Browse Definitions :
Definition

mobile virtual network operator (MVNO)

A mobile virtual network operator (MVNO) is a reseller for wireless communications services.

An MVNO leases wireless capacity (in effect, purchases “minutes”) from a third-party mobile network operator (MNO) at wholesale prices and resells it to consumers at reduced retail prices under its own business brand. MNOs such as Verizon Wireless and T-Mobile choose to sell to MVNOs because the networks have extra capacity that would otherwise be unused. Rather than taking a loss, the MNO makes a small profit by offloading capacity in bulk at wholesale prices.

MVNOs can afford to mark down their retail prices to a certain extent because they do not have to pay radio frequency spectrum licenses and they have no infrastructure to build or maintain. Because MVNOs have low overhead, they can spend aggressively on marketing to increase their chances of selling minutes to consumers. 

MVNOs typically offer prepaid wireless plans on a subscription basis. Sales and customer service may be handled directly by the MVNO or by yet another entity called a mobile virtual network enabler (MVNE). MVNEs specialize in marketing and administering mobile services.

 

This was last updated in April 2014

Continue Reading About mobile virtual network operator (MVNO)

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

  • pass the hash attack

    A pass the hash attack is an exploit in which an attacker steals a hashed user credential and -- without cracking it -- reuses it...

  • cyber hygiene

    Cyber hygiene (or cybersecurity hygiene) is a cybersecurity practice that maintains the basic health and security of hardware and...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close