Solutions
Use Case
Mobile App Security Testing ›
Mobile App Vetting ›
Firmware Security Testing ›
Enhance Security Offering with Quokka intelligence feed ›
Industry
Federal ›
State & Local ›
Financial Services ›
Healthcare ›
mCommerce ›
Telecoms ›
See how Security Leaders use Quokka ›
Products
Products
Mobile App Security Testing ›
Mobile App Vetting ›
Firmware Security Analysis ›
Explore Quokka's Mobile App Risk Intelligence ›
Resources
Resources
Resource Center ›
Blog ›
Events ›
Original Research
CVEs ›
Paper & Conferences ›
Customer Support ›
Partners
Partners
Resellers & Distributors ›
Technology Partners & Integrations ›
Become a Quokka Partner ›
Enhance your offering with Quokka's intelligence feed ›
Company
Company
About us ›
Leadership ›
Newsroom ›
Careers ›
Contact Us ›
Search ...
Results
Request Demo
Request Demo
A Glossary of Mobile Security Terminology
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
A
Agentless
B
Bring Your Own Device (BYOD)
C
Corporate-Owned Personally Enabled (COPE)
D
Dynamic Application Security Testing (DAST)
F
Forced-Path Execution App Analysis
Firmware
Flow-Based Vulnerability Scanning
H
Hidden App
I
Interactive Application Security Testing (IAST)
M
Malicious Behavior Profiling
Mobile App Risk Intelligence
Mobile App Security Testing (MAST)
Mobile Device Management (MDM)
Mobile Malware
Mobile Threat Defense (MTD)
Mobile App Vetting (MAV)
P
Penetration Testing (Pen Testing)
Phishing
Pre-Installed App
Privileged / System App
S
Secure by Design
Security Operations Center (SOC)
Software Bill of Materials (SBOM)
Static Application Security Testing (SAST)
Our award-winning mobile app security technology
Mobile security that makes you smile.
Sign up for our newsletter, The Quokka Intel Briefing
Copyright © 2026, Quokka. All rights reserved.
Search ...
Results