Wireless Expense Management (WEM) refers to the strategic processes and tools used by organizations to manage and optimize the costs associated with their wireless communications. This includes the oversight and control of expenses related to mobile devices, wireless...
Telecom Expense Management (TEM)
Telecom Expense Management (TEM) refers to the comprehensive processes and solutions employed by organizations to manage and optimize their telecommunications expenses. This includes the oversight and control of costs associated with voice, data, and wireless...
Mobile Expense Management
Mobile expense management is the process of tracking, controlling, and approving expenses incurred by employees using their mobile devices for work purposes, such as business travel, client meetings, and remote work. This typically involves using software tools to...
Mobile Device Lifecycle Management – Glossary
Mobile device lifecycle management refers to the process of tracking, monitoring, and managing the entire lifespan of mobile devices, including procurement, deployment, maintenance, and retirement. This process aims to optimize the usage of mobile devices and...
Apple Business Manager
Apple Business Manager is a web-based portal provided by Apple that allows organizations to manage their Apple devices and services. It provides tools and resources for IT administrators to deploy Apple devices and apps in the workplace, including iPhones, iPads,...
Zero touch enrollment program (ZTEP)
A system that enables IT administrators to automatically set up new devices for employees.
Wireless
The transfer of data between two or more points without a physical connection
WiFi Hotspot
Hardware or software that shares a device's internet connection with other devices by creating a wifi network that they can connect to.
VoIP
Voice over internet protocol is a group of technologies involved in the delivery of voice and multimedia communications over the internet.
Unlimited data
When added to a cellular plan, unlimited data allows the user to use as much data as they'd like. However, many service providers "throttle" data after a certain threshold, which reduces the speed.
Unified Endpoint Management (UEM)
A set of software tools that provide a single interface for the management, monitoring, and security of all corporate devices on a network. It is a Mobile Device Management solution that also works on Mac, PC, Servers, and sometimes even routers.
Software development kit (SDK)
A collection of tools and programs that are used for software development.
Software as a Service (SaaS)
A software licensing and delivery model where software is hosted centrally and licensed to customers on a subscription basis.
SIM card
Also known as a subscriber identification module, a SIM card is a chip that stores the data that allows a mobile phone to connect to the provider's network.
Service plan
A paid agreement with a mobile carrier that gives the user access to the provider's cellular and/or data network.
Roaming
Occurs when a mobile device is used outside of the range of its home network by connecting to another available network.
Remote Desktop Support (RDS)
A service that allows IT administrators to access employee devices from afar in order to provide help with troubleshooting and the resolution of technical issues.
Push notification
A message that appears on a mobile device, originating from an application that is not currently open.
Multi-factor authentication
A security feature that prevents users from accessing a device or data until they provide multiple forms of verification, such as a password and a security code, PIN, or fingerprint.
Mobility managed services (MMS)
A service that involves the procurement, provisioning, support, and management of smartphones and other mobile devices on behalf of a company.
MobileIron
Recently acquired by Ivanti, MobileIron was a software company that provided EUM and EMM solutions for mobile devices.
Mobile Threat Defense (MTD)
Applications that increase security on corporate mobile devices by monitoring for threats, scanning for suspicious activity, and identifying potential vulnerabilities.
Mobile Hotspot
Software or hardware that allows a user to share the internet connection from one mobile device with others.
Mobile Endpoint Protection (MEP)
Software and processes that allow IT administrators to manage remote users of company mobile devices in order to track web traffic, heighten security, and monitor usage.
Mobile Device Management (MDM)
MDM comprises the technology, tools, and processes that enable administrators to manage, control, secure, and enforce policies on company mobile devices. What are the main benefits of MDM? Security: MDM solutions can help to protect sensitive data by enforcing...
Mobile Application Management (MAM)
Software and services that allow IT administrators to remotely manage mobile apps, including permissions, configurations, and policies related to the apps and the data stored within them.
Mobile application development platform (MADP)
A system or software that gives developers all of the tools they need to create mobile applications, allowing the business to rapidly build, test and deploy mobile apps for smartphones or tablets.
Microsoft Intune
A mobile device management and mobile application management solution that is part of Microsoft Endpoint Manager.
Megabits per second (Mbps)
The speed at which data is transferred. The industry standard for measuring download and upload speeds of internet connections.
Internet of Things (IoT)
Smart devices that are equipped with sensors, software, and other technology that enable them to connect and exchange data with other devices, networks, and systems over the internet. Commonly used to connect household appliances to an admin console.
Enterprise Mobility Management (EMM)
The people, processes and technology that oversee a company’s corporate mobile devices, wireless networks, and support.
Device lifecycle management – Glossary Term
A system for procuring, managing, maintaining, and decommissioning wireless devices.
Device enrollment program (DEP)
Apple’s old branding for their version of a Zero Touch Enrollment Program, allowing iOS devices to automatically enroll into Systems Manager. This program is now bundled into Apple Business Manager.
Data Plan
A service offered by mobile carriers that provides users with internet connectivity on their device.
Data leakage protection (DLP)
A set of tools and processes used to protect sensitive data from loss, misuse, or unauthorized access.
Coverage
The geographical area covered by the network of a mobile carrier or internet service provider.
Corporate-owned, business only (COBO)
Corporate-owned, business only (COBO) is a mobile device management (MDM) model where an organization owns and manages their mobile devices to ensure devices are used strictly for work purposes, blocking personal use. This model is often utilized in industries where...
Choose your own device (CYOD)
A device management model that allows employees to choose from pre-selected devices that are owned and managed by the company.
Carrier
A wireless service provider that supplies cellular connectivity (phone and data) to mobile phone users.
Broadband
A high speed internet connection that is made possible by transporting multiple signals at a wide range of frequencies.
Bring-Your-Own-Device (BYOD)
Companies with a Bring Your Own Device (BYOD) policy allow employees to use their own personal devices (such as smartphones, laptops, tablets, etc.) for work purposes. This can include accessing company email, data, and applications on the device. What are the...
Bluetooth
Bluetooth is a short-range wireless technology that is used to exchange data between fixed and mobile devices, such as a smartphone and a laptop, portable speaker, wireless headset, etc.
Bandwidth
The maximum rate of data that can be transmitted over an internet connection in a specific period of time.
Bandwidth Throttling
Bandwidth throttling is a technique used by mobile carriers or internet service providers (ISPs) to intentionally limit the internet speed or data usage of a particular user or group of users. Bandwidth throttling is usually done to manage network congestion, ensure...
Activation Lock
An activation lock is a security feature implemented by Apple on its devices such as iPhone, iPad, and Apple Watch. When activated, it ties the device to the iCloud account of the owner, making it difficult for anyone else to use or sell the device without permission....
5G
The fifth generation of wireless mobile telecommunications technology, capable of data transfer speeds of 1gbps and higher.
4G
The fourth generation of wireless mobile telecommunications technology, capable of data transfer speeds of up to 1gbps.
3G
The third generation of wireless mobile telecommunications technology, capable of data transfer speeds of up to 2 mbps.