Enterprise mobility management Definitions

Search Definitions
  • #

    3G card

    A 3G card is a modem that allows a computing device to access the Internet wirelessly through a cellular provider's 3G network.

  • A

    Active Directory Federation Services (AD FS)

    Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall.

  • Android Open Source Project (AOSP)

    The Android Open Source Project (AOSP) is an initiative created to guide development of the Android mobile platform.

  • Apple Business Manager

    Apple Business Manager (ABM) is an online portal for IT administrators who deploy Mac OS, iOS and tvOS devices in an enterprise or educational setting.

  • Apple Watch

    Apple Watch is Apple's entry into the smartwatch market. It pairs with an iPhone to let users send texts, make calls, manage schedules, navigate and much more.

  • AT&T Toggle

    Toggle is an AT&T service that allows a smartphone owner to create separate personal and business environments on the same mobile device.

  • B

    bluesnarfing

    Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.

  • breathalyzer cell phone (sobriety cell phone)

    A breathalyzer cell phone, also known as a sobriety cell phone, is a cellular telephone handset equipped with a built-in device for detecting the presence of ethyl alcohol vapor in the breath. ..(Continued)

  • BYOD policy

    A BYOD policy, or bring-your-own-device policy, is a set of rules governing a corporate IT department’s level of support for employee-owned PCs, smartphones and tablets.

  • BYOT (bring your own technology)

    Bring your own technology (BYOT) is a policy that allows employees or students to use their own personal electronic devices at work or scho

  • C

    cell phone jammer

    A cell phone jammer is a device that blocks transmission or reception of signals, usually by creating some form of interference at the same frequency ranges that cell phones use... (Continued)

  • churn (agitation or turnover)

    In a general context, churn is a synonym for agitation or turnover.

  • Cisco Identity Services Engine (ISE)

    Cisco Identity Services Engine (ISE) is a network administration product that enables the creation and enforcement of security and access policies for endpoint devices connected to the company’s routers and switches.

  • Citrix XenMobile

    Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.

  • cloud drive

    A cloud drive is an umbrella term used to describe any Web-based service that provides storage space on a remote server.

  • consumerization of IT

    IT consumerization is the blending of personal and business use of technology devices and applications. Gartner traced the trend to the dot-com collapse, when enterprise IT budgets shrank and many IT vendors shifted focus to the potentially bigger consumer IT markets. The result has been a change in the way technology enters the marketplace.

  • consumerization policy

    A consumerization policy is a documented set of practices for managing the use of consumer devices and technologies within a given organization. A consumerization policy defines acceptable use.

  • contextual computing

    Contextual computing, also called context-aware computing, is the use of software and hardware to automatically collect and analyze data about a device's surroundings in order to present relevant, actionable information to the end user.

  • COPE (corporate-owned, personally-enabled)

    COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.

  • corporate mobility policy

    A corporate mobility policy is a set of guidelines, established by a corporation, that govern the use and security of mobile devices such as smartphones, PDAs and tablets within the corporate network.

  • cross-platform mobile development

    Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems.

  • CYOD (choose your own device)

    CYOD (choose your own device) is an alternative model to BYOD (bring your own device) that involves allowing employees to select the device they want from among a limited number of options. CYOD is an example of the COPE (corporate-owned, personally-enabled) model.

  • D

    disappearing e-mail

    Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.

  • drive-by spamming

    Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.

  • dual persona (mobile device management)

    Dual persona, in a mobile management context, is the provisioning and maintenance of two separate and independent end user environments on a single mobile device. Dual persona technology addresses one of the challenges of the bring your own device trend: how to exercise IT control over employees' personal devices without infringing on their right to privacy.

  • E

    EFSS (Enterprise file sync-and-share)

    Enterprise file sync-and-share is a service that allows users to save files in cloud or on-premises storage and then access them on desktop and mobile devices.

  • end user policy

    An end user policy is a set of directives that describes what actions employees must take -- or avoid -- in order to protect corporate assets

  • enterprise mobility

    Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications.

  • enterprise mobility management (EMM)

    Enterprise mobility management (EMM) is software that allows organizations to securely enable employee use of mobile devices and applications.

  • enterprise-mobile integration (EMI)

    Enterprise-mobile integration (EMI) is a form of fixed-mobile convergence (FMC) that provides integration between communications carriers and enterprise networks... (Continued)

  • F

    FeliCa

  • G

    Good Technology

    Good Technology is a mobile security platform provider headquartered in Sunnyvale, California. The company was founded in 2000 and was acquired by BlackBerry in 2015.

  • Google Apps for Business

    Google Apps for Business is an email, messaging and content-sharing service provided by Google for small and medium-sized businesses as well as enterprises.

  • Google Mobile Services (GMS)

    Google Mobile Services (GMS) is a collection of applications and API’s developed by Google that are available for Android devices, such as smartphones and tablets.

  • H

    handheld

    A handheld computer is a computer that can conveniently be stored in a pocket (of sufficient size) and used while you're holding it.

  • hot spot

    For users of portable computers equipped for wireless, a hot spot (or hotspot) is a wireless LAN (local area network) node that provides Internet connection and virtual private network (VPN) access from a given location.

  • hot zone

    A hot zone is a wireless access area created by multiple hot spots located in close proximity to each other.

  • HTML5 mobile app

    HTML5 mobile apps are developed through that version of the Web content standard. They enable cross-platform access without recoding.

  • hybrid mobile app dev

    Hybrid mobile app development is an approach to programming for mobile devices that combines the strengths of native programming and HTML5 mobile app development.

  • I

    IBM MobileFirst Platform Foundation (formerly IBM Worklight)

    IBM MobileFirst Foundation, formerly known as IBM Worklight, is a suite of software development products that allow developers to build and deliver mobile applications for the enterprise.

  • identity as a Service (IDaaS)

    Identity as a Service (IDaaS) is an authentication infrastructure that is built, hosted and managed by a third-party service provider.

  • instant app (Google Android instant app)

    A Google Android instant app is a small software program that enables end users to test out a portion of a native Android app without installing it on a device.

  • iOS developer kit

    The iOS software development kit (iOS SDK) is a collection of tools for the creation of apps for Apple’s mobile operating system.

  • iOS Developer Program

    The iOS Developer Program is a fee-based subscription that allows program members to publish approved apps to the Apple app store.

  • J

    Jive Software

    Jive Software is an enterprise social networking software vendor based in Palo Alto, Calif.

  • K

    keitai

    Keitai (pronounced k-tie) is a Japanese word meaning "portable.

  • Kony

    Kony is a company that provides enterprise mobility products and services, including a mobile application development platform (MADP) and mobile backend as a service.

  • L

    Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets.

  • M

    managed mobility services (MMS)

    Managed mobility services (MMS) is the procurement, deployment and management of mobile devices and apps, PC software and services connecting out-of-office workers to the enterprise environment.

  • micro-virtualization

    Micro-virtualization is technology that abstracts applications and sub-processes from hardware and runs them in isolated environments.

  • microblogging

    Microblogging is a web service that allows the subscriber to broadcast short messages to other subscribers of the service. (Continued)

  • Microsoft Exchange Server ActiveSync Web Administration Tool

    The Microsoft Exchange Server ActiveSync Web Administration Tool is a software application that provides a network administrator with a Web interface for mobile device management.

  • Microsoft OneDrive

    OneDrive (formerly SkyDrive) is an online cloud storage service from Microsoft.

  • Microsoft System Center Mobile Device Manager (MSCMDM)

    Microsoft System Center Mobile Device Manager (MSCMDM) is server-based software that allows enterprise IT professionals to manage and automate tasks for Windows Mobile devices. (Continued...)

  • Mobile Active Defense (MAD)

    Mobile Active Defense’s main product is the Mobile Enterprise Compliance and Security Server (MECS).

  • Mobile Application Management (MAM)

    Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.

  • mobile computing (nomadic computing)

    Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.

  • mobile content management

    Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.

  • mobile desktop virtualization

    Mobile desktop virtualization is the delivery of a virtual machine (VM) image that runs business applications to a tablet or smartphone.

  • mobile device management (MDM)

    Mobile device management (MDM) is software that allows IT administrators to control, secure and enforce policies on smartphones, tablets and other endpoints.

  • mobile device management software

    Mobile device management software is any application that gives IT administrators a way to troubleshoot and manage employee mobile devices remotely.

  • mobile first

    Mobile first is an approach to business process and technology that assumes smartphones, tablets and task-specific apps are employees' primary tools for getting work done.

  • mobile information management (MIM)

    Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it.

  • mobile malware

    Mobile malware is malicious software specifically written to attack mobile devices such as smartphones, tablets, and smartwatches.

  • mobile operating system

    A mobile operating system (OS) is software that allows smartphones, tablet PCs (personal computers) and other devices to run applications and programs.

  • mobile phone virus

    A mobile phone virus is a computer virus specifically adapted for the cellular environment and designed to spread from one vulnerable phone to another. (Continued...)

  • mobile platform as a service (MPaaS)

    Mobile Platform as a Service (mPaaS) is the paid provision of an Interactive Development Environment (IDE) for the creation of mobile apps.

  • mobile productivity app (mobile productivity application)

    A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks.

  • Mobile Threat Defense (MTD)

    Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms.

  • mobile UI (mobile user interface)

    A mobile UI is the user interface on a mobile device, usually including a touch screen display and all the other elements of the device that allow the user to interact with it.

  • mobile virtualization

    Mobile virtualization is an approach to mobile device management in which two virtual platforms are installed on a single wireless device. 

  • mobile VPN (mobile virtual private network)

    A mobile VPN is a networking configuration that enables mobile devices such as notebook computers or personal digital assistants (PDAs) to access a virtual private network (VPN) or an intranet while moving from one place to another... (Continued)

  • mobile-to-mobile convergence (MMC)

    Mobile-to-mobile convergence (MMC) is a technology that facilitates the interoperability of mobile communications devices without the need for any fixed capabilities or proprietary service provider... (Continued)

  • MobileIron

    MobileIron is a company that provides management and security software for mobile apps, content and devices.

  • N

    narrowband

    Generally, narrowband describes telecommunication that carries voice information in a narrow band of frequencies.

  • no-swipe credit card

    A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine. The card holder can simply come within approximately 0.6 meter (2 feet) of the checkout terminal. The terminal emits a tone or displays a confirmation when the transaction has been authorized and payment made... (Continued)

  • nomadicity

    Nomadicity is the tendency of a person, or group of people, to move with relative frequency.

  • O

    OTA update (over-the-air update)

    An over-the-air update is the wireless delivery of new software or data to mobile devices.

  • P

    Personal Response System (PRS)

    In education, the Personal Response System (PRS) is an instructional technology tool composed of a proprietary software application that is installed on the facilitator's computer, a wireless receiver, and hand-held infrared transmitters that have been assigned to students to record their responses to multiple choice or yes/no questions.

  • podslurping (slurping)

    Podslurping (sometimes just called slurping) is the unauthorized download of data from a computer to a small device with storage capacity, such as a flash drive or an iPod or other MP3 player... (Continued)

  • policy

    In policy-based networking, a policy is a formal set of statements that define how the network's resources are to be allocated among its clients.

  • pull notification

    Pull notifications are communications that are sent as a response to a client request. The client sends a request to a server and the server responds with the update.

  • R

    real-time location system (RTLS)

    A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target.

  • Red Hat Mobile Application Platform

    Red Hat Mobile Application Platform is a software development framework that enables organizations to extend their development capabilities to mobile by developing collaboratively, centralizing control of security and using back-end integration with a range of cloud deployments.

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

  • RPC over HTTP

    RPC over HTTP (Remote Procedure Call over HTTP) is a protocol that allows a client on the Internet to connect securely to a Microsoft Exchange Server without having to log into a virtual private network (VPN) first.

  • S

    Samsung for Enterprise (SAFE)

    Samsung for Enterprise (SAFE) is a line of smartphones and tablets manufactured to meet specific enterprise management and security criteria, including interoperability with third-party mobile device management (MDM) and virtual private network (VPN) software.

  • SAP Mobile Documents

    SAP Mobile Documents enables cross-platform mobile access to content that might otherwise be restricted to desktop environments.

  • screaming cell phone

    A screaming cell phone is a cellular telephone that is programmed to emit a noise like human screaming. (Continued)

  • sideloading

    Sideloading is the installation of an application on a mobile device without using the device’s official application-distribution method.

  • Small Office Home Office (SOHO)

    In information technology, SOHO is a term for the small office or home office environment and business culture.

  • SMiShing (SMS phishing)

    SMiShing is a mobile phone security attack in which the user is tricked into downloading a Trojan horse, virus or other malware onto his phone. SMiShing is short for "SMS phishing." (Continued)

  • SMS spam (cell phone spam or short messaging service spam)

    SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly rare in North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs that caused the phones to dial emergency numbers.

  • Snapchat

    Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos. Photos and videos taken with the app are called snaps.

  • social collaboration

    Social collaboration is work that is carried out by more than one person. The term is also used to describe communication tools that help employees to work together.

  • SoLoMo (social, local and mobile)

    SoLoMo (social, local and mobile) is a term representing the convergence of collaborative, location-based and on-the-go technologies, primarily used for marketing and discovery purposes.

  • SoMoClo (social, mobile and cloud)

    SoMoClo (social, mobile and cloud) is the convergence of collaborative, on-the-go technologies that allow users to access data and applications from anywhere at any time.

  • Splashtop

    Splashtop is a vendor that sells remote connection software which lets users access their PCs or Macs from other computing devices.

  • Stratellite

    A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks. (Continued...)

  • T

    turnkey

    Turnkey is a product or service that is designed, supplied, built, or installed fully complete and ready to operate.

-ADS BY GOOGLE

SearchNetworking

SearchUnifiedCommunications

SearchSecurity

Close