BlackBerry Glossary

Application Control

A security approach that allows only approved applications to run on a device, helping prevent unauthorized software and reduce attack surfaces.

Asset Tracking Solution

Asset tracking solutions offer organizations a way to manage and monitor their physical assets or equipment, and effectively help improve operations.

BYOD

Bring Your Own Device (BYOD) is a policy that enables employees to use their own personal devices­–such as smartphones, desktops, laptops and tablets–for business purposes.

Containerization

Containerization is a method for delivering software code in a way that combines all the necessary elements into a package that can be moved easily between infrastructure types.

Content Collaboration

Content collaboration refers to accessing, sharing, syncing and editing of digital files.

Crisis Communication

Crisis communication refers to the communication systems and processes organizations use to communicate and collaborate during emergencies.

Crisis Management Solutions

Tools and strategies that help organizations prepare for, respond to, and recover from emergencies, ensuring continuity, safety, and compliance.

Emergency Alert System for Businesses

A communication platform that sends urgent notifications to employees during emergencies, helping protect lives, safeguard assets, and support business continuity.

Emergency Notification Service

A system that sends urgent alerts to individuals or groups via multiple channels, like SMS, email, or voice, during emergencies or critical events.

Enterprise File Sync and Share (EFSS)

Enterprise File Sync and Share (EFSS) is the on-premise or cloud-based solution that enables people to synchronize and share documents, photos, videos and files across multiple devices—both inside and outside of the organization.

Enterprise Mobility Management (EMM)

Enterprise Mobility Management (EMM) is an approach to Mobile Device Management (MDM) that enables employees to use mobile devices to connect to business resources without compromising security.

Environment Manager

Software that controls and configures application or device settings based on defined policies and operating conditions.

Information Technology Infrastructure Library (ITIL)

A framework of best practices for IT service management, ITIL helps organizations standardize processes, manage risk, and align IT services with business goals.

IT Asset Management (ITAM)

The process of tracking and managing IT assets, such as hardware, software, and licenses, throughout their lifecycle to reduce costs, support compliance, and optimize performance.

Local Alert App

A mobile app that delivers real-time, location-specific alerts, such as severe weather, safety threats, or road closures, from official sources.

Mass Communication Software

A platform used to send large-scale messages across multiple channels, enabling fast, consistent communication during routine updates or emergency situations.

Messaging Security

Messaging security protects communications from interception and tampering through encryption, authentication, and secure delivery.

Mobile Device Management (MDM)

Mobile Device Management (MDM) involves managing mobile devices remotely to enable users to perform specific tasks on their devices and protecting business networks from a data breach.

Personnel Accountability

Personnel Accountability is the process for communicating, assessing and confirming the status and condition of all personnel within an organization.

Safe Chat

Encrypted communication tools that ensure message confidentiality and integrity through secure messaging protocols.

Secure Communications

Secure communications represent the methodologies and technologies used to protect sensitive information during transmission. 

Secure File Sharing

Secure File Sharing refers to the systems/processes an organization puts in place to do this in a way that’s secure, private and protected.

Secure Messaging Apps

Applications designed to protect communications via encryption and authentication, safeguarding messages from unauthorized access.

Secure Phone Apps

Secure phone apps use encryption, authentication, and secure storage to protect sensitive data and communications.

Situational Awareness

Situational Awareness is knowing where you are and what is going on around you, allowing individuals and organizations to be more alert and informed and to make better decisions.

Unified Endpoint Management (UEM)

Unified Endpoint Management (UEM) helps enterprises manage, control, and secure all connected devices from a single centralized interface.

Windows Device Management

The centralized administration of Windows-based devices to enforce policies, deploy updates, and maintain security and compliance.