Word of the Day: Tech Definitions from WhatIs.com


July 17, 2019  5:32 PM

deep packet inspection (DPI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Deep packet inspection (DPI) is an advanced method of examining and managing network traffic. Continued…

Quote of the Day

“DPI enables IT administrators and security officials to set policies and enforce them at all layers, including the application and user layer, to help combat malware and other threats.” – Lee Doyle

Learning Center
How can organizations address VoIP security threats?
VoIP security threats can cost an organization time and money, but the right tools can prevent fraud, stolen credentials and intercepted traffic. Learn what security provisions organizations can put in place to better protect against VoIP threats.

How to deploy deep packet inspection in the cloud
Deep packet inspection in the cloud can help improve enterprises’ network security, but it also raises some privacy concerns. Learn about potential problems with DPI and how to get around them.

How best to secure cloud computing in this critical era
Secure cloud computing first requires an understanding of the nature of the risk and, then, how to apply the best tools and practices to minimize it. This guide collects our recent must-reads to help you outsmart the threats.

Deep packet inspection tools: Proxy vs. stream-based
Deep packet inspection tools were once used mostly by service providers. Now that enterprise network managers are considering DPI tools, they’ll have to determine the strategy that works best for their environments.

Where SDN and DPI technology meet: Centralized control and automation
When SDN and DPI technology meet, network engineers have the means to apply monitoring and management policy to the overall network instead of to individual components.

Trending Terms
packet filtering
application layer
OSI
throttled data transfer
network intelligence

Quiz Yourself
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
a. though
b. although
c. even though
Answer

July 16, 2019  5:04 PM

passwordless authentication

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Passwordless authentication is a verification process where a user confirms his or her identity without the requirement of manually entering a string of characters. Continued…

Quote of the Day

“Passwordless authentication isn’t automatically secure, and its security depends on its implementation.” – Kevin Beaver

Learning Center
Despite Windows 10 issues, customers remain confident in OS
Windows 10 issues continue to generate headlines and appear to be giving the operating system a bad name. But that’s more appearance than reality for Microsoft customers, according to one analyst.

Benefits of mobile passwordless authentication
With passwordless authentication for mobile devices, IT ensures that its organization isn’t one guessed password away from a major breach. This technology relies on authentication factors such as trusted email accounts and devices.

Microsoft wants to eliminate passwords — and there’s an app for that
Microsoft bolstered its plan to eliminate passwords with an update to its Microsoft Authenticator app, which will extend passwordless logins for Azure AD-connected apps.

Identity management strategy starts with people, not technology
In this Q&A, Gartner analyst Kevin Kampman discusses how an organization’s identity management strategy has transformed and the way organizations should incorporate identity management into their business process.

Ponemon study: Poor password practices remain rampant
A Ponemon Institute report, sponsored by Yubico, revealed that despite concerns over privacy and data protection and a greater understanding of security practices, poor password practices are still rampant.

Trending Terms
phishing
two-factor authentication
fingerscanning
facial recognition
mobile authentication
biometric authentication

Quiz Yourself
The phishing email warned that unless I updated my contact information, my eBay account would be ______________.
a. canceled
b. cancelled
Answer


July 15, 2019  2:27 PM

social robot

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A social robot is an artificial intelligence (AI) system that is designed to interact with humans and other robots. Continued…

Quote of the Day

“There are lots of people who have come out and taken a dystopian view that computers are going to ultimately take over the world and wipe us out. Then, there’s a more hopeful view, which is that we still – at least for the foreseeable future – call the shots and engage where we choose to and AI acts on our behalf.” – Anthony Scriffignano

Learning Center
AI in the legal industry focuses on augmenting research
Robot lawyers are here. Well, not exactly, but lawyers are augmenting their work with content discovery, organization and predictive analytics. AI applications can even offer self-help legal aid that bypasses the need for initial consultations or legal services. Read how AI in the legal industry is transforming legal processes.

Debate over AI in the workforce requires a broad view
From total AI labor domination to simple automated process implementation, gauging the employment impacts of AI in the workforce has never been harder. Every think-piece on the future of work revolves around finding an answer that avoids job loss. But what if we’re asking the wrong question?

The steady evolution of RPA to intelligent automation
The evolution of RPA is a long journey, one that started more than two decades ago. While the core function of automation remains the same, the complexity and use cases of RPA have expanded over the years and will likely continue to grow.

How AI process automation helps simplify enterprise workflows
AI process automation tools are helping enterprises make their workflows more intelligent and speed up processes that today are drowning in paper and inefficiency.

Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.

Trending Terms
artificial intelligence
smart robot
cognitive computing
natural language processing
machine learning

Quiz Yourself
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
A. except
B. accept
Answer


July 12, 2019  3:48 PM

metadata management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Metadata management is the administration of data that describes other data. Continued…

Quote of the Day

“Big data often comes with big data management problems. Clean, well-defined metadata can make the difference in analyzing big data and delivering actionable business intelligence.” – Scott Robinson

Learning Center
Get to know data governance tools for the enterprise
Data governance tools can help businesses address a number of content management issues. Learn more about some of those platforms and the problems they solve.

IBM Spectrum storage refresh targets object, AI metadata
Discover, part of IBM Spectrum storage software, improves metadata management for AI and big data analytics on large-scale file and object storage. IBM boosted Spectrum data protection and Cloud Object Storage capacity. VersaStack with FlashSystem 9100 NVMe flash is in preview.

Solix archiving takes files, databases, email to the cloud
Solix archiving goes SaaS. Labeled ‘archiving as a service’ by the vendor, SolixCloud Enterprise Archiving offers file, database and email archives in Microsoft Azure.

A strong metadata management process eases big data woes
A well-organized metadata management process can make all the difference in analyzing big data and delivering actionable business intelligence results.

How metadata management relates to data governance and MDM
Without effective metadata management processes, an organization couldn’t have a successful data governance or master data management program, says consultant Anne Marie Smith.

Trending Terms
metadata
document metadata
metadata security
information life cycle management
data catalog
metabase

Quiz Yourself
Although big data is getting bigger all the time, much of the data being collected ___ useless.
a. is
b. are
Answer


July 11, 2019  3:51 PM

VM automation

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. Continued…

Quote of the Day

“Admins looking to automate VM tasks should consider whether or not their workloads are large enough to benefit from automation.” – Stefani Muñoz

Learning Center
VM automation strategies and benefits for sizable workloads
VM automation can provide several benefits, such as speed and consistency, but not all workloads are suited for this process. IT administrators must be aware of their own workloads, common mistakes and tools offered before incorporating automation into their environments.

What VM automation tools are available?
Learn about the various types of VM automation tools you can choose from to enable rapid and predictable resource provisioning. Automation is rarely a discrete product, but is part of a larger tool set, so careful evaluation is necessary.

VMware Workstation 15’s built-in REST API eases VM automation
VMware’s Workstation 15 has several new features — notably, a built-in REST API you can use for automation. Easily power machines off and on, and save time using this helpful tool.

What are the most common virtualization automation mistakes?
There are three primary mistakes you might make when implementing virtualization automation. Avoid them by examining your business policy, double-checking VM configuration and accommodating changing business needs.

How can automation help with VM creation and maintenance?
Automation can help ease VM creation and maintenance, allowing administrators to quickly provision and patch large numbers of virtual servers.

Trending Terms
VMware vSphere PowerCLI
VMware vRealize Suite
virtual machine
IT automation
VMware DRS

Quiz Yourself
Application streaming and virtualization can help you _______ greater network efficiency.
a. attain
b. obtain
Answer


July 10, 2019  3:59 PM

business analytics (BA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Business analytics (BA) is the iterative, methodical exploration of an organization’s data, with an emphasis on statistical analysis. Continued…

Quote of the Day

“Companies often report the highest analytics success when blending teams, so data scientists working alongside business analysts can produce operational benefits.” – Ed Burns

Learning Center
Guide to telling stories with data: How to share analytics insights
Using data visualizations to convey information can be a challenge. Learn more about telling stories with data in this guide to effective data storytelling.

Data scientist vs. business analyst: What’s the difference?
Many people confuse data scientists with business analysts, but the roles are distinct. One career expert explains data scientist vs. business analyst roles, how they are similar and where they differ.

The direction of business intelligence is changing to forward
As business intelligence is changing quickly, one of the key trends will be the ability for BI platforms to look forward and be predictive, rather than just detail what has already taken place.

Building leaner, meaner BI data sources
Now that business intelligence has broken free from traditional data warehousing, the data that feeds it has taken center stage. In this tip, get advice for building better BI data sources and getting the most out of BI analysis and reporting.

Make better business decisions with financial analytics
Your organization can take advantage of financial analytics to predict the future, make better business decisions and automate data reporting. Not only that, but by using predictive and advanced analytics tools, you can improve the overall performance of your finance department.

Trending Terms
business intelligence
statistical analysis
predictive analytics
descriptive analytics
prescriptive analytics
data scientist
data artist

Quiz Yourself
The use of a spreadsheet when a data warehouse was required created a situation _______ effective analysis was impossible.
a. where
b. in which
Answer


July 9, 2019  4:02 PM

cloud access security broker (CASB)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. Continued…

Quote of the Day

“While a cloud access security broker is certainly one of the more useful products available to help achieve a cyber-resilient organization, it’s of limited use without a team capable of understanding these use cases and responding to alerts generated by the system.” – Rob Shapland

Learning Center
Incident response tools: How, when and why to use them
There are several categories of dedicated incident response tools — including vulnerability management, SIEM, network traffic analysis and data loss prevention — that can provide information and analysis and create reports to help organizations prevent and respond appropriately to security attacks.

How cloud access security brokers have evolved
Cloud access security brokers made a big splash when they first entered the industry, but where are they now? Here’s a look at where they stand.

The CASB market is (nearly) gone but not forgotten
A series of acquisitions have drastically reduced the number of stand-alone cloud access security brokers and reshaped the CASB market for years to come.

CASB market poised for channel growth
The CASB market, while nascent, is opening up a significant opportunity for channel firms to address clients’ security concerns.

The pros and cons of proxy-based security in the cloud
Microsoft addressed the issue of proxy-based security for Office 365 and the associated benefits and drawbacks. Learn what Microsoft recommended and why.

Trending Terms
cloud service provider
access control
shadow IT
CipherCloud
cloud encryption
CAIQ

Quiz Yourself
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating
Answer


July 8, 2019  4:04 PM

unified endpoint management (UEM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console. Continued…

Quote of the Day

“One effective option for organizations concerned about mobile threats is to combine the best features of UEM and mobile threat defense tools.” – Jack Gold

Learning Center
Go beyond UEM security to prevent mobile attacks
IT pros should look beyond UEM security utilities when they develop a mobile threat prevention strategy. Mobile threat defense tools can add crucial monitoring and threat detection functions to managed mobile devices.

Understand how UEM, EMM and MDM differ from one another
UEM, EMM and MDM tools offer varying levels of control over mobile devices, laptops and PCs. Read on to find out what exactly each type of management tool can do and how the tools differ.

Why UEM could overshadow the EMM market
EMM, MDM, MAM and UEM sound like the ingredients of alphabet soup, but it’s actually the progression of changing products in an ever-evolving competitive landscape. Here, one expert predicts the future of the EMM market.

How to navigate a sea of UEM vendors
UEM has evolved from a variety of products, including MDM and EMM. Discover what this new market has to offer and which UEM vendors are taking the lead.

Explore the features of unified endpoint management
Choosing and managing UEM software can be complicated. It’s important to understand how unified endpoint management can benefit your IT deployment and what features it brings to the table.

Trending Terms
mobile device management
enterprise mobility management
unified network management
EUC platform
digital workspace

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


July 3, 2019  8:12 PM

cloud object storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Cloud object storage is a decentralized approach to storing digital information in a cloud service provider’s data centers. Continued…

Quote of the Day

“Cloud object storage is transitioning from simply a cheap place to store data to include more uses such as governance.” – Archana Venkatraman

Learning Center
Cloud data management finding its place as volumes soar sky high
Cloud data management is a key piece of the storage puzzle, with billions of terabytes on the datasphere horizon. There are a number of uses for cloud, but it’s not the end-all be-all for data.

5 multi-cloud use cases for better storage
The use of multiple clouds for storage has quickly become mainstream. Check out how multi-cloud use cases help with backup, resiliency, compliance, AI and software development.

Nasuni CEO: Enterprises now think ‘cloud first’
Nasuni CEO Paul Flanagan says enterprises are thinking ‘cloud first’ and storing more data in the cloud, but it still represents only a small fraction of their overall capacity.

Elastifile adds automated tiering to cloud object storage
Cloud file system startup Elastifile launched a 3.0 product update that adds automated tiering capabilities to object storage in private and public clouds and eases application access to object data.

Effective data management to combat the coming data apocalypse
Effective data management is key to ensuring your organization’s data is accessible and usable in the future. Our essential guide shows you how data management and storage are evolving to deal with issues surrounding unstructured data, IoT-generated data, cloud storage and tiering.

Trending Terms
network attached storage
storage area network
object ID
cloud storage gateway
cloud storage service

Quiz Yourself
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
A. separate
B. seperate
Answer


March 29, 2019  8:17 PM

endpoint security management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

Quote of the Day

“Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions.” – Kevin Beaver

Learning Center
NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released its 2019 Advanced Endpoint Protection Group Test results this month at RSA Conference. The vendor’s CTO, Jason Brvenik, discusses the results, the challenges in testing the products and how the endpoint protection market is changing.

How EDR tools can improve endpoint security
EDR tools, a relatively new category of proactive endpoint security tools, can help in IT’s fight against malware. Find out if EDR is a good option for your deployment.

Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell announced its partnership with CrowdStrike and Secureworks to launch SafeGuard and Response, an endpoint security portfolio designed to prevent, detect and respond to threats facing enterprises — especially midmarket companies.

How to address endpoint security issues caused by users
There are several common endpoint security issues that users cause, including weak passwords and unsecured network connections. IT should handle these with security policies that address the behaviors directly.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

Trending Terms
client server
endpoint authentication
unified endpoint management
endpoint reference
virtual LAN
endpoint device

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: