Mobile Device Security

Email Alerts

Register now to receive SearchMobileComputing.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Mobile data security and your corporate network

    All organizations need to mitigate risk, exposure and expense related to mobile devices and the networks to which they connect. Incidents of mobile device theft, compromise or loss, malware attacks and network breaches are making headlines every day.... 

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login a... 

  • geotagging

    Geotagging is the addition of geographical information, usually in the form of latitude and longitude coordinates, to Web sites, images, videos, smartphone transmissions, and various other data types and sources. Sometimes geotagging includes place n... 

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – bec... 

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from... 

  • enterprise wipe

    Enterprise wipe is a security feature offered by many Mobile Device Management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM. 

  • jailbreaking

    Jailbreaking, in a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad. The exploit usually involves running a privilege escalation attack on a user’s device to replac... 

  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • discoverability

    Discoverability is the capacity of something to be found. The term is used in many different contexts in IT (information technology). 

  • IMEI (International Mobile Equipment Identity)

    IMEI (International Mobile Equipment Identity) is a 15- or 17-digit code that uniquely identifies mobile phone sets. The IMEI code can ensure that a GSM (Global System for Mobile communication) or UMTS (Universal Mobile Telecommunications Service) ne... 

  • See more Definitions on Mobile Device Security
  • Oracle Mobile Security Suite rehashes Identity Manager and Bitzer Mobile

    Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add. 

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login a... 

  • geotagging

    Geotagging is the addition of geographical information, usually in the form of latitude and longitude coordinates, to Web sites, images, videos, smartphone transmissions, and various other data types and sources. Sometimes geotagging includes place n... 

  • iOS Erase

    iOS Erase is a feature that obliterates everything stored in the iOS encrypted file system’s user partition. All user partition contents – including contacts, calendars, device settings, third-party applications, and associated application data – bec... 

  • Android Factory Reset

    Android Factory Reset is a feature that erases all device settings, user data, third-party applications, and associated application data from an Android device’s internal flash storage to return the device to the condition it was in when shipped from... 

  • enterprise wipe

    Enterprise wipe is a security feature offered by many Mobile Device Management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM. 

  • jailbreaking

    Jailbreaking, in a mobile device context, is the use of an exploit to remove manufacturer or carrier restrictions from a device such as an iPhone or iPad. The exploit usually involves running a privilege escalation attack on a user’s device to replac... 

  • PIN lock

    The PIN lock is an authentication measure for mobile phones that requires the entry of a personal identification number (PIN) code before a device can be used. 

  • mobile security (wireless security)

    Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless ... 

  • discoverability

    Discoverability is the capacity of something to be found. The term is used in many different contexts in IT (information technology). 

  • See more All on Mobile Device Security
About Mobile Device Security

This topic section on mobile device security covers everything you need to know about protecting the mobile devices used in your organization. Learn about trends and technology in securing mobile devices including smartphones, notebooks, laptops and netbooks and get advice from mobile security experts. Get tips to help avoid a data breach and advice for updating your organization's mobile device security policy. Find out how problems with mobile device security and the loss of these devices can negatively impact customer relationships. Learn the importance of mobile device security and how to avoid pitfalls with the data on your mobile devices.