Glossary technical glossary and definitions of digital transformation technology terms. 

Android & iOS app signing

Both  Android and  iOS require developers to “sign” their apps before they can be distributed and installed. An app is signed with a certificate identifying a developer as the author of that app and verifying the app has not been modified since it was last signed. Apps are self-signed with private certification keys.

App code obfuscation

Code obfuscation is transforming a software program into code that’s difficult to disassemble and understand yet maintains its original functionality. In this way, the software remains completely functional but extremely resistant to reverse engineering and tampering attacks.

App security

App security refers to the practices and policies that shield high-value mobile applications from reverse engineering, tampering, and other app-centric attacks. App security includes application hardening to obscure code, runtime application self-protection (RASP) and self-healing measures, White-Box Cryptography to encrypt critical data & keys, and real-time app threat telemetry for closed-loop threat intelligence as the original. In this way, the software remains completely functional but extremely challenging  to reverse engineer.

Application attacks

An attack can occur whenever an organization’s mobile app is accessible “in the wild” — apps available via public app stores.

Application hardening

Application hardening is a process of taking a finished application and making it more difficult to reverse engineer and tamper. Combined with secure coding practices, application hardening is a best practice for companies to protect their app's IP and prevent misuse, cheating, and repackaging by bad users.

Deployment automation

Deployment automation enables software deployment to testing and production environments automatically with a single action. Automation in software deployment reduces risks for production deployments and provides efficiency in release pipelines.

Enterprise app distribution

An Enterprise App Distribution platform allows organizations to securely deploy and manage policy-enabled mobile apps through a variety of distribution methods, including direct links to users, a corporate portal, a private app store, or MDM/EMM systems.

Enterprise app store

An Enterprise App Store is an HTML or native iOS, Android, or Windows private app catalog for mobile workers in the extended enterprise to discover and download corporate-sanctioned and secured mobile apps. A best-of-breed enterprise app store is custom-branded, solicits feedback and ratings from users, does not require device management, and sits on top of an easy-to-use admin console that secures any app and supports the full app lifecycle.

Mobile app wrapping

Mobile app wrapping is a method for applying business or security logic to individual apps that have already been compiled.

Mobile application management

Mobile Application Management (MAM®) refers to the workflow for security, governance, and distribution of mobile apps in the enterprise. Best-of-breed app management provides app-level security for any app, deploys apps to every user in the extended enterprise because it is device management agnostic, manages the complete app lifecycle, and enables multiple app distribution methods, including an intuitive, custom-brandable enterprise app store.

Mobile authentication

Mobile authentication establishes user authentication for the enterprise app store and for the mobile apps themselves without maintaining an entirely separate set of user credentials.

Release orchestration

Release Orchestration is the process of orchestrating the activities required to deliver an application from code commit to production, enabling organizations to manage and optimize the flow of value across the DevOps value stream. Release Orchestration automates many tasks that are often done manually by release management. With Release Orchestration, DevOps teams are able to model software delivery pipelines, coordinate automated tasks with manual work, integrate a variety of tools for building, testing, and deploying software, and use data to identify bottlenecks and areas for potential areas for improvement. Release Orchestration is also known as Application Release Orchestration (ARO), Application Release Automation (ARA) or Continuous Delivery and Release Automation (CDRA).

Release pipeline

A release pipeline is made up of the manual and automated steps needed to move a code change from development, through build and test activities, to deployment in production. Manual steps can be executed by technical team members or business stakeholders and include both release processes and approval gates. Automated steps are executed by the tools within the DevOps landscape.

Runtime application self-protection’s application and mobile app protection solutions go beyond Runtime Application Self-Protection (RASP) by providing layered and adaptive app protection and data encryption ensuring apps are protected against run-time attacks, are defended against reverse engineering, and are able to maintain secure communications with key encryption.

Value stream mapping

Value stream mapping is a Lean-Agile management tool that helps organizations visualize the process steps needed to take a product from creation through delivery to end users. Value stream mapping helps you understand your business better so you can eliminate waste and improve process efficiency.

Web application security

Web application security refers to the protection of both browser endpoints, and the APIs they connect to, against attack from Magecart/formjacking-style attacks, malicious browser extensions, banking trojans, malvertisements, and other cyber security threats. When addressed properly—including JavaScript protection, threat detection, and limiting API connections to known good sites, along with defensive measures that can shut down web app functionality in the event of an attack—effective web application security enables customers to detect and protect against active threats, protecting businesses and consumers from data breaches and financial losses.

White-box cryptography

White-Box Cryptography uses encryption, obfuscation, and mathematical transformations to secure keys and critical data inside applications running in untrusted environments. Common practice is not to assume cryptographic keys will be stored in untrusted environments, making them vulnerable to application attacks, such as reverse engineering.

Contact Us