Enterprise mobile device management

Email Alerts

Register now to receive SearchConsumerization.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Production workloads go boldly to the cloud

    Some enterprises are charging ahead with a cloud-first approach to their workloads -- not just test and dev, but production workloads as well. That strategy has worked well for several IT departments with varying needs, as featured in this April issu... 

  • What's the best focus for MDM strategy now?

    This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost, stolen or hacked. That's a given. This guide outlines the basic tenets of sound strategy for mobile... 

  • Assess mobile devices before developing a management strategy

    Before an organization can formulate a bring your own device policy, it needs to know what workers are using to access corporate networks, applications and data. Mobile device management must account for who owns what and how it will be monitored and... 

  • Adopting enterprise mobility management

    The number and types of devices touching the enterprise continue to proliferate, so a mobility assessment is the first step in preparing a comprehensive plan for mobile device management. 

  • As SaaS outsourcing takes away data center tasks, what's left for IT teams?

    As software as a service (SaaS) outsourcing takes away big chunks of data center operations, IT gives up some of its tasks -- and much of its control. That's not all bad, as many of those outsourced tasks are time-consuming and onerous. SaaS implemen... 

  • Regain control with a secure file-sharing system

    As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins shoul... 

  • Insider edition: Layering mobile security for greater control

    Mobile device security is one of the biggest nightmares InfoSec pros face in the era of bring your own everything (BYOE). Simply banning employees from bringing their own technology into the workplace doesn't work. While no single tool exists to sec... 

  • Consumerization security and compliance

    Rather than try to secure the plethora of consumer devices accessing their systems, enterprises may have better luck focusing on data and application management. Approaches may include the use of encryption, virtual desktop infrastructure and contain... 

  • Setting cloud service usage policies for employees

    Cloud services are still a lawless frontier for many organizations. As with the consumerization of IT, companies need to first determine what is best for their purposes and then inform users of their data security policies. We also take a look at too... 

  • Data loss prevention strategies in the cloud era

    Privacy regulations and concerns about leaks of sensitive information have raised the priority of data loss prevention as enterprises adopt cloud and mobile computing. Not only must IT craft business rules and tag critical data, but it must also invo... 

  • See more Premium Content on Enterprise mobile device management
  • Why IT can't ignore tablet computers

    Employees use tablet computers to get work done, and IT can't ignore the devices. EMM and virtualization can help admins enable workers' tablet use. 

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command to a computing device and delete data.  

  • battery life

    Battery life is a measure of  battery performance and longevity, which can be quantified in several ways: as run time on a full charge, as estimated by a manufacturer in milliampere hours, or as the number of charge cycles until the end of useful lif... 

  • Samsung for Enterprise (SAFE)

    Samsung for Enterprise (SAFE) is a line of smartphones and tablets manufactured to meet specific enterprise management and security criteria, including interoperability with third-party mobile device management (MDM) and virtual private network (VPN)... 

  • endpoint device

    An endpoint device is an Internet-capable computer hardware device on a TCP/IP network. 

  • COPE (corporate-owned, personally-enabled)

    COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphon... 

  • configuration profile (CP)

    A configuration profile (CP) is an XML file that an IT administrator can use to customize settings on an end user's Apple iOS or Mac OS X device. 

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is an all-encompassing approach to securing and enabling business workers' use of smartphones and tablets. 

  • soft reset

    A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC). The action closes applications and clears any data in RAM (random access memory). Unsaved data in current use may be lost but data stored on the h... 

  • hard reset (factory reset; master reset)

    A hard reset, also known as a factory reset or master reset, is the restoration of a device, such as a smartphone or tablet, to its state when it left the factory. All settings, applications and data added by the user are removed. 

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from... 

  • See more Definitions on Enterprise mobile device management
About Enterprise mobile device management

With enterprise mobile device management tools, IT professionals can secure and manage employees’ mobile devices. Endpoint management is critical, and organizations implement an enterprise mobile device management strategy by adopting device management and monitoring software and putting security measures in place. Not only is the enterprise responsible for endpoint device management, but also for the performance and protection of applications on those devices. Security is also crucial. Employers need a solid endpoint device management strategy to ensure that firewalls, antivirus software, access control and the proper storage are in place to protect mobile devices. Cooperation between users and IT is another key when it comes to enterprise mobile device management, because it can be tricky for an organization to track all the devices its workers are using and how they are using them.