IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
1 - 25 of 1585 Matches Previous Page  |  Next Page
Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc

Mobile Workforce Management Best Practices
sponsored by Skedulo
RESOURCE: “Mobile workforce management” is a sweeping term that refers to the software, applications, tools, and other services that are used to manage employees while they work outside the four walls of the office. Jump inside to learn about the three major challenges that an effective mobile workforce management strategy can help your organization tackle.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Skedulo

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

CyberArk Provides Free Subscription to Alero
sponsored by Cyber-Ark Software
RESOURCE: The emergence of COVID-19 has caused sweeping environmental changes amongst organizations doing their part to stop the spread, enabling more employees to work remotely than ever before. To help ease the transition, CyberArk is planning to offer its secure remote access platform at no cost through May. Read on to learn more.
Posted: 24 Mar 2020 | Published: 18 Mar 2020

Cyber-Ark Software

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

What Do Field Service Techs Want in a Mobile App?
sponsored by Skedulo
RESOURCE: Inside this blog post, learn how to pinpoint the right applications for your field service techs based on a collection of criteria designed to get the most bang for your buck: user-friendly interfaces, travel tool features, and field data collection capabilities.
Posted: 24 Mar 2020 | Published: 12 Oct 2018

Skedulo

How to Recognize and Resist Common Email Cons
sponsored by Trustwave
RESOURCE: The frequency and success of phishing attacks is increasing at an alarming rate. Just when organizations believe they understand how to spot an attempt, hackers come up with new ways to infect inboxes. This infographic outlines how to spot a phishing attack by looking at emerging tactics and how to spot them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Greater IoT connectivity
sponsored by Aeris
RESOURCE: The rise of IoT, RFID and other technologies has created a connective tissue that ties inaspects that were otherwise kept separate. Greater connectivity has touched numerous aspects of our lives, from smarter cars to connected homes to smart factories.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Aeris

Planning to scale for IoT connectivity: 3 key traits of IoT partners
sponsored by Aeris
RESOURCE: Discover how to create a M2M and IoT connectivity strategy that suits not only the needs of today but scales for the demands of tomorrow. Read on to learn about 3 traits to look for in an IoT partner and 3 IoT connectivity case studies.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Aeris

Securely Manage 3rd Party Remote Access to CyberArk
sponsored by Cyber-Ark Software
WEBCAST: Third-party vendor access is a critical component to most business operations today. However, this presents a new vulnerability that cybercriminals look to expose. In this webinar, take a closer look at notable breaches and challenges with existing third-party access security options. Continue to watch the webinar.
Posted: 23 Mar 2020 | Premiered: Mar 23, 2020

Cyber-Ark Software

The Rise of the Mobile Workforce and Deskless Workers
sponsored by Skedulo
RESOURCE: Inside this article, uncover the three core challenges facing organizations looking to cater to the demands of today’s mobile workforce – and find out how to solve them.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Skedulo

Securely and Quickly Connect Remote Vendors and Employees to CyberArk.
sponsored by Cyber-Ark Software
RESOURCE: According to a recent CyberArk study, even though a vast majority of organizations rely on third-party vendor access, 72% rank this as one of their top 10 security risk areas. This blog post provides an in-depth look at CyberArk Alero, designed to address this vulnerability. Read on to learn more.
Posted: 23 Mar 2020 | Published: 23 Mar 2020

Cyber-Ark Software

Access Management Handbook
sponsored by Thales
EBOOK: The concept of access management was created to address the changing security threats that came as a result of cloud migration and remote device enablement. This handbook provides a glossary of key access management terms and definitions. Read on to familiarize yourself with the terms.
Posted: 23 Mar 2020 | Published: 30 Sep 2019

Thales

CyberArk Alero
sponsored by Cyber-Ark Software
DATA SHEET: Today’s modern workforce, consisting of remote employees, mobile devices and distributed networks, requires account access management in order to maintain the safety of the network as perimeters vanish. Download this data sheet to explore the features and benefits of CyberArk’s Alero offering, designed to address privileged access needs.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Cyber-Ark Software

Do Your Mobile Workers Have What It Takes to Keep Customers Coming Back?
sponsored by Skedulo
RESOURCE: Your mobile workers are on the front lines of customer service – quite literally. Dive into this blog post to learn how to cater your mobile employees’ work strategies – and the tools they use – towards providing a seamless customer experience.
Posted: 20 Mar 2020 | Published: 26 Mar 2018

Skedulo

5 Ways Workforce Visibility Can Transform Your Customer Service
sponsored by Skedulo
RESOURCE: Workforce visibility is the ability to reference data about your employees to obtain a real-time understanding of who is working for your brand, what they are capable of, and how they are completing their work. Uncover the 5 ways increasing visibility into your mobile workforce can transform customer service quality for the better.
Posted: 20 Mar 2020 | Published: 20 Mar 2020

Skedulo

How Mobile Workforce Management Affects Customers
sponsored by Skedulo
RESOURCE: Jump inside this blog post to learn how increasing your mobile workforce management capabilities can swing around and help increase your organization’s customer experience quality – a metric worth its weight in gold in today’s user-first world.
Posted: 19 Mar 2020 | Published: 19 Jul 2019

Skedulo

Magic Quadrant for Secure Web Gateways
sponsored by Menlo Security
RESOURCE: Secure web gateways (SWGs) are becoming a staple at most organizations, allowing them to secure endpoints and devices existing outside the perimeter. In this Magic Quadrant report, Gartner evaluates key SWG offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 18 Mar 2020 | Published: 11 Nov 2019

Menlo Security

Morphisec Allows Citizens Medical Center to Focus on Saving Lives
sponsored by Morphisec, Inc.
CASE STUDY: In this case study, follow the journey of Citizens Medical Center, a hospital in Texas, as they partner with Morphisec to address the endpoint security needs of their increasingly distributed environment while overcoming challenges related to budgetary constraints and access to talent. Download now to learn more.
Posted: 18 Mar 2020 | Published: 18 Mar 2020

Morphisec, Inc.

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

Unified Endpoint Management: State of a Converging Market
sponsored by SHI International Corporation
WHITE PAPER: Unified Endpoint Management (UEM) is the latest development in an endpoint device market that has continued to see providers expand their services and centralize management. Now, UEM software solutions have begun to provide businesses with ways to control more about their company devices. Read on to learn more about UEM in this IDC white paper.
Posted: 17 Mar 2020 | Published: 17 Mar 2019

SHI International Corporation

Outpace Security Risk with Strong Foundational Programs
sponsored by Optiv
RESOURCE: Although embracing digital transformation enables organizations to employ a more distributed workforce, it exposes their endpoints to potential security threats. Download this infographic to discover 3 steps you can take to help close the gap.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Optiv

5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

Expanding Infrastructure During Rapid Growth
sponsored by 42 Lines
RESOURCE: As a pioneer in the connected health and fitness market, Fitbit went from a startup to a tech powerhouse in a short period of time.
Posted: 16 Mar 2020 | Published: 16 Mar 2020


5 Steps to Modernize Your BYOD Strategy
sponsored by VMware
WHITE PAPER: Jump inside this eBook to learn the five best practices you should know while strategizing and managing a new BYOD program – and learn how to keep all devices on your network secure in the process.
Posted: 06 Mar 2020 | Published: 06 Mar 2020

VMware
1 - 25 of 1585 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info