IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
1 - 25 of 1627 Matches Previous Page  |  Next Page
Ivanti Neurons Edge Intelligence - Demo
sponsored by Ivanti ANZ
VIDEO: Being on the edge is a goal for companies, but what does that mean? Edge intelligence services, like that provided by Ivanti Neurons’ platform, can help businesses stay informed about how, when, where, and why devices are being used within their ecosystem. Watch this short demo to learn more about achieving endpoint edge intelligence.
Posted: 07 Aug 2020 | Premiered: 07 Aug 2020

Ivanti ANZ

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

Self-Heal, Self-Secure, Self-Service with Ivanti Neurons for Remote Workers
sponsored by Ivanti ANZ
VIDEO: Tune in to this webinar to hear experts discuss and demonstrate how Ivanti Neurons can combat modern endpoint management challenges with automation bots that detect and resolve issues and security vulnerabilities proactively – and autonomously.
Posted: 06 Aug 2020 | Premiered: 06 Aug 2020

Ivanti ANZ

Ivanti Neurons for Discovery: Demo
sponsored by Ivanti ANZ
VIDEO: Tune into this quick 3-minute demo to catch a firsthand glimpse at Ivanti Neurons’ Discovery Agent dashboard, network management interfaces, and device deployment views.
Posted: 06 Aug 2020 | Premiered: 06 Aug 2020

Ivanti ANZ

Overcome 5 IoT Device Management Challenges
sponsored by ARM
EGUIDE: As IoT devices proliferate every area of business, organizations need to ensure they're managing them and the network supporting them correctly. In this e-guide, learn how you can overcome the top 5 challenges of managing IoT.
Posted: 06 Aug 2020 | Published: 06 Aug 2020

ARM

SIG - Cisco Umbrella
sponsored by Cisco Umbrella
WHITE PAPER: Cisco Umbrella is a Secure Internet Gateway (SIG) that provides the first line of defense against threats on the internet, wherever users go. With integrated cloud security, users are kept secure, and retention of all internet activity reduces incident response time. Learn about the benefits and key features of Umbrella in this white paper.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Cisco Umbrella

Three Benefits of Building an Intentional Remote-First Work Strategy
sponsored by Arrow
WHITE PAPER: Jump inside this white paper to learn about the three tangible business benefits that come from building an intentional and robust remote work strategy.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

Arrow

Jeff Abbott & Nayaki Nayyar, Ivanti: CUBE Conversation, July 2020
sponsored by Ivanti ANZ
VIDEO: Tune in to sit in on a discussion between Jeff Abbott, President of Ivanti and Nayaki Nayyar, EVP & Chief Product Officer at Ivanti, hosted by Lisa Martin of The Cube, as they discuss recent developments at Ivanti, their outlook on COVID-19’s impact on endpoint management, and more.
Posted: 29 Jul 2020 | Premiered: 29 Jul 2020

Ivanti ANZ

Types of Phishing Attacks You Need to Know to Stay Safe
sponsored by Webroot
WHITE PAPER: Phishing has evolved from a single technique into many highly specialized tactics, each adapted to specific types of targets and technologies. It is now carried out via text, phone, and email. Knowing about the diverse set of today’s tactics can help people be more prepared. Read this white paper for 11 common phishing tactics you should know.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Webroot

Ivanti Neurons
sponsored by Ivanti ANZ
PRODUCT OVERVIEW: As the number of endpoints, edge devices, and data volumes explode in scale, cyber-security threats are also reaching new heights. Dive into this paper to learn how hyper-automation can proactively, predictably, and autonomously self-heal and self-secure device and self-service end users.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Ivanti ANZ

Mobile Security for the Remote Worker
sponsored by Lookout
RESOURCE: In the remote world, mobile device use is increasing, employees are taking more risks, and 9 to 5 is out the window. The result: security is tougher to nail down. With phishing on the rise (and productivity apps attracting phishing), mobile devices must be monitored more closely than ever. Take a glance at this infographic for more details.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Lookout

Go Fearlessly. Work Seamlessly.
sponsored by TechData
PRODUCT OVERVIEW: Get a closer look at the Samsung Galaxy Tab Active Pro, a MIL-STD-810G-certified and IP68-rated rugged device meant to keep your teams productive regardless of environment or weather.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

TechData

Mobile Phishing: Myths & Facts Facing Every Modern Enterprise Today
sponsored by Lookout
WHITE PAPER: It may surprise you that the rate at which people fall for mobile phishing attacks has increased 85% every year since 2011. Organizations are constantly working to defend against phishing, but methods of defense against email attacks may not likewise prevent mobile attacks. Read this white paper for 3 myths and 3 facts on mobile phishing.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

Lookout Discovery: Chinese Surveillanceware
sponsored by Lookout
WHITE PAPER: The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Lookout

CIO Insight: Why Mobile Threat Defense
sponsored by Lookout
DATA SHEET: According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Lookout

The Definitive Guide to Data Protection
sponsored by Forcepoint
RESOURCE: It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

2020 Trends in Mobility Management: Are You Prepared for IoT, 5G, AI and Beyond?
sponsored by Calero MDSL
VIDEO: Tune into this webinar to hear industry experts discuss the emerging technologies poised to make the greatest impact on modern mobility practices, including IoT, 5G, artificial intelligence, and much more.
Posted: 20 Jul 2020 | Premiered: 20 Jul 2020

Calero MDSL

BYOD vs. CYOD vs. COBO vs. COPE
sponsored by Calero MDSL
RESOURCE: As the volume of mobile devices worldwide continues to grow explosively, mobile management strategies are becoming a top priority for enterprises. Uncover the key differences between mobile management techniques including BYOD, CYOD, COBO, and COPE – and learn which your organization should be utilizing for most effective results.
Posted: 17 Jul 2020 | Published: 28 May 2019

Calero MDSL

Creating and Maintaining a Strong Mobile Device Policy
sponsored by Calero MDSL
WHITE PAPER: Find out how to form a robust and immediately actionable Mobile Device Policy that prioritizes modern considerations like data, device choices, privacy expectations, offboarding, and much more.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Calero MDSL

Five Ways to Immediately Cut or Optimize Mobile Costs in a Suddenly Weakened Economy
sponsored by Calero MDSL
RESOURCE: Access this resource to learn the top 5 actions to address mobile costs due to COVID-19.
Posted: 15 Jul 2020 | Published: 22 Apr 2020

Calero MDSL

Mobile Security Index 2020
sponsored by Verizon
WHITE PAPER: Mobile technology and the cloud are enabling and medium-sized businesses to grow and compete with larger enterprises more effectively. But unless they take further steps to secure their mobile devices, SMBs could face significant damage to their reputations and bottom lines before the competition even begins.This infographic explains in detail.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

The Always-on Enterprise: Business Continuity Scenarios that Work
sponsored by Citrix
WHITE PAPER: Business continuity is priority number one for today’s organizations – and is what keeps CIOs up at night. Dive into this white paper to discover how an offering from Citrix, Samsung, and Google can offer a productive, complete solution that gives employees the capabilities they need to get their work done even when circumstances have changed.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Citrix

Itergy & Quest Live Webinar: IT Threats & Risks of the New Normal
sponsored by Itergy
VIDEO: After the initial changes in March, organizations are now adjusting to the ‘new normal’ – with nearly 100% of the workforce operating remotely. Organizations are now evaluating their current setup and ability to handle future changes. Watch this webinar to leverage the expertise of 2 industry leaders as they discuss these issues.
Posted: 10 Jul 2020 | Premiered: 16 Jun 2020

Itergy

Remote Working: How to Make the Laptop Lifestyle Flow Sweetly (and Securely) for Your Business
sponsored by Kaspersky Lab
WHITE PAPER: 58% of staff are motivated by the flexibility offered by working from home. Take a glimpse at this white paper released before the outbreak of COVID-19 outlining WFH benefits, trends and challenges.
Posted: 07 Jul 2020 | Published: 07 Jul 2020

Kaspersky Lab
1 - 25 of 1627 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info