Mobile Security


Mobile security involves protecting both personal and business information stored on and transmitted from smartphones, tablets, laptops and other mobile devices. The term mobile security is a broad one that covers everything from protecting mobile devices from malware threats to reducing risks and securing mobile devices and their data in the case of theft, unauthorized access or accidental loss of the mobile device.
User Authentication Methods for Mobile Security

Mobile security also refers to the means by which a mobile device can authenticate users and protect or restrict access to data stored on the device through the use of passwords, personal identification numbers (PINs), pattern screen locks or more advanced forms of authentication such as fingerprint readers, eye scanners and other forms of biometric readers.

Mobile security solutions and apps are available from a wide array of vendors for all of the popular mobile operating systems, including iOS for iPhones and iPads, Google’s Android platform and Microsoft’s Windows Phone.

Mobile security is closely related to mobile device management (MDM), which is a term that specifically applies to protecting mobile devices in the enterprise or business environments from loss or theft, as well as protecting the data on these devices.

Related Terms: mobile device management, mobile security apps, Android mobile security, iPhone mobile security, mobile security threats

Read Also:

  • 802.11ac Wave 2

    The 802.11ac -2013 update, or 802.11ac Wave 2, is an addendum to the original 802.11acwireless specification that utilizes MU-MIMO technology and other advancements to help increase theoretical maximum wireless speeds from 3.47 Gbps in the original spec to 6.93 Gbps in 802.11ac Wave 2. The original 802.11ac spec itself served as a performance boost over […]

  • MU-MIMO

    Short for Multi-User, Multiple-Input, Multiple-Output, MU-MIMO is an enhanced form of the MIMO technology that enables multiple independent radio terminals to access a system, which can provide significant performance gains over the original MIMO technology. MU-MIMO features prominently in the 2013 update of the 802.11ac wireless specification (802.11ac Wave 2) and helps increase theoretical maximum […]

  • Server Message Block 2

    Short for Server Message Block 2, SMB2 is a file transfer protocol commonly used by network-attached storage (NAS) devices and file servers for sharing files and data. SMB2 first debuted with the release of Microsoft’s Windows Vista in 2007 as a successor to the original SMB protocol, and it’s now supported by Mac OS X […]

  • CRM Cloud

    Cloud CRM (or CRM cloud) means any customer relationship management (CRM) technology where the CRM software, CRM tools and the organization’s customer data resides in the cloud and is delivered to end-users via the Internet (see “cloud computing”). Cloud CRM typically offers access to the application via Web-based tools (or Web browser) logins where the […]

  • Mac OS X Mavericks

    Mac OS X Mavericks, or simply OS X Mavericks, is version 10.9 of Apple Computer’s Mac OS X operating system for Macintosh desktop, laptop and server computers. The Mavericks release is the tenth update for Mac OS X, following earlier updates for the operating system: Cheetah (v10.0), Puma (v10.1), Jaguar (v10.2), Panther (v10.3), Tiger (v10.4), […]


Disclaimer: Mobile Security definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.