温馨提示:本站仅提供公开网络链接索引服务,不存储、不篡改任何第三方内容,所有内容版权归原作者所有
AI智能索引来源:http://www.ibm.com/think/topics/mobile-device-management
点击访问原文链接

What is Mobile Device Management (MDM)? | IBM

WelcomeOverviewOverviewOverviewPhishingSpear phishingSpear phishing vs. standard phishingSmishingBusiness email compromise (BEC)Whale phishing (whaling)PretextingOverviewRansomwareRansomware as a service (RaaS)ScarewareHistory of malwareOverviewThreat actorHackingAttack vectorAdversarial machine learningDistributed denial of service (DDoS) attackZero day exploitMan in the middle (MITM) attackBrute force attackLateral movementInsider threatsAdvanced persistent threatsKerberoastingCryptojackingData poisoningDark webOverviewData breachData exfiltrationPII (personally identifying information)Digital footprintData protectionData security posture managementData discoveryDatabase securityData privacyData privacy examplesXaaS data securityOverviewSymmetric encryptionAsymmetric encryptionPublic key infrastructurePublic key encryptionKey managementBring your own key (BYOK)CryptographyHomomorphic encryptionEnd-to-end encryptionCryptography typesCryptography use casesHistory of cryptographyTransport layer securityConfidential computingTokenizationOverviewNonhuman identityMachine identity managementIdentity securityIdentity fabricIdentity orchestrationCustomer IAM (CIAM)OverviewAuthentication vs. authorizationSingle sign-on (SSO)Two-factor authentication (2fA)Multi-factor authentication (MFA)Adaptive MFABiometric authenticationBehavioral biometricsCAPTCHAFIDOFIDO2Digital credentialsOverviewPrivileged access management (PAM)User provisioningRBACOAuthOverviewCloud security posture management (CSPM)Cloud workload protection platform (CWPP)OverviewMobile securityMobile workforceBring your own device (BYOD)Mobile device management (MDM)MDM vs. mobile application management (MAM)Enterprise mobility management (EMM)Unified endpoint management (UEM)UEM vs. MDMAndroid device managementNetwork securityInformation securityIT securityOT securityEmail securityWeb securityCritical infrastructureZero trustSecure access service edge (SASE)CIS benchmarksOverviewVulnerability management lifecycleVulnerability scanningVulnerability assessmentCVE (Common vulnerabilities and exposures)CVSS (Common vulnerabilities scoring system)Patch managementSecurity postureAttack surfaceAttack surface managementShadow ITLog4shellLog4J vulnerabilityLog4j vulnerability detection and patchingSaaS sprawlOverviewApplication security posture management (ASPM)Dynamic application security testing (DAST)OverviewEthical hackingRed teamingBlue teamPenetration testingNetwork penetration testingPhishing simulationBreach attack simulationOverviewAI securityAI fraud detection in bankingOverviewIncident responseDigital forensicsComputer forensicsDigital forensics and incident responseFraud detectionSecurity information and event management (SIEM)Security orchestration automation and response (SOAR)Endpoint detection and response (EDR)Network detection and response (NDR)Extended detection and response (XDR)Identity threat detection and response (ITDR)Data detection and response (DDR)Data loss prevention (DLP)Intrusion detection system (IDS)Intrusion prevention system (IPS)User behavior analytics (UBA)User and entity behavior analytics (UEBA)Distributed denial of service (DDoS) protectionNext generation antivirus (NGAV)OverviewThreat intelligenceOSINTThreat huntingMITRE ATT&CKNISTCyber resilienceCyber insuranceSecurity controlsManaged security service providerSecurity operations center (SOC)Managed detection and response (MDR)Cyber rangeCybersecurity crisis communicationmature MDM platformkeep all devices secureIBM Privacy StatementdataExplore IBM MaaS360mobile securityLearn about Android device managementApplication securityidentity and access managementnetwork securityincident responseEnterprise mobility management (EMM)Unified endpoint managementStudy 191% ROI from Mobile Device Management: The Business Case for UEM Based on real customer interviews, see how MaaS360 delivers 90% faster device setup, significant cost savings, and measurable productivity gains across enterprise mobility programs. Download the studyReport Complete Endpoint Control: How UEM Transforms Mobile Security Modern workforces demand more than basic MDM. This guide reveals how unified endpoint management secures and manages all devices - mobile, desktop, and IoT - from a single platform while enabling productivity anywhere. Read the reportReport Process Intelligence for IT Operations: Understanding Mobile Workforce Patterns Discover how process intelligence helps IT teams understand and optimize mobile workforce workflows and device usage patterns. Read the reportReport Mobile Investment Strategy: CIO Guide to Optimizing Device Management Costs Mobile device programs can consume significant IT budgets without proper cost controls. This CIO handbook reveals four proven strategies to optimize technology spending while maintaining security and productivity across your mobile workforce initiatives. Read the reportReport The key to unlocking your APIs’ full potential: API management Read this report and gain insights into the key challenges that drive the need for API management, and understand the key capabilities inherent in an effective API management solution. Read the reportGuide The 2025 Guide to AI Agents Access a comprehensive collection of AI agent-related content such as educational explainers, hands-on tutorials, podcast episodes and much more. Explore the guideInsights Roadmap to the quantum future Explore IBM's quantum computing roadmap, which charts advancements in quantum processors, software and scaling technologies. See how quantum breakthroughs today are driving the future of computation, from cutting-edge research to scalable commercial applications. Explore quantum technologiesReport Cost of a Data Breach Report 2025 Data breach costs have hit a new high. Get up-to-date insights into cybersecurity threats and their financial impacts on organizations. Read the reporteBook Leverage Analytics Across Every Tier Learn how analytics in the data tier can inform application logic and front-end experiences for smarter decision-making. Read the eBookExplore MaaS360Explore cybersecurity solutionsExplore XDR servicesExplore mobile security solutionsBook a live demo

智能索引记录