Mobile security Definitions

  • A

    Active Directory Federation Services (AD Federation Services)

    Active Directory Federation Services (AD Federation Services) is a feature of the Windows Server operating system that extends end users' single sign-on access to applications and systems outside the corporate firewall.

  • B

    bluesnarfing

    Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.

  • C

    cell phone jammer

    A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use... (Continued)

  • Cisco Identity Services Engine (ISE)

    Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.

  • contextual computing

    Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.

  • D

    disappearing e-mail

    Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.

  • drive-by spamming

    Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.

  • F

    FeliCa

  • I

    identity as a Service (IDaaS)

    Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.

  • L

    Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.

  • M

    Microsoft System Center Mobile Device Manager (MSCMDM)

    Microsoft System Center Mobile Device Manager (MSCMDM) is server-based software that allows enterprise IT professionals to manage and automate tasks for Windows Mobile devices. (Continued...)

  • Mobile Active Defense (MAD)

    Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).

  • mobile desktop virtualization

    Mobile desktop virtualization is the delivery of a virtual machine (VM) image that runs business applications to a tablet or smartphone.

  • mobile information management (MIM)

    Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.

  • mobile phone virus

    A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. (Continued...)

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close