Browse Definitions :
Definition

Viber

Viber is a VoIP and instant messaging application with cross-platform capabilities that allows users to exchange audio and video calls, stickers, group chats, and instant voice and video messages. It Is a product of Rakuten Viber, a multinational internet company headquartered in Setagaya-ku, Tokyo, Japan.

Messages sent over Viber are protected with end-to-end encryption. The app is popular for users who want to hold public and private conversations, as well as play games with other users and access the service via desktop. Viber is compatible with voice assistants such as Google Assistant and Siri, as well as the contacts list in a user’s phone. Viber’s instant messaging includes features like the capacity to share photos, GIFs, stickers, videos and emoticons.

Connecting desktop and smartphone chat, Viber supports iOS, Android, Windows XP and up, Mac OS 10.7 and up, as well as Linux Fedora and Ubuntu. The software also enables switching calls and chats between mobile and desktop. Users who speak different languages can converse with real-time translation features. By tapping a block of text, the user can choose a language and instantly translate the text.

Viber supports extensions for capabilities that allow users to do more without leaving chat windows. Extensions exist for finding restaurants, performing searches and sharing music and video.

The chat program offers direct marketing to help businesses attract users with promotional opportunities like stickers, ads, communities and direct marketing messages. When customers are interested, transitioning from marketing to selling is enabled with e-commerce integration. Viber has over a billion users and supports over two million interactions every minute, according to the company.

Most of Viber’s features are free, with some exceptions including calls made to landlines, international calls, and calls made to cell phones that do not have the Viber app.

This was last updated in September 2018

Continue Reading About Viber

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close