IT Management  >   Systems Operations  >   Systems Management  >  

Mobile Device Management

RSS Feed   
ALSO CALLED: Device Management, Mobile and Wireless Device Management, Mobile Systems Management, MDM, Mobile Device Systems Management, Mobile and Device System, Wireless Mobile Computing Device Management, Managing Mobile Devices
DEFINITION: Mobile device management (MDM) refers to any routine or tool intended to distribute applications, data and configuration settings to mobile communications devices, such as laptop computers, cell phones and PDAs. The intent of MDM is to optimize the functionality and security of a mobile communications network, while minimizing cost and downtime.Mobile device management allows administrators to oversee  … 

Mobile Device Management definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Mobile Device Management Reports
101 - 125 of 2041 Matches Previous Page  |  Next Page
Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

How EMM Can Help With GDPR Compliance
sponsored by MobileIron
WHITE PAPER: Explore how a comprehensive EMM program can be an important part of your GDPR compliance initiative. Uncover an overview of GDPR principles, 7 tips to deploy EMM for GDPR compliance, and more.
Posted: 07 Aug 2017 | Published: 07 Aug 2017

MobileIron

Mitigate Mobile Cloud App Risks
sponsored by MobileIron
VIDEO: Mobile apps are becoming the number one way employees are accessing cloud services, creating a new threat vector that you need to overcome: mobile app-to-cloud risk. This webcast explores 3 ways employees can introduce vulnerabilities by using cloud apps on mobile devices.
Posted: 07 Aug 2017 | Premiered: 07 Aug 2017

MobileIron

Tools and Techniques for Managing Apps Across Countless Delivery Methods, Endpoint Types, and OSes
sponsored by TechTarget
RESOURCE: This 11-page guide – curated by the editorial, objective experts at SearchMobileComputing.com – is jam-packed with invaluable tips for effectively managing today's mobility headaches in the face of vendor rhetoric, escalating user demands/expectations, and an increasing array of options for managing devices and delivering both apps and data.
Posted: 02 Aug 2017 | Published: 18 Oct 2016

TechTarget

Reducing Risk and Increasing Flexibility for the Mobile Enterprise
sponsored by Citrix
WHITE PAPER: Mobile devices and BYOD have brought unprecedented agility to the enterprises, but with it comes new security concerns. Read this short whitepaper to learn what over 200 senior security executives had to say about the top risks and trends in data and content security, as well as how to overcome them.
Posted: 18 Jul 2017 | Published: 18 Jul 2017

Citrix

Evolution of the EMM Industry
sponsored by MobileIron
RESOURCE: Download this resource to see how the EMM industry has evolved over the years, how vendors in the space compare, and what makes the top vendor stand out from the competition.
Posted: 28 Jun 2017 | Published: 09 Jun 2017

MobileIron

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Computer Weekly – 27 June 2017: Will mobile networks cope with the end of roaming charges?
sponsored by ComputerWeekly.com
EZINE: Download this issue of Computer Weekly to discover how the industry must face up to the challenges of implementing the new rules, around mobile roaming charges.
Posted: 26 Jun 2017 | Published: 26 Jun 2017

ComputerWeekly.com

The Mobile Risk Matrix
sponsored by Lookout
RESOURCE: Download this mobile risk matrix to gain a deeper understanding of the prevalence and impact of mobile threats and vulnerabilities to your organizations' apps, devices, network, web and content.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

The Spectrum of Mobile Risk: Understanding the Full Range of Risks to Enterprise Data From Mobility
sponsored by Lookout
WHITE PAPER: Download this white paper to discover a mobile risk matrix that will help organizations understand the prevalence of mobile risk surrounding software vulnerabilities, mobile app threats, behavior and configurations and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Lookout

3 Ways Text Messaging Exposes Your Company to Massive Risk
sponsored by Smarsh
WHITE PAPER: Organizations often don't consider retention and oversight of texts, which exposes them to significant risk for compliance and litigation. Discover 3 massive risks for your enterprise carried by texting, and how to mitigate.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Smarsh

It's Time for Field Service to Embrace Mobility
sponsored by Sprint
WEBCAST: In this webinar Zeus Kerravala of ZK Research talks about new ways to mobilize your workforce and why Mobility-as-a-Service makes so much sense. Watch to discover a smart, new way to think about mobility.
Posted: 14 Jun 2017 | Premiered: Feb 22, 2016

Sprint

Mobility-as-a-Service, A way better way webinar
sponsored by Sprint
VIDEO: 'Mobility-as-a-Service' is an easier and more affordable way to give your people the tech they need. Hear from Nemertes Research and Sprint in this webinar.
Posted: 13 Jun 2017 | Premiered: 12 Jun 2017

Sprint

When Software Goes Rogue
sponsored by BDNA
WHITE PAPER: How do you know if your software a rogue one? Do you know how to detect the rebel scum that is renegade software? Access this white paper to learn about BYOD, EOL, and EOS challenges, as well as the levels of vulnerability and how to identify your risks.
Posted: 02 Jun 2017 | Published: 31 May 2017

BDNA

Laptop, desktop PC and mobile device strategy: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: In this guide, you can find best practice, analysis of the latest trends, and expert advice on formulating enterprise strategy in laptops, desktop PCs and mobile devices.
Posted: 25 May 2017 | Published: 25 May 2017

ComputerWeekly.com

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com

Virtual, mobile healthcare apps: The challenges, what makes a successful mobile app
sponsored by Blue Cedar
EGUIDE: Download this e-guide to discover the challenges facing mobile in healthcare and what a mobile application needs to truly be successful and stand out in the healthcare space.
Posted: 13 Jul 2017 | Published: 11 Jul 2017

Blue Cedar

Uniting IT and App Development for Mobile App Strategies
sponsored by SearchEnterpriseDesktop
EZINE: The new wave of enterprise mobile application development has altered how app dev fits into IT's overall strategy. Learn how the sides can come together.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

SearchEnterpriseDesktop

Get Connected: Building your Digital Workplace
sponsored by Hewlett Packard Enterprise
RESEARCH CONTENT: This report surveyed 182 organizations on how their employees are adopting IoT, and how it is (or isn't) fitting into their digital transformation initiatives.
Posted: 11 Jul 2017 | Published: 11 Jul 2017

Hewlett Packard Enterprise

Automating Your Corporate Mobility Management
sponsored by Cisco Jasper
WEBCAST: In this webcast, discover how the mobile workforce is impacting corporate mobility management needs, and costs, and how enterprises are addressing this challenge with an automated mobility management platform.
Posted: 28 Jun 2017 | Premiered: Jun 22, 2017

Cisco Jasper

Access e-zine – June 2017
sponsored by SearchEnterpriseDesktop
EZINE: Download this issue of Access magazine to understand how the enterprise mobility management (EMM) landscape is changing and the IT infrastructure systems issues popping up around graphics support, secure data access and how IT pros are approaching these IT infrastructure challenges.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

SearchEnterpriseDesktop

What is MaaS Flipchart video
sponsored by Sprint
VIDEO: Having happy, productive mobile workers can be a huge benefit to your organization, but the hassle and capital investment required to make this happen can be enough to put many off. It's time that changed. Watch the video to discover a much smarter way to go mobile
Posted: 12 Jun 2017 | Premiered: 12 Jun 2017

Sprint

Evolving the Mobile Security Architecture Toward 5G
sponsored by Cisco Systems, Inc.
WHITE PAPER: This paper prepares your mobile security for 5G by examining the mobile threat landscape, software programmability and cellular standards.
Posted: 07 Jun 2017 | Published: 28 Feb 2017

Cisco Systems, Inc.

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Access e-zine – May 2017
sponsored by SearchEnterpriseDesktop
EZINE: Technology budgets are tight, yet businesses still expect IT to increase their ROI. But end-user computing tools don't always rake in big bucks. Instead the ROI comes from increased productivity and simpler management and maintenance for IT administrators. Discover the ROI businesses can get from these technologies and how to measure it.
Posted: 09 May 2017 | Published: 09 May 2017

SearchEnterpriseDesktop
101 - 125 of 2041 Matches Previous Page    3 4 5 6 7 8    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement