Discussions

  • pen test (penetration testing)

    Penetration testing (also called pen testing) is a tool for testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. (Continued)

    ITKE352,580 pointsBadges:
  • Best practices for using Outlook .PST files on portable USB drives

    You can save Microsoft Outlook email data in a .PST file to a portable USB storage drive, but make sure you understand these best practices first.

  • predictive dialer

    A predictive dialer is a telephone control system that automatically calls a list of telephone numbers in sequence, screening out no-answers, busy signals, answering machines and disconnected numbers while predicting at what point a human caller will be able to handle the next call.

    ITKE352,580 pointsBadges:
  • Fine-tune storage networks

    How key SAN components, principally host bus adapters and switches, are configured will determine overall SAN performance. If you know what to look for and how to make adjustments, performance issues can be greatly reduced.

    ITKE352,580 pointsBadges:
  • COBIT

    COBIT  is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

    ITKE352,580 pointsBadges:
  • Quiz: Test your knowledge of cloud portability issues

    Think you know about cloud portability? Find out by taking this quick, five-question quiz!

    Moriah Sargent155 pointsBadges:
  • MDM puts mobile geofencing, geolocation services on the map

    The GPS chips in today's mobile devices, combined with most MDM products' geofencing and geolocation features, pack a powerful punch for IT security.

    rhsheldon485 pointsBadges:
  • Dual persona tackles Android device security concerns

    Enterprise IT is still seeking ways to ensure Android device security. Dual persona can protect business apps and data from the risks of personal device use.

    LisaPhifer1,215 pointsBadges:
  • Is a secure container the best way to protect mobile data?

    MFINNERAN85 pointsBadges:
  • How 2FA security bolsters user authentication

    IT pros can limit their exposure by solidifying user authentication. One popular option is to implement two-factor authentication, or 2FA, security on logins.

    rhsheldon485 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following