Mobile Device Management (MDM)
Mobile Device Management (MDM): A type of security software that is used by an organization to monitor, manage, and secure employees’ mobile devices that are deployed across multiple operating systems and service providers. These devices can be used both in the office and outside the office as part of the organization’s network infrastructure. MDM tools […]
Mobile device
Mobile device: A portable computing device such as a smartphone or tablet that provides a wide range of functionalities including voice communication, internet connectivity, and mobile applications. The ubiquity of mobile devices has significantly influenced communication, work, and entertainment.
Multifactor Authentication (MFA)
Multifactor Authentication (MFA): A security measure that requires users to provide two or more independent credentials to verify their identity. These credentials typically fall into three categories – something you know (like a password), something you have (like a smart card or a mobile device), and something you are (like a fingerprint or other biometric […]
Mandatory Access Control (MAC)
Mandatory Access Control (MAC): A type of access control where the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target. In MAC, access rights are determined by the system based on regulations and not the users. It is commonly used […]
Mantrap
Mantrap: A physical security access control system comprising a small space having two sets of interlocking doors such that the first set of doors must close before the second set opens. Mantraps ensure that only one person can pass through at a time, and they provide an effective mechanism for controlling and monitoring access to […]
Just-in-time (JIT) access
Just-in-time (JIT) access: Just-in-time (JIT) access is a privilege management approach where users are granted necessary permissions only when required and for the shortest duration necessary to complete tasks. This minimizes the risk of unauthorized access or security breaches by limiting the window of opportunity for attackers. JIT access is often implemented in privileged access […]