Extended detection and response combines signals from multiple security domains so defenders can investigate and respond with broader context than endpoint data alone.
Mobile device management is the use of centralized policy and control to secure, configure, and manage mobile devices and sometimes other managed endpoints.
Device hardening is the practice of reducing unnecessary exposure on a device through safer configuration, fewer services, and tighter control settings.
Endpoint isolation is a containment action that cuts a device off from most network communication so security teams can limit spread and investigate safely.
Sandboxing is the practice of running code or content in a restricted environment so its behavior is contained and its access to the broader system is limited.
Mobile application management is a control approach focused on governing business apps and their data on mobile devices without necessarily managing the entire device at the same depth as MDM.
A trusted execution environment is a protected area of a device or processor designed to isolate sensitive operations and data from the rest of the system.
Browser isolation is a security approach that separates web browsing activity from the user's main endpoint so risky web content is less likely to directly affect the device.
Command-line auditing is the practice of recording and reviewing command execution activity so administrators and security teams can understand what actions were taken on systems.