Word of the Day: Tech Definitions from WhatIs.com


July 9, 2019  4:02 PM

cloud access security broker (CASB)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. Continued…

Quote of the Day

“While a cloud access security broker is certainly one of the more useful products available to help achieve a cyber-resilient organization, it’s of limited use without a team capable of understanding these use cases and responding to alerts generated by the system.” – Rob Shapland

Learning Center
Incident response tools: How, when and why to use them
There are several categories of dedicated incident response tools — including vulnerability management, SIEM, network traffic analysis and data loss prevention — that can provide information and analysis and create reports to help organizations prevent and respond appropriately to security attacks.

How cloud access security brokers have evolved
Cloud access security brokers made a big splash when they first entered the industry, but where are they now? Here’s a look at where they stand.

The CASB market is (nearly) gone but not forgotten
A series of acquisitions have drastically reduced the number of stand-alone cloud access security brokers and reshaped the CASB market for years to come.

CASB market poised for channel growth
The CASB market, while nascent, is opening up a significant opportunity for channel firms to address clients’ security concerns.

The pros and cons of proxy-based security in the cloud
Microsoft addressed the issue of proxy-based security for Office 365 and the associated benefits and drawbacks. Learn what Microsoft recommended and why.

Trending Terms
cloud service provider
access control
shadow IT
CipherCloud
cloud encryption
CAIQ

Quiz Yourself
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating
Answer

July 8, 2019  4:04 PM

unified endpoint management (UEM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console. Continued…

Quote of the Day

“One effective option for organizations concerned about mobile threats is to combine the best features of UEM and mobile threat defense tools.” – Jack Gold

Learning Center
Go beyond UEM security to prevent mobile attacks
IT pros should look beyond UEM security utilities when they develop a mobile threat prevention strategy. Mobile threat defense tools can add crucial monitoring and threat detection functions to managed mobile devices.

Understand how UEM, EMM and MDM differ from one another
UEM, EMM and MDM tools offer varying levels of control over mobile devices, laptops and PCs. Read on to find out what exactly each type of management tool can do and how the tools differ.

Why UEM could overshadow the EMM market
EMM, MDM, MAM and UEM sound like the ingredients of alphabet soup, but it’s actually the progression of changing products in an ever-evolving competitive landscape. Here, one expert predicts the future of the EMM market.

How to navigate a sea of UEM vendors
UEM has evolved from a variety of products, including MDM and EMM. Discover what this new market has to offer and which UEM vendors are taking the lead.

Explore the features of unified endpoint management
Choosing and managing UEM software can be complicated. It’s important to understand how unified endpoint management can benefit your IT deployment and what features it brings to the table.

Trending Terms
mobile device management
enterprise mobility management
unified network management
EUC platform
digital workspace

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


July 3, 2019  8:12 PM

cloud object storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Cloud object storage is a decentralized approach to storing digital information in a cloud service provider’s data centers. Continued…

Quote of the Day

“Cloud object storage is transitioning from simply a cheap place to store data to include more uses such as governance.” – Archana Venkatraman

Learning Center
Cloud data management finding its place as volumes soar sky high
Cloud data management is a key piece of the storage puzzle, with billions of terabytes on the datasphere horizon. There are a number of uses for cloud, but it’s not the end-all be-all for data.

5 multi-cloud use cases for better storage
The use of multiple clouds for storage has quickly become mainstream. Check out how multi-cloud use cases help with backup, resiliency, compliance, AI and software development.

Nasuni CEO: Enterprises now think ‘cloud first’
Nasuni CEO Paul Flanagan says enterprises are thinking ‘cloud first’ and storing more data in the cloud, but it still represents only a small fraction of their overall capacity.

Elastifile adds automated tiering to cloud object storage
Cloud file system startup Elastifile launched a 3.0 product update that adds automated tiering capabilities to object storage in private and public clouds and eases application access to object data.

Effective data management to combat the coming data apocalypse
Effective data management is key to ensuring your organization’s data is accessible and usable in the future. Our essential guide shows you how data management and storage are evolving to deal with issues surrounding unstructured data, IoT-generated data, cloud storage and tiering.

Trending Terms
network attached storage
storage area network
object ID
cloud storage gateway
cloud storage service

Quiz Yourself
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
A. separate
B. seperate
Answer


March 29, 2019  8:17 PM

endpoint security management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

Quote of the Day

“Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions.” – Kevin Beaver

Learning Center
NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released its 2019 Advanced Endpoint Protection Group Test results this month at RSA Conference. The vendor’s CTO, Jason Brvenik, discusses the results, the challenges in testing the products and how the endpoint protection market is changing.

How EDR tools can improve endpoint security
EDR tools, a relatively new category of proactive endpoint security tools, can help in IT’s fight against malware. Find out if EDR is a good option for your deployment.

Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell announced its partnership with CrowdStrike and Secureworks to launch SafeGuard and Response, an endpoint security portfolio designed to prevent, detect and respond to threats facing enterprises — especially midmarket companies.

How to address endpoint security issues caused by users
There are several common endpoint security issues that users cause, including weak passwords and unsecured network connections. IT should handle these with security policies that address the behaviors directly.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

Trending Terms
client server
endpoint authentication
unified endpoint management
endpoint reference
virtual LAN
endpoint device

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


March 28, 2019  8:15 PM

computational storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.

Quote of the Day

“The ability to provide compute services at the device level was not truly available until the adoption rate of SSDs was in place.” – Scott Shadley

Learning Center
Computational storage takes spotlight in new NGD Systems SSD
Computational storage moved into the spotlight with NGD Systems’ new 16 TB NVMe-based SSD that embeds a quad-core ARM processor into its custom-built 14 nm ASIC to execute applications.

NVMe flash storage is coming to an enterprise near you
In the enterprise, NVMe flash storage tends to exist as clustered server nodes dedicated to an individual application. An industry consortium previews forthcoming standards to advance NVMe over fabrics.

2019 IT focus: Storage architecture for big data analytics
Experts predict 2019 IT focus will turn to storage architecture for big data analytics, artificial intelligence, machine learning and IoT, as organizations try to make better use of the morass of data they’ve collected.

How NVMe technology will rock the enterprise storage boat
NVMe technology changes how storage connects to servers and moves storage closer to the CPU, reducing latency and improving performance. It has great promise, but what challenges will businesses face to adopt the new storage protocol?

Vexata storage gets a boost from Fujitsu deal
Fujitsu will sell Vexata storage arrays. The partnership provides market exposure for Vexata, while the Fujitsu portfolio adds its first NVMe-oF storage.

Trending Terms
real-time analytics
NAND flash memory
SSD
persistent storage
hyperscale computing
multi-core processor

Quiz Yourself
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic
Answer


March 27, 2019  8:04 PM

intent-based networking (IBN)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Intent-based networking (IBN) is a network administration model that uses artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.

Quote of the Day

“IBN is about the network having a clear understanding of the purpose, use and importance of all the applications it runs.” – Andrew Froehlich

Learning Center
What is intent-based networking and how does it work?
Intent-based networking has a lot of potential. It also has a lot of hype. Cut through the confusion surrounding intent-based networking with this infographic that illustrates the steps involved.

What is the relationship between intent-based networking and SDN?
What do SDN and intent-based networking have in common? You might have been wondering, so we went ahead and asked for you.

Forward Networks’ software enables intent-based networking
Forward Networks has won TechTarget’s Network Innovation Award in recognition of its assurance and verification platform. Learn more about the company’s intent-based networking software.

Intent-based networking reality check for 2019
In 2019, intent-based networking is more of a futuristic possibility than a tangible reality. But don’t disregard the IBN concept altogether. Instead, take the time to explore the IBN options currently available and learn why enterprises should care.

Intent-based networking vs. SDN: How do they differ?
When comparing intent-based networking vs. SDN, one major difference is how the two technologies use abstraction in their commands. SDN commands remain device-centric, for example, while intent-based networking focuses on business policy.

Trending Terms
network orchestration
AI
software-defined networking (SDN)
Network as a Service
software-defined networking
machine learning

Quiz Yourself
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
a. was
b. were
Answer


March 20, 2019  8:00 PM

video game design

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Video game design is the process of conceiving, planning and directing the creation of an electronic game in which players control images on an electronic display.

Quote of the Day

“Game designers now realize that AI systems that combine the power of machine learning and natural language processing and generation can create content and experiences that are every bit as realistic as those created by their human counterparts.” – Kathleen Walch

Learning Center
The future of IoT in the video game industry
What does IoT have to do with the video game industry? Playgroundz’s Michael Yum outlines IoT’s impact on the gaming industry now and in the future.

Use of AI in video games boosts playing experience
The use of AI in video games continues to grow. Read this article to see how this growing trend contributes to more realistic and engaging playing experiences.

IoT gives the mobile gaming industry a facelift
The mobile gaming industry is getting a makeover thanks to the internet of things. Tatvasoft’s Ritesh Mehta explains how IoT and gaming go hand in hand.

Music composed by AI breathes new life into video games
While video games rely on more and more advanced procedural generation for world building, their soundtracks are generally static. The use of music composed by AI could make soundtracks more dynamic.

Can computer games double as personality assessment tools?
It can be hard for recruiters to determine the reliability of personality assessment tools. Guy Halfteck, CEO of game producer Knack, thinks he has the answer.

Trending Terms
pervasive gaming
cooperative games
role-playing game
game theory
Twitch
augmented reality gaming

Quiz Yourself
Augmented reality seems futuristic but ____ potential has already begun to be realized.
a. its
b. it’s
Answer


January 29, 2019  8:59 PM

digital customer experience delivery platform

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A digital customer experience delivery platform (DCED platform) is software that is used to create and manage structured content.

Quote of the Day

“The core philosophy of CX isn’t limited to customers; it requires a technology investment that shows a customer’s activity across all channels and gives an organization the ability to meet them wherever they are — and optimize communications.” – Scott Robinson

Learning Center
CRM and CX management at crossroads in the customer journey
There will be a place for CRM, especially in organizations with veteran inside sales teams. But CX management gains traction as a model along with the technology supporting it as brands connect marketing to sales and e-commerce and focus on reducing friction in the process.

Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.

Electronics company chooses integrated CRM for all CX needs
Schenck Process uses an integrated CRM — Oracle — for everything CX. The company found there’s a greater benefit to partnering with one company vs. trying to integrate multiple platforms.

Tips to build a successful digital customer service strategy
Learn how to create a successful digital customer service and support strategy with insights from Wendy’s, Chamberlain Group and DoorDash on how they integrated Salesforce AI and added social media channels.

Digital experience management: What it is and how it will change WCM
Web content management is giving way to digital experience management. Expert Geoffrey Bock explains how to manage the shift from static WCM platforms.

Trending Terms
web content management
customer experience management
e-commerce
structured content
content management system
digital CRM

Quiz Yourself
Bad customer service news spreads like wildfire on Twitter. The wise company deals with customer complaints in an __________ manner.
a. empathic
b. empathetic
Answer


January 28, 2019  8:26 PM

COBIT

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

COBIT is a framework for developing, implementing, monitoring and improving information technology (IT) governance and management practices.

Quote of the Day

“The COBIT management and governance methodology is one of several ITSM frameworks that organizes and establishes controls around IT processes and resources.” – Stephen J. Bigelow

Learning Center
How CMMI models compare and map to the COBIT framework
ISACA recently acquired CMMI Institute. Find out how this may affect CMMI models going forward and how those models compare to COBIT.

Words to go: ITSM frameworks for enterprises
These ITSM frameworks run the gamut from ITIL’s and COBIT’s detailed process controls to newly conceptualized Agile/DevOps and community-derived FitSM.

What are the benefits of a risk-based framework for security?
A risk-based framework can help enterprises effectively manage their cybersecurity program and provides many advantages.

IT security frameworks and standards: Choosing the right one
Joe Granneman offers an introduction to IT security frameworks and standards, as well as advice for information security professionals on how to choose an IT security framework.

IT security governance fosters a culture of shared responsibility
IT security governance provides a framework for how IT can partner with business leaders to identify risks, validate policies and protect assets.

Trending Terms
ISACA
information governance
enterprise risk management
COBIT 5
risk assessment framework
maturity model
compliance framework

Quiz Yourself
The compliance deadline has been moved forward, so all reporting is due two months _____ than the original date.
a. later
b. earlier
Answer


January 25, 2019  8:24 PM

single pane of glass

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A single pane of glass is a management console that presents data from multiple sources in a unified display.

Quote of the Day

“Single pane of glass application monitoring is an IT myth on par with Bigfoot: frequently mentioned, constantly sought after and equally as elusive.” – Brian Kirsch

Learning Center
Detroit Symphony tunes up performance on Scale Computing HC3
Scale Computing HC3 hyper-converged appliances and the vendor’s history with video surveillance storage proved a good match for Detroit Symphony Orchestra’s need for simple administration and video archiving.

Single pane of glass for multi-cloud management still elusive
Multi-cloud management is no easy task, and enterprises still search for that elusive single-pane-of-glass tool. Are providers and third-party vendors close to making it a reality?

Hybrid cloud trends offer lessons for potential adopters
Hybrid cloud trends are garnering more attention, and IT administrators who want to adopt the technology should use these tips to prepare for hybrid cloud deployment and migration. A need for workload flexibility drives most hybrid cloud use cases, but admins must carefully plan their approach.

IT operations dashboard efforts strive for single pane of glass
A unified and intuitive IT operations dashboard for app monitoring is a viable possibility, but for all the demand, it often still remains out of reach.

Embrace automation in a hybrid cloud deployment: Free chapter
A hybrid cloud deployment introduces a lot of IT complexity — but automation, when properly implemented, helps simplify management. Use this free chapter from The Evolution of Cloud Computing by Clive Longbottom to keep your hybrid environment running smoothly.

Trending Terms
sysadmin
dashboard
data visualization
OLAP dashboard
unified computing system
converged infrastructure

Quiz Yourself
An executive can _______ a business intelligence dashboard to get an up-to-the moment snapshot of how some element of the business is performing.
a. use
b. utilize
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: