API
application programming interface
CA
certification authority
DNS
Domain Name System
ECDH
Elliptic Curve Diffie-Hellman
EAP
Extensible Authentication Protocol
EMM
Enterprise Mobility Management
FQDN
fully qualified domain name
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol over Secure Sockets Layer
IP
Internet Protocol
IT policy
An IT policy consists of various rules
that control the security features and behavior of devices.
IKE
Internet Key Exchange
MAM
mobile application management
MDM
mobile device management
MS-CHAP
Microsoft Challenge Handshake Authentication Protocol
NAS
network-attached storage
NTLM
NT LAN Manager
OTP
one-time password
PAP
Push Access Protocol
RADIUS
Remote Authentication Dial In User Service
REST
Representational State Transfer
SAML
Security Assertion Markup Language
SIP
Session Initiation Protocol
SSL
Secure Sockets Layer
TLS
Transport Layer Security
UEM
Unified Endpoint Manager
VPN
virtual private network