IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
1 - 25 of 1540 Matches Previous Page  |  Next Page
Global Smart Meter Manufacturer Secures Move to Microsoft Intune with Lookout
sponsored by Lookout
CASE STUDY: With organizations growing more reliant on remote access capabilities, endpoint security becomes necessary to meet internal and industry security regulations. In this case study, discover how Landis+Gyr, an energy management leader, developed and deployed an advanced mobile security strategy to protect their endpoints
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Lookout

Post-Perimeter Security 101: Dawn of a Borderless World
sponsored by Lookout
WEBCAST: With organizations’ networks expanding to accommodate the need for mobile device access, perimeter security tools and practices have changed to include remote endpoints. In this webinar, Lookout’s Chief Security Officer, Aaron Cockerill, shares his expertise in protecting sensitive data in a ‘post-perimeter’ landscape.
Posted: 25 Nov 2019 | Premiered: Mar 4, 2019

Lookout

Lookout discovers Monokle, new mobile surveillanceware
sponsored by Lookout
WEBCAST: In July of 2019, Lookout’s Security Research team announced its discovery of Monokle, a set of mobile surveillanceware tools. These tools were connected to a Russia-based company sanctioned by the U.S. Government in connection with the 2016 Presidential election. Continue to watch a brief video highlighting this discovery!
Posted: 22 Nov 2019 | Premiered: Aug 13, 2019

Lookout

Schneider Electric Secures 50,000 Devices with Lookout
sponsored by Lookout
CASE STUDY: As organizations shift towards remote access capabilities, securing mobile devices should be a top priority. In this case study, discover how Schneider Electric, a leader in energy management and automation, was able to build a complete mobile security strategy.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Lookout

The 2020 Vision: The Next Decade for Mobile Intelligence
sponsored by MicroStrategy
WHITE PAPER: By 2022, its estimated that over half of organizations will be forced to re-examine the role of mobile devices within their workforce – and with good reason. Inside this research report, learn more about this impending “mobile imperative” and what it will mean for your organization in the not-so-distant future.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

MicroStrategy

Architecting for the future: The benefits of running Windows workloads on AWS
sponsored by DMI Inc
WHITE PAPER: Many once thought the cloud was unfit for running mission-critical Windows apps, but it has now become absolutely essential. Learn more about the benefits of migrating Windows apps to the cloud in this white paper.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

DMI Inc

New 2019 Cybercrime Report Tracks Growing Threat of Networked Cybercrime
sponsored by LexisNexis® Risk Solutions
WEBCAST: The LexisNexis® Risk Solutions Cybercrime Report provides unique insight into global transaction patterns and emerging cybercrime threats. Join this 50-minute webinar to learn key findings and insights from the 2019 LexisNexis® Risk Solutions Cybercrime Report.
Posted: 06 Nov 2019 | Premiered: Nov 6, 2019

LexisNexis® Risk Solutions

The changing mobile platform landscape
sponsored by ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 29 Oct 2019 | Published: 29 Oct 2019

ComputerWeekly.com

Perspectives from HIMSS 2019
sponsored by TechData - HPE
WHITE PAPER: There’s one critical rule of healthcare: put the patient first. Open this whitepaper to read about Dr. Rucker’s speech at the 2019 HIMSS, which highlights how healthcare must leverage IT mobile device interconnectivity to deliver premium care with instant personal health data accessibility for patients.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE

The Future of Workforce Productivity is Now
sponsored by Citrix
WHITE PAPER: Download this white paper to learn 5 ways to reign in your mobile workforce technology in a manner that supports modern workspace flexibility, while minimizing new and ever-growing security risks.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Citrix

Device as a Service
sponsored by NWN Corporation
PRODUCT OVERVIEW: Download this white paper to learn how organizations are using device-as-a-service (DaaS) solutions to streamline endpoint management and device security responsibilities – and keep overhead and operational costs at a minimum.
Posted: 08 Oct 2019 | Published: 08 Oct 2019

NWN Corporation

UK Leads the Way for Security of Mobile Workforce; US Needs to Step it Up
sponsored by PortSys
RESOURCE: Companies US companies have dominated the media attention and have built considerable business helping to secure mobile devices.  But, the international competition is growing quite substantially. Learn about the state of mobile security in the UK vs. the US in this PortSys blog post from Michael Oldham.
Posted: 04 Oct 2019 | Published: 04 Oct 2019

PortSys

When MDM is Not Enough: Context is Key
sponsored by PortSys
RESOURCE: While Mobile Device Management (MDM) helps to manage a smartphone or tablet device to ensure that device is valid and approved, beyond this, many organizations still rely on usernames and passwords to determine access privilege. Read this article for reasons on why access control is so important when managing mobile devices today.
Posted: 03 Oct 2019 | Published: 01 Nov 2018

PortSys

Unified Endpoint Management
sponsored by TechTarget
RESOURCE: In this guide, learn how unified endpoint management (UEM) can supplement traditional mobility strategies to help ease the management and security burden facing your IT team.
Posted: 03 Oct 2019 | Published: 03 Dec 2019

TechTarget

Myth Busting Retail Associate Mobile Enablement
sponsored by Infovista
RESOURCE: Smart use of mobile technologies can help retailers make store managers and associates more efficient, effective and productive in performing both customer-facing and operational tasks—so what’s holding you back? Download this resource for 10 myths that may prevent retailers from realizing benefits of mobile technology.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Infovista

Workplace Strategy Guide for IT
sponsored by Workplace by Facebook
WHITE PAPER: Highly-connected organizations are leaps more successful than those who aren't; and the data speaks for itself. Peek inside to learn about the quantified impact that a digital, highly-connected workplace can have on productivity, employee retention, and cyber-security.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

Workplace by Facebook

8 Most Important AI and Analytics Trends of 2019
sponsored by DMI Inc
WHITE PAPER: Organizations looking to embrace AI and analytics trends should start with a well-thought-out roadmap. Read this white paper for 8 current top trends in AI and analytics, as well as advice on how to “walk before you run” towards your ambitious AI initiatives.
Posted: 30 Sep 2019 | Published: 30 Sep 2019

DMI Inc

Why Disruption Management is Crucial to Making Transportation Systems Safer and More Trustworthy
sponsored by DMI Inc
WHITE PAPER: Snowstorms block highways and shut down airports. Hurricanes force mass evacuations and cripple infrastructure. Accidents require traffic to be rerouted. Dive into this white paper to learn how disruption management technologies are evolving, and how smart technology is poised to reshape the future of transportation.
Posted: 24 Sep 2019 | Published: 31 Dec 2018

DMI Inc

Transport for London Customer Story
sponsored by BMC
CASE STUDY: Since implementing a mobile workforce London transportation has seen accelerated ticket exchanges while savings costs. Read this case study to see how Transport for London turned mobile devices into a workforce solution that helped solve London's transportation issues.
Posted: 16 Jul 2019 | Published: 31 Dec 2017

BMC

How to Lock Down Mobile Devices, Printers, and Laptops from Costly Cyberattacks
sponsored by TechTarget
RESOURCE: Are we just supposed to shrug our shoulders and pretend we can't combat the proliferation of endpoints with smarter security tactics? Not a chance. Complete our endpoint security survey for access to our e-guide, which comes packed with powerful tips and tactics to lock down mobile devices, printers, and laptops from costly cyberattacks.
Posted: 13 Jul 2019 | Published: 03 Dec 2019

TechTarget

Computer Weekly – 4 June 2019: GDPR one year on – is it working?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a year after the EU's General Data Protection Regulation (GDPR) came into force, we assess its progress. Fears of technology are holding back digital healthcare – we look at the tech that's bringing back a human touch. And we examine Microsoft's desktop management tools for Windows 10. Read the issue now.
Posted: 03 Jun 2019 | Published: 04 Jun 2019

ComputerWeekly.com

Mobile Technology Developments To Watch 2019
sponsored by Magenic
WHITE PAPER: Inside this report, find out what mobility developments you should keep a lookout for in 2019. You'll find a breakdown of expected market leaders, new gaps in the mobility industry, and impending technology advancements like cross-platform development tools, mobile QA tools, and more.
Posted: 28 May 2019 | Published: 28 May 2019

Magenic

Computer Weekly – 28 May 2019: Technology at heart of Spurs' new stadium
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, the IT chief at Tottenham Hotspurs FC discusses the tech behind the most technologically advanced football stadium in the world. We also investigate how the data powering artificial intelligence is leading to discriminatory algorithms and explore the inherent risks in 5G mobile networks. Read the issue now.
Posted: 24 May 2019 | Published: 24 May 2019

ComputerWeekly.com

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

How Violin Systems Drives Compelling Value for Enterprises
sponsored by Violin Systems
ANALYST REPORT: IDC profiles the evolving all-flash market in this analyst report, with particular attention given to AFA vendor Violin Systems and their role in servicing the needs of performance-sensitive workloads as the industry transitions from SCSI to NVMe technology. To stay on top of the latest developments, view the report here.
Posted: 12 Apr 2019 | Published: 12 Apr 2019

Violin Systems
1 - 25 of 1540 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement