet device to ensure that device is valid and approved, beyond this, many organizations still rely on usernames and passwords to determine access privilege. Read this article for reasons on why access control is so important when managing mobile devices today.
Posted: 03 Oct 2019 | Published: 01 Nov 2018

PortSys

Unified Endpoint Management
sponsored by TechTarget
RESOURCE: In this guide, learn how unified endpoint management (UEM) can supplement traditional mobility strategies to help ease the management and security burden facing your IT team.
Posted: 03 Oct 2019 | Published: 03 Dec 2019

TechTarget

Myth Busting Retail Associate Mobile Enablement
sponsored by Infovista
RESOURCE: Smart use of mobile technologies can help retailers make store managers and associates more efficient, effective and productive in performing both customer-facing and operational tasks—so what’s holding you back? Download this resource for 10 myths that may prevent retailers from realizing benefits of mobile technology.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Infovista

Workplace Strategy Guide for IT
sponsored by Workplace by Facebook
WHITE PAPER: Highly-connected organizations are leaps more successful than those who aren't; and the data speaks for itself. Peek inside to learn about the quantified impact that a digital, highly-connected workplace can have on productivity, employee retention, and cyber-security.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Workplace by Facebook

How to Lock Down Mobile Devices, Printers, and Laptops from Costly Cyberattacks
sponsored by TechTarget
RESOURCE: Are we just supposed to shrug our shoulders and pretend we can't combat the proliferation of endpoints with smarter security tactics? Not a chance. Complete our endpoint security survey for access to our e-guide, which comes packed with powerful tips and tactics to lock down mobile devices, printers, and laptops from costly cyberattacks.
Posted: 13 Jul 2019 | Published: 03 Dec 2019

TechTarget

Computer Weekly – 4 June 2019: GDPR one year on – is it working?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
Posted: 03 Jun 2019 | Published: 04 Jun 2019

ComputerWeekly.com

Mobile Technology Developments To Watch 2019
sponsored by Magenic
WHITE PAPER: Inside this report, find out what mobility developments you should keep a lookout for. You'll find a breakdown of expected market leaders, new gaps in the mobility industry, and impending technology advancements like cross-platform development tools, mobile QA tools, and more.
Posted: 28 May 2019 | Published: 28 May 2019

Magenic

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 24 May 2019 | Published: 24 May 2019

ComputerWeekly.com

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

How Violin Systems Drives Compelling Value for Enterprises
sponsored by Violin Systems
ANALYST REPORT: IDC profiles the evolving all-flash market in this analyst report, with particular attention given to AFA vendor Violin Systems and their role in servicing the needs of performance-sensitive workloads as the industry transitions from SCSI to NVMe technology. To stay on top of the latest developments, view the report here.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

Violin Systems

CW Middle East ezine April 11 2019
sponsored by ComputerWeekly.com
EZINE: It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.
Posted: 05 Apr 2019 | Published: 11 Apr 2019

ComputerWeekly.com

3 Tips to Keep Field Workers Productive
sponsored by Dell and Intel®
RESOURCE: Check out this infographic to learn 3 ways you can provide field workers with the tools they need to be most productive in any environment.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Dell and Intel®

The changing mobile platform landscape
sponsored by ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

ComputerWeekly.com

Crafting a Secure Endpoint Management Strategy
sponsored by Vox Mobile Solutions
EGUIDE: Download this e-guide, to learn what steps your IT team can take in order to ensure that there are no gaps in your endpoint security strategy, and avoid potentially detrimental attacks.
Posted: 21 Feb 2019 | Published: 21 Feb 2019

Vox Mobile Solutions
1 - 25 of 1524 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info