What is mobile technology?
Explore IBM's mobile technology solution Subscribe to Security Topic Updates
closeup of two hands, each holding and using a cell phone
What is mobile technology?

Mobile technology is technology that goes where the user goes. It consists of portable two-way communications devices, computing devices and the networking technology that connects them.

Currently, mobile technology is typified by internet-enabled devices like smartphones, tablets and watches. These are the latest in a progression that includes two-way pagers, notebook computers, mobile telephones (flip phones), GPS-navigation devices and more.

The communications networks that connect these devices are loosely termed wireless technologies. They enable mobile devices to share voice, data and applications (mobile apps).

Mobile technology is pervasive and growing. The number of smartphone users has climbed beyond 3 billion¹ and the global mobile workforce is expected to reach 1.87 billion by 2022.²

Cost of a Data Breach

Get insights to better manage the risk of a data breach with the latest Cost of a Data Breach report.

Related content

Register for the X-Force Threat Intelligence Index

Types of mobile networks
Cellular networks

Radio networks that use distributed cell towers that enable mobile devices (cell phones) to switch frequencies automatically and communicate without interruption across large geographic areas. The same basic switching capability enables cellular networks to accommodate many users across a limited number of radio frequencies.³

4G networks

The current cellular service standard for most wireless communication. It uses packet switching technology, which organizes data into parts or packets for transmission and reassembles the information at the destination. 4G—“G” for generation—is reported to be 10x faster than 3G. And 5G, a much faster network, is coming still. 5G uses a set of aggregated frequency bands to unlock bandwidth and is approximately 20x faster than 4G.

Wifi

Radio waves that connect devices to the internet through localized routers called hotspots. Short for wireless fidelity, wifi networks are like cell towers for internet access, but they don’t automatically pass service without establishing a wifi connection. Most mobile devices allow for automatic switching between wifi and cellular networks depending upon availability and user preference.

Bluetooth

A telecommunications industry specification for connecting devices over short distances using short-wavelength radio waves. Bluetooth enables users to quickly connect or pair devices such as headsets, speakers, phones and other devices.

What is 5G?

5G is the fifth generation of cellular wireless technology. Like 4G, it uses frequencies that are part of the radio spectrum, but 5G uses very high frequencies that offer more bandwidth. This means more data delivered at higher speeds to more devices. Imagine video streaming to a smartphone—5G will make it 10x better not just for an individual, but for anyone streaming a video at the same time.

Switching to 5G? Know Your Integrated Security Controls
The 5G Revolution
Get a guide to the transformational potential of 5G
Mobile technology case studies
Increase productivity

Using its Road Day mobile app to upload claims information from the field, Amica Mutual Insurance Company achieved 25% to 50% estimated productivity gains for its workflow processes. The app enables adjusters to collaborate closely with customers in the field, improving the accuracy of claims and helping customers feel more involved.

Read more
Capitalize on new business models

Frogs are disappearing in Australia—4 of the 240 known species. To protect them, scientists needed a faster data-gathering model. Part of a crowd-sourcing approach, the FrogID app enables Australians to make audio recordings of frogs’ unique calls and upload them to an online database. The app also uses GPS coordinates to map frog populations.

Read the case study
Create the ideal shopping scenario

City Furniture uses mobile technology to create an almost ideal shopping experience.  Customers can combine online research with the ability to physically touch items and interact with sales personnel. The mobile app used by sales associates on their tablets accesses real-time data, processes payments and schedules deliveries—all without leaving the customer’s side.

Read more
Key capabilities of effective mobile technology

Scalability: Creating point solutions that don’t scale across an enterprise can be costly in terms of development, management and maintenance. Apps need to be conceived holistically with consideration for lines of business, processes and technical environments.

Integration:
Being able to connect logic and data services to the app is critical, whether the logic and data are on premises, on the cloud or in hybrid configurations.

Reuse:
Over 105 billion mobile apps were downloaded in 2018. Many are, or can be modified or combined, for business applications. Using existing apps accelerates time-to-value and improves cost efficiency by taking advantage of domain and industry expertise built into the app.

Cloud-based development:
The cloud offers an efficient platform to develop, test and manage applications. Developers can use application programming interfaces (API) to connect apps to back-end data and focus on front-end functions. They can add authentication to bolster security, and access artificial intelligence (AI) and cognitive services.

Mobility management:
As mobile technology is deployed, organizations look to enterprise mobility management (EMM) solutions to configure devices and apps; track device usage and inventories; control and protect data; and support and troubleshoot issues.

BYOD:
Bring your own device (BYOD) is an IT policy that allows employees to use personal devices to access data and systems. Effectively adopted, BYOD can improve productivity, increase employee satisfaction and save money. At the same time, it presents security and device management questions that need to be addressed.

Security:
The mobile security battle is daunting in terms of volume and complexity. Artificial Intelligence (AI) is emerging as a key weapon to discern security anomalies in vast amounts of data. It can help surface and remediate malware incidents or recommend actions to meet regulatory requirements from a central dashboard.

Edge computing:
One of the key advantages of 5G is that it can bring applications closer to their data sources or edge servers. Proximity to data at its source can deliver network benefits such as improved response times and better bandwidth availability. From a business perspective, edge computing offers the opportunity to perform more comprehensive data analysis and gain deeper insights faster.

Set up for 5G and edge: Read the blog
Related Solutions
Manage mobile devices

Secure and careful management of mobile devices, content and apps is imperative—whether for a specific operating system, multiple device types or a mixed environment.

Improve mobile device management
Simplify support of mobile environments

Move from mobile device management (MDM) to unified endpoint management (UEM). Use cloud, AI and analytics to support a complex endpoint and mobile environment.

Explore UEM and a cloud approach
Elevate mobile experiences by design

Design thinking, data, technology and creativity can come together to develop enhanced, engaging mobile experiences. A key is finding the right partner.

Discover IBM iX
Transform how you manage devices, apps and data for frontline workers

The IBM Security® MaaS360® Unified Endpoint Management (UEM) solution has been built to help you manage and protect the frontline workforce's devices, apps, and data no matter their location.

Learn more about UEM for frontline workers
Resources What consumers expect from 5G entertainment

See what’s exciting consumers about 5G technology—from mobile video streaming to immersive media experiences to eSports and beyond.

Advanced endpoint protection versus risk-based application patching versus laptop management

Read the blog and learn about the similarities and differences between advanced endpoint protection, laptop management and risk-based application patching.

MDM vs. MAM: Top 5 differences

Learn more about differences between mobile device management and mobile application management, in order to make sure your mobile devices, users and data remain protected.

Take the next step

As flexible work models have become the new norm, employees must remain productive when working from anywhere, on any device, in a protected way. From endpoint management to native security, IBM Security MaaS360 provides an end-to-end UEM solution. 

Explore MaaS360 Book a live demo
Sources

¹ Number of smartphone users worldwide from 2016 to 2021, Statista (link resides outside ibm.com)

² The mobile workforce: the new movement, Information Age (link resides outside ibm.com)

³ Cellular Network, Techopedia (link resides outside ibm.com)

⁴ What is WiFi and How Does it Work?, CCM.net (link resides outside ibm.com)

⁵ Bluetooth, TechTarget (link resides outside ibm.com)

⁶ App Download and Usage Statistics, Business of Apps (link resides outside ibm.com)