mobile defense


Also found in: Wikipedia.

mobile defense

Defense of an area or position in which maneuver is used with organization of fire and utilization of terrain to seize the initiative from the enemy.
References in periodicals archive ?
Further searches And the definition of "striking force" on page 1-34 to be "striking force--A dedicated counterattack force in a mobile defense constituted with the bulk of available combat power.
In support of the 2008 White Paper and to better meet the support needs related to the restructuring of the defense over the period 2009-2014, the agency defense conversion, called Mobile Defense was created on 10 June 2009.
Iron Dome is a mobile defense system designed to intercept rockets with ranges of up to 70 kilometers and is one of a planned three-tier anti-missile defense system employed by Israel.
Issues included stationary defense (bases with ground forces) or mobile defense (fleets and aircraft).
OSD, the Joint Staff, and the military services have undertaken efforts to reduce mobility energy demand in weapons platforms and other mobile defense systems.
Defensively, Evan Gogonis of Northboro and Joey Dillon of Shrewsbury anchor a deep and mobile defense.
Recipient of the prestigious Frost & Sullivan 2004 Innovative Mobile Office Solution of the Year Award, the SureWave Mobility Suite includes SureWave Mobile Office, SureWave Mobile Defense and SureWave Mobile Platform.
Although the author makes the case that Walker used a mobile defense to hold the perimeter and its vital port, in many respects Walker used a combination of mobile and area defense, holding space and buying time until US-led forces were ready.
InAuth provides advanced mobile defense countermeasures for the world's largest financial institutions, mobile-transactions companies and mobile-wallet issuers.
NQ Mobile Security offers a complete system of mobile defense, including[sup.
Through this partnership, we're expanding our multi-layer mobile defense capabilities with app-level risk analysis to further protect sensitive corporate data from rogue and malicious apps.
Bringing BYOD users into compliance requires implementing a NexGen Secure Web Gateway (SWG) such as the iboss SWG Web Security, which incorporates mobile defense.
Full browser ?