Browse Definitions:
11,672 results for:

WAN accelerator

Definition | SearchEnterpriseWAN

A WAN accelerator is an appliance that improves the end user's experience on a wide area network (WAN).

Electronic Communications Privacy Act (ECPA)

Definition | SearchCompliance

The Electronic Communications Privacy Act (ECPA) is a United States federal statute that prohibits a third party from intercepting or disclosing ...

Credit CARD Act (Credit Card Accountability, Responsibility, and Disclosure Act of 2009)

Definition | SearchCompliance

The Credit CARD Act is legislation governing the behavior of credit card companies in the United States. The self-stated purpose of the Act is "To ...

bottleneck

Definition | SearchEnterpriseWAN

A bottleneck is a stage in a process that causes the entire process to slow down or stop. In a communications context, a bottleneck is a point in ...

extranet

Definition | SearchEnterpriseWAN

An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's ...

WAN interface card (WIC)

Definition | SearchEnterpriseWAN

A WAN interface card, or WIC, is a specialized network interface card (NIC) that allows devices to connect to a wide area network.

WGate (Web gateway)

Definition | SearchSAP

WGate (for Web gateway) is one of two major components of the Internet Transaction Server (ITS) from SAP, the software company that provides a ...

WAN optimization (WAN acceleration)

Definition | SearchEnterpriseWAN

WAN optimization, also known as WAN acceleration, is the category of technologies and techniques used to maximize the efficiency of data flow across ...

Layer Two Tunneling Protocol (L2TP)

Definition | SearchEnterpriseWAN

Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Point Tunneling Protocol (PPTP) used by an Internet service provider (ISP) to ...

ISDN (Integrated Services Digital Network)

Definition | SearchEnterpriseWAN

ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as ...

-ADS BY GOOGLE

SearchCompliance

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for...

  • identity management (ID management)

    Identity management (ID management) is the organizational process for identifying, authenticating and authorizing individuals or ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close