Word of the Day: Tech Definitions from WhatIs.com

November 30, 2018  7:08 PM

OSI model (Open Systems Interconnection)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

OSI (Open Systems Interconnection) is a reference model for how applications communicate over a network. Continued…

Quote of the Day

“The Open Systems Interconnection (OSI) model describes how the different software and hardware components involved in a network communication should divide their labor and otherwise interact.” – John Burke

Learning Center
What is the difference between TCP/IP model and OSI model?
Our expert explains the difference between the OSI model vs. the TCP/IP model, and breaks down how the layers of the models relate to each other in terms of network communications.

How security, compliance standards prevent OSI layer vulnerabilities
To establish the best network cybersecurity, organizations should focus on creating a security and compliance framework for each OSI model. Read this tip to learn more about OSI layer vulnerabilities and the strategies to mitigate them.

Guide to identifying and preventing OSI model security risks: Layers 4 to 7
Organizations establishing network cybersecurity should focus on creating a framework to offset vulnerabilities in each layer of the Open Systems Interconnection. Read part two of this tip to learn more strategies to offset OSI model security risks in layers 4 to 7.

Layer 3 switches explained
Layer 3 switches are explained in this tip, including the difference between a switch, a router and a Layer 3 switch.

A comprehensive review of network performance monitors
Network performance monitors are crucial to today’s data centers. In this buyer’s guide, expert Andrew Froehlich takes a look at the systems that keep modern networks going.

Trending Terms
layer 3

Quiz Yourself
Inefficient use of bandwidth is the _____ of the network administrator’s existence.
a. bane
b. bain

November 29, 2018  7:03 PM

immutable infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Immutable infrastructure is an approach to virtual resource management in which a component is built, tested and deployed once and discarded if it needs to be changed. Continued…

Quote of the Day

“For immutable infrastructure, the mental turn involves pairing infrastructure abstraction layers such as VMs and containers with time-tested software build automation concepts to realize the ideal of infrastructure as code.” – Kurt Marko

Learning Center
Is read-only mode a viable approach to container hardening?
IT security is paramount for enterprises, and containers bring up interesting security concerns because they share a common OS. What methods are available for container hardening?

Identify mutable and immutable infrastructures in action
There can be a wealth of benefits to both mutable and immutable infrastructure models, which means there’s a wide range of scenarios in which one is preferable to the other. Take this quiz to find out which IT approach matches up to which model.

Immutable infrastructure takes build automation to the systems level
Build automation is nothing new in the software space, but combine it with DevOps and cloud abstraction, and you’ve got immutable infrastructure.

Serverless infrastructure calls for updated IT ops expertise
Enterprises will need IT ops pros with systems engineering expertise to bring serverless infrastructure for complex apps to maturity.

Come to grips with immutable infrastructure in production
As immutable infrastructure becomes a goal for app development, IT teams must embrace it. Get a grasp on key steps and missteps in this app operations method.

Trending Terms
golden image
configuration drift
patch management
cloud orchestrator
IT automation
app containerization
composable infrastructure

Quiz Yourself
In information technology, an ___________ specifies the overall structure, logical components, and the logical interrelationships of an information system.
a. architecture
b. infrastructure

November 28, 2018  7:14 PM

sales force automation (SFA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Sales force automation (SFA) software is programming that streamlines the collection, analysis and distribution of data in a sales pipeline. Continued…

Quote of the Day

“Sales force automation (SFA) handles the basics of sales execution programs, like managing accounts, deals, forecasts, sales activity recording and lead management.” – Bridget Botelho

Learning Center
Zendesk CRM moves beyond customer service into CX
Signaling a substantial transition from exclusively customer service, Zendesk CRM is the customer service vendor’s answer to users’ demand for a CX suite that extends to third-party tools.

AI sales technology trends for 2019 and beyond
Learn how emerging AI automation in sales technology will take the guesswork out of processes by using customer data to prescribe next best actions, qualify leads and make reliable sales forecasts.

How to pick the right mobile sales force automation app
Companies shouldn’t rush into buying mobile sales force automation apps, but rather base the purchase on how teams really work — and on business goals.

Smart contracts on blockchain the next wave of CRM automation
Smart contracts on blockchain are an emerging option for the automation of goods and services delivery as companies seek to reduce paperwork and manual processes.

This is the year CRM AI remakes sales automation
The hype behind CRM AI for improving sales automation has been very noisy. Next year will be the payoff, as AI-driven processes become part of everyday workflows.

Trending Terms
marketing automation
sales enablement
sales lead
sales pipeline
customer experience management

Quiz Yourself
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
a. minds
b. mind

November 27, 2018  5:50 PM

data stewardship

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Data stewardship is the management and oversight of an organization’s data assets to help provide business users with high-quality data that is easily accessible in a consistent manner. Continued…

Quote of the Day

“To a large degree, the success of a data governance strategy depends on the success of its associated data stewardship efforts.” – David Loshin

Learning Center
What steps are key to building a data catalog?
An enterprise data catalog can be an effective tool in data and metadata management — and both IT and the business should play a role in its creation. Get expert tips for building a data catalog.

Watson’s Law: IBM preaches data stewardship as A.I. advances
IBM chairman and CEO Ginni Rometty discussed Watson’s Law and the importance of data stewardship and security at the company’s Think conference.

How data lineage tools boost data governance policies
Data lineage tools can help enterprises bridge the gap between defining data governance policies and executing them. Learn how organizations can use these tools to track how and when changes are made to data, as well as how data lineage affects root cause analysis and impact analysis processes.

Kaiser’s data governance model leans heavily on data stewards
Kaiser Permanente’s chief data governance officer discusses how he manages the data stewards who underpin the health system’s data governance model.

Quiz: Improving your data governance and data stewardship program
Test your knowledge of what is needed for a successful data governance and data stewardship program with this brief quiz.

Trending Terms
data governance
data life cycle management
extract, transform, load
data profiling
business-IT alignment
data-driven decision management

Quiz Yourself
Data management is a broad area of study that ___________ many more specialized fields.
a. comprises
b. is comprised of

November 26, 2018  5:44 PM

two-factor authentication (2FA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user must provide two authentication factors to verify identity. Continued…

Quote of the Day

“Multifactor authentication or 2FA options are cheaper and easier to integrate than ever before and their cost certainly outweighs the potential costs of data and identity theft, financial and reputation damage, and potential lawsuits.” – Michael Cobb

Learning Center
How were attackers able to bypass 2FA in a Reddit breach?
Reddit was quite open after it experienced a breach by attackers who bypassed 2FA. Learn how attackers were able to bypass controls to cause the Reddit breach and how other sites can prevent this kind of attack with Judith Myerson.

How can U2F authentication end phishing attacks?
Google implemented U2F authentication and physical security keys to defend against phishing attacks. Learn why Google chose U2F over OTP and whether or not it’s an effective method.

Enterprises should reconsider SMS-based 2FA use after breach
Reddit recently revealed a data breach that was caused by threat actors intercepting SMS-based 2FA codes. Discover what this means for users and why enterprises should re-evaluate their use of SMS for authentication.

Reddit breach sparks debate over SMS 2FA
A Reddit breach was discovered to be due to an attacker compromising the SMS two-factor authentication used by employees, sparking a debate over using that 2FA method.

Risk & Repeat: Inside the Facebook 2FA fail
This Risk & Repeat podcast examines the Facebook 2FA controversy where the company admitted to using mobile numbers for advertising purposes and what that means for Facebook’s reputation and 2FA adoption in general.

Trending Terms
authentication factor
single-factor authentication
security token
multifactor authentication
out-of-band authentication
three-factor authentication

Quiz Yourself
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

November 20, 2018  6:53 PM

PHI breach

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A PHI breach is the unauthorized access, use or disclosure of protected health information (PHI) from an electronic health record (EHR). Continued…

Quote of the Day

“A new surge of networked medical devices and wearable gadgets present possibilities for exposure to serious security breaches in healthcare, and many hospitals are unprepared to tackle the next endpoint challenge.” – Nicole Lewis

Learning Center
How data duplication in healthcare is diagnosed
Despite the proliferation of electronic health record systems, data duplication still plagues hospitals and can cost a large hospital around $1 million to fix. Find out how EHRs and other methods can help address duplication of patient data.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

To get secure cloud storage in healthcare, gauge risks first
To have secure cloud storage in healthcare, cybersecurity experts say conducting a risk assessment is a necessary step before moving to the cloud, while building a relationship between the organization and cloud provider is vital for maintaining security.

HIPAA requirements steer data protection in healthcare
HIPAA requirements are not specific about the technology to achieve data protection, but HIPAA’s weight in disaster recovery still remains considerable.

Healthcare cybersecurity must complement HIPAA compliance
A comprehensive healthcare cybersecurity plan should include network monitoring, patient record access tracking, employee training and HIPAA compliance.

Trending Terms
electronic health record
medical identity theft
data breach response plan
full disk encryption
security awareness training
principle of least privilege

Quiz Yourself
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive

November 19, 2018  5:36 PM

cloud service provider

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud service provider (CSP) is a company that offers infrastructure as a service (IaaS), software as a service (SaaS) or platform as a service (PaaS) to other businesses or individuals. Continued…

Quote of the Day

“While the cloud itself has relatively low costs initially, moving cloud workloads and dealing with multiple cloud providers can be tricky.” – John Edwards

Learning Center
>How to handle VDI in the cloud with multiple vendors
It is common for organizations deploying VDI in the cloud to deal with multiple vendors. See why this can be a problem and what options IT might have to migrate everything to a single cloud.

Public cloud workload success requires IT leadership
Public cloud workload success rates improve when IT departments adapt to the reality that the business side of an organization can circumvent IT to procure and provision cloud resources themselves.

Two cloud backup problems that organizations need to consider
Possible cloud backup problems — such as cost and bandwidth impact — should not be underestimated. Within those areas, there are several important considerations for organizations.

Evaluate public IaaS options based on these key features
Before you go all in with a public IaaS provider, there is a lot to consider, ranging from compute options to support for emerging technology, like AI.

Cost management the next big issue in multi-cloud computing
Multi-cloud computing is here, but enterprises struggle to manage their resources and costs across cloud boundaries. There are tools that can help, but they are not a cure-all yet.

Trending Terms
Infrastructure as a Service
Software as a Service
Cloud Security Alliance
cloud storage SLA
Platform as a Service
cloud provider API

Quiz Yourself
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating

November 16, 2018  5:39 PM

social engineering

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices in order to gain access to systems, networks or physical locations, or for financial gain. Continued…

Quote of the Day

“The best defense against attackers using social engineering scams is and will always be awareness.” – Reda Chouffani

Learning Center
Social engineering scams must be on hospitals’ radars
Social engineering scams targeting the healthcare industry are becoming increasingly common. Fortunately, in addition to security software, there are some practical tips that can help combat these types of attacks.

Robot social engineering works because people personify robots
Robot social engineering could be a viable attack vector in the future, according to Brittany ‘Straithe’ Postnikoff, both because of the various social abilities that robots can use and because robot manufacturers don’t focus on security.

Social engineering techniques are becoming harder to stop, experts say
Social engineering techniques have evolved as more personal and corporate information is shared on the Web, leaving enterprise to adopt new training methods to keep data safe.

What is behind the growing trend of BEC attacks?
Business email compromise attacks do not require the use of a malicious payload or URL, making them popular among cybercriminals. Learn more about how to recognize possible BEC attacks.

Phishing threats still dwarf vulnerabilities, zero-days
Email security vendor Proofpoint released its Human Factor 2018 report, which details how phishing threats are evolving and still beating enterprise defenses.

Trending Terms
spear phishing
watering hole attack
penetration testing
security awareness training
remote access Trojan

Quiz Yourself
____ can you trust? Social engineering tactics are so sneaky and phishing attempts are so sophisticated that you’re afraid to click a link in an email from your boss or your bank.
a. Who
b. Whom

November 15, 2018  5:33 PM

customer experience management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Customer experience management (CEM or CXM) is the collection of processes a company uses to track, oversee and organize every interaction between a customer and the organization throughout the customer lifecycle. Continued…

Quote of the Day

“From a CEM standpoint, it’s not enough to understand a customer at the tail end when they already made a purchase. You need to understand the full experience.” – Cesar Coba

Learning Center
Improving customer experience strategy with digital tweaks vs. transformation
Don’t worry about endless lists of technologies to improve customer experience strategy. Read about companies that figured out how to choose the CEM technology that worked best for their customers — and reaped the benefits.

Invest in people for better customer experience in marketing
In an effort to improve customer experience in marketing, research firms IDC and Gartner found that organizations are increasingly hiring staff with designated CX responsibilities.

Guide to customer experience management best practices, technologies
Learn why customer experience management (CEM) is growing. Read about technologies, strategies and customer experience management best practices that businesses are applying to their CEM.

Open data, customer experience AI the focus for retail automation
Like it or not, customer experience AI will infuse sales and marketing for years to come. At Ignite 2018, SAP, Adobe and Microsoft band together to standardize data models in preparation.

The role and responsibilities of a customer relationship manager
What exactly does a CRM manager do? Is the role of the CRM manager different from a customer relationship manager? Get the answers here.

Trending Terms
customer life cycle
360-degree customer view
customer journey map
brand personality
customer segmentation
customer analytics

Quiz Yourself
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
a. minds
b. mind

November 14, 2018  8:51 PM

process mining software

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Process mining software is a type of program that analyzes data in enterprise application event logs in order to learn how business processes are actually working. Continued…

Quote of the Day

“Process mining is all about automatically discovering the as-is business process from the data that an organization generates — it’s like an X-ray or MRI machine for your business.” – Alexander Rinke

Learning Center
Celonis’ process mining software helps manufacturer improve efficiency
Process mining software from Celonis helped manufacturing company Chart Industries understand its accounts payable and accounts receivable processes, leading to improved process efficiency. The company began a digital transformation by identifying candidates for robotic process automation.

Process mining software provides an inside view of SAP systems
Process mining software helps Vodafone get an inside look at its SAP business processes to improve operational efficiency and prepare for an S/4HANA upgrade.

What software features are key for process manufacturing ERP?
One expert shares the keys to finding the right process manufacturing ERP software features and why industry identification is critical.

Siemens uses process mining software to improve manufacturing visibility
Siemens implemented process mining software to improve visibility into its manufacturing systems and is seeing a big payoff.

Which platform for machine learning is right for your enterprise?
Does your company need a platform for machine learning, which helps turn data into insights, informing outcomes? The big names in tech, like Google, Microsoft, Amazon and others, offer machine learning platforms. Learn more about each and which is best for your business.

Trending Terms
business process reengineering
business process management
audit log
data visualization
supply chain management
business process discovery
Sarbanes-Oxley Act

Quiz Yourself
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
A. continual
B. continuous

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: