The third generation of wireless mobile telecommunications technology, capable of data transfer speeds of up to 2 mbps.
The fourth generation of wireless mobile telecommunications technology, capable of data transfer speeds of up to 1gbps.
The fifth generation of wireless mobile telecommunications technology, capable of data transfer speeds of 1gbps and higher.
A security feature available on both Android and iOS devices which prevents malicious actors from resetting or activating a device without login credentials.
A web-based portal that allows organizations to set up, deploy, and manage corporate-owned Apple devices.
A mobile endpoint protection solution that gives IT administrators the ability to monitor end-user web traffic, control data usage, and heighten security on mobile devices.
The maximum rate of data that can be transmitted over an internet connection in a specific period of time.
Intentionally limiting the speed of data transfer from carrier to user. Some providers throttle data after a certain amount is used.
Bluetooth is a short-range wireless technology that is used to exchange data between fixed and mobile devices, such as a smartphone and a laptop, portable speaker, wireless headset, etc.
A device management model that allows employees to use their personal devices for both personal and work purposes.
A high speed internet connection that is made possible by transporting multiple signals at a wide range of frequencies.
A technology that collects temporary data so that future requests for that data can be accessed faster.
A wireless service provider that supplies cellular connectivity (phone and data) to mobile phone users.
A device management model that allows employees to choose from pre-selected devices that are owned and managed by the company.
A device management model where the company purchases mobile devices for its employees and sets them up with all work-related apps, tools, and other essentials. Under this model, devices can only be used for work purposes.
The geographical area covered by the network of a mobile carrier or internet service provider.
A set of tools and processes used to protect sensitive data from loss, misuse, or unauthorized access.
A service offered by mobile carriers that provides users with internet connectivity on their device.
Apple’s old branding for their version of a Zero Touch Enrollment Program, allowing iOS devices to automatically enroll into Systems Manager. This program is now bundled into Apple Business Manager.
A system for procuring, managing, maintaining, and decommissioning wireless devices.
The people, processes and technology that oversee a company’s corporate mobile devices, wireless networks, and support.
An enterprise mobility management platform that allows for the management of corporate mobile devices.
Smart devices that are equipped with sensors, software, and other technology that enable them to connect and exchange data with other devices, networks, and systems over the internet. Commonly used to connect household appliances to an admin console.
An application that allows for the configuration and automation of IT tasks on macOS, iOS, iPadOS, and tvOS devices.
The speed at which data is transferred. The industry standard for measuring download and upload speeds of internet connections.
A mobile device management and mobile application management solution that is part of Microsoft Endpoint Manager.
A system or software that gives developers all of the tools they need to create mobile applications, allowing the business to rapidly build, test and deploy mobile apps for smartphones or tablets.
Software and services that allow IT administrators to remotely manage mobile apps, including permissions, configurations, and policies related to the apps and the data stored within them.
Mobile Device Management (MDM): Technology, tools, and processes that enable administrators to manage, control, secure, and enforce policies on company mobile devices.
Software and processes that allow IT administrators to manage remote users of company mobile devices in order to track web traffic, heighten security, and monitor usage.
The tasks involved in overseeing spending on mobile device usage; often involving mobile invoices, device and service plan inventory, carrier contract management, reporting, etc.
Software or hardware that allows a user to share the internet connection from one mobile device with others.
Applications that increase security on corporate mobile devices by monitoring for threats, scanning for suspicious activity, and identifying potential vulnerabilities.
Recently acquired by Ivanti, MobileIron was a software company that provided EUM and EMM solutions for mobile devices.
A service that involves the procurement, provisioning, support, and management of smartphones and other mobile devices on behalf of a company.
A provider of Apple MDM and security solutions.
A security feature that prevents users from accessing a device or data until they provide multiple forms of verification, such as a password and a security code, PIN, or fingerprint.
A message that appears on a mobile device, originating from an application that is not currently open.
A service that allows IT administrators to access employee devices from afar in order to provide help with troubleshooting and the resolution of technical issues.
Occurs when a mobile device is used outside of the range of its home network by connecting to another available network.
A paid agreement with a mobile carrier that gives the user access to the provider's cellular and/or data network.
Also known as a subscriber identification module, a SIM card is a chip that stores the data that allows a mobile phone to connect to the provider's network.
A mobile device that is capable of performing many of the functions of a computer, like browsing the internet, sending and receiving emails, playing music, and more.
A software licensing and delivery model where software is hosted centrally and licensed to customers on a subscription basis.
A collection of tools and programs that are used for software development.
A set of software tools that provide a single interface for the management, monitoring, and security of all corporate devices on a network. It is a Mobile Device Management solution that also works on Mac, PC, Servers, and sometimes even routers.
When added to a cellular plan, unlimited data allows the user to use as much data as they'd like. However, many service providers "throttle" data after a certain threshold, which reduces the speed.
A platform that combines UEM and broadband hotspot management into a single portal in order to manage app deployment, maintain security policies, and more.
Voice over internet protocol is a group of technologies involved in the delivery of voice and multimedia communications over the internet.
A mobile endpoint protection/cloud security platform that allows IT administrators to monitor end user devices for security purposes.
Hardware or software that shares a device's internet connection with other devices by creating a wifi network that they can connect to.
The transfer of data between two or more points without a physical connection
A provider of Mobile Device Management software and standalone systems for content, applications, and email.
A system that enables IT administrators to automatically set up new devices for employees.