IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
1 - 25 of 2063 Matches Previous Page  |  Next Page
The changing mobile platform landscape
sponsored by ComputerWeekly.com
EGUIDE: So while there will inevitably be heated debates over which mobile platform is better, or which one to develop for first, the real opportunity comes when the discussion moves above the hardware to how an app can derive value by connecting to different business platforms and ecosystems. Find out more in this eguide.
Posted: 18 Jan 2019 | Published: 18 Jan 2019

ComputerWeekly.com

Braum's Ice Cream Gets Sweeter With Mobile Apps
sponsored by LANSA
CASE STUDY: In this case study, find out how Braum's was able to streamline reporting and speed up productivity through a mobile app development platform that enabled timely data-driven decisions, eliminated manual data entry and much more.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

LANSA

Maintain Compliance and Bolster Security with Information Archiving
sponsored by Micro Focus
WHITE PAPER: This white paper describes the critical importance of archiving communication tools like mobile, video, and social media; discusses the five types of archiving; and spotlights the benefits of archiving for reducing email server strain and more. View the paper here to get started.
Posted: 17 Jan 2019 | Published: 17 Jan 2019

Micro Focus

Putting the Trust in Zero Trust: Post-Perimeter Security for a New Age of Work
sponsored by Lookout
WHITE PAPER: As employees continue to use a mix of managed and unmanaged devices, it sets up the need for a new security architecture: Post-perimeter security. Read on to find out why perimeter security is no longer viable and how you can embrace this new architecture in your environment.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Lookout

Mobile Endpoint Security
sponsored by Lookout
DATA SHEET: Download this white paper to learn about a comprehensive mobile endpoint security strategy that uses AI to close any potential security gaps – protecting your data at all levels.
Posted: 15 Jan 2019 | Published: 15 Jan 2019

Lookout

Henkel Extends Compliance to Mobile: Security Case Study
sponsored by Lookout
CASE STUDY: Learn how Henkel was able to achieve security for their devices and data using Lookout Mobile Threat Defense.
Posted: 14 Jan 2019 | Published: 14 Jan 2019

Lookout

Rugged Devices Face a Mobile-fueled Transition
sponsored by Panasonic - Toughbook
EGUIDE: This expert guide examines the issues with ruggedized PCs and how smartphones will eventually dominate them, as well as how to simplify the IoT device development process for personal and industrial safety in rugged environments. Continue reading here.
Posted: 11 Jan 2019 | Published: 07 Jan 2019

Panasonic - Toughbook

Program Launch: Citrix Ready Secure Remote Access Program
sponsored by Citrix Ready
WEBCAST: Tune in at 9:00 AM PST on Thursday, February 7th to learn about the Citrix Ready Secure Remote Access Program, a new evolution in the cyber-security landscape designed to smoothly integrate security considerations into the flexibility of today's workforce.
Posted: 08 Jan 2019 | Premiered: Jan 8, 2019

Citrix Ready

Expert tips for mobile device management
sponsored by Panasonic - Toughbook
EGUIDE: Has your organization considered a mobile device management strategy for 2019? See our experts' top tips in this guide.
Posted: 07 Jan 2019 | Published: 07 Jan 2019

Panasonic - Toughbook

Text Messages & Social Media in Public Safety
sponsored by Smarsh
WHITE PAPER: The popularity of text messaging and social media has exploded in recent years, including in the workplace. In this white paper, examine how public safety agencies can create policies that allow for compliant use of text messaging and social media, and how to retain those communications for an efficient response to open records requests.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

The Public Sector Guide to Text Messaging Policy and Retention
sponsored by Smarsh
WHITE PAPER: Sending text messages between mobile devices is now public business, and by law, the records need to be preserved. This white paper contains steps that will help public sector organizations develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication.
Posted: 18 Dec 2018 | Published: 18 Dec 2018

Smarsh

Managing Mobile Risk in Healthcare
sponsored by MobileIron
RESOURCE: It's extremely important in the healthcare industry for organizations to secure their endpoints – mobile devices included. In this resource, learn how you can use a threat defense application to enhance the security and privacy of your endpoints and protect patient data against cyberattacks.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MobileIron

Three Steps to Optimize Your Mobile Strategy
sponsored by MicroStrategy
WHITE PAPER: The mobile revolution and the need for mobile apps in the enterprise has changed the game for IT, and brought on new challenges – from mobile app development, to security, user experience, and more. Download this white paper to learn how you can seamlessly prepare your organization's mobility strategy for the future in three steps.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

MicroStrategy

Choosing the right Mobile Devices for Your Employees
sponsored by TechTarget
RESOURCE: Download this Essential Guide: Buying the Right Mobile Devices for Your Workers, to help choose the best hardware option for your organization.
Posted: 04 Dec 2018 | Published: 04 Dec 2018

TechTarget

Devices-as-a-Service Potential Set to Expand for Channel Partners and Organizations
sponsored by CompuCom Systems, Inc.
EGUIDE: This expert guide serves as your window into the DaaS market—deconstructing the DaaS growth forecast, how to become a DaaS provider should you choose to do so, and how your company can make the most of mobile services. Read on for the details.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

CompuCom Systems, Inc.

Guide to Mobile Device Vulnerabilities
sponsored by ComputerWeekly.com
RESOURCE: Are you prepared? Improper access or limited visibility can lead to unintended data exposure or insider theft. Your free application security guide awaits. Guide includes: Recent mobile attacks, Android vulnerabilities,  Janus malware mitigation, And more
Posted: 21 Nov 2018 | Published: 21 Nov 2018

ComputerWeekly.com

CW ASEAN, November 2018: Blockchain is no 'magic wand' for security
sponsored by ComputerWeekly.com
EZINE: Blockchain is all the rage, although the technology is so much more than just about bitcoin and cryptocurrencies. In this issue of CW ASEAN, we examine how blockchain is being applied in cyber security, and whether the technology is really as secure as claimed by its proponents. Read the issue now.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

ComputerWeekly.com

Going Global: How a Secure Digital Workspace Can Streamline Your Move into New Markets
sponsored by Citrix
WHITE PAPER: Download this white paper to find out how a unified digital workspace can help your IT teams manage endpoints – whether on-prem, or across hybrid and multi-clouds. You'll find out how you can deliver personalized experiences, offer device choice, simplify management, and more.
Posted: 06 Dec 2018 | Published: 06 Dec 2018

Citrix

Envisioning the Digital Workspace
sponsored by Citrix
WHITE PAPER: View this info-graphic to find out how companies are embracing digital workspace and unified endpoint management strategies – and why some are falling behind.
Posted: 05 Dec 2018 | Published: 05 Dec 2018

Citrix

Workplace Efficiency: Drive Employee Productivity with Efficient IT Technologies
sponsored by Lenovo & Microsoft
RESOURCE: Check out this infographic to learn how a suite of workplace devices can help your organization bridge the gap between IT and end users, from endpoint devices designed for workspace optimization, to IT automation services, downtime reduction, and more.
Posted: 27 Nov 2018 | Published: 27 Nov 2018

Lenovo & Microsoft

Build & Grow with Citrix Ready
sponsored by Citrix
RESOURCE: If you have Citrix-compatible product offerings, clearly showcasing these capabilities can help expand your customer base. Click here, to learn how joining the Citrix Ready partner program provides a way for your customers to explore and evaluate your verified Citrix compatible products.
Posted: 14 Nov 2018 | Published: 14 Nov 2018

Citrix

AWS Live Panel Discussion: Large-Scale IoT Device Management
sponsored by Amazon Web Services
VIDEO: Tune into this panel to hear from execs from AWS, Intel, and more as they discuss the challenges and opportunities presented by device management, present and future.
Posted: 12 Nov 2018 | Premiered: 25 Jul 2018

Amazon Web Services

Insights and analytics by IBM MaaS360 with Watson
sponsored by IBM
WHITE PAPER: Check out this white paper to find out how a cognitive approach to unified endpoint management (UEM), delivers the next evolution, taking an approach that accounts for all endpoints, including devices designed for the Internet of Things (IoT), while offering insights from big data and analytics.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

IBM

Ten rules for bring your own device (BYOD)
sponsored by IBM
WHITE PAPER: Download this resource to learn 10 steps to a successful bring your own device (BYOD) policy.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

IBM

Mobile Vision 2020
sponsored by IBM
RESEARCH CONTENT: Download this resource to learn what the future of enterprise mobility holds, how your organization can prepare, and the UEM platforms that can help ease your organization's management and security challenges.
Posted: 07 Nov 2018 | Published: 07 Nov 2018

IBM
1 - 25 of 2063 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement