Browse Definitions :

For Advertisers

Vendor Opportunities

TechTarget offers the most targeted media and events for enterprise IT professionals, providing IT vendors with the most effective and efficient marketing vehicles. Our ROI media reaches enterprise IT decision makers, and gives advertisers the payoff and performance they need to justify spending and support sales efforts.

Interested in learning more about WhatIs.com and TechTarget marketing opportunities? Contact gderussy@techtarget.com.

Marketing Opportunities

Learn more about TechTarget marketing opportunities on the TechTarget Corporate Web Site.

Webcasts: Sponsors receive leads from thousands of members who tune in each month to learn from industry experts and peers, ask questions and keep up to date on the latest technologies.

E-Newsletters: Deliver your marketing message within highly relevant and topical editorial content.

White Papers: Post your white paper and receive contact information for every IT pro who downloads your paper.

List Rentals: Choose from more than 97 high-tech interests, 25 job titles, IT budgets and company size to reach your target audience. (E-mail and postal lists available.)

Banners and Links: Increase brand awareness through online advertising on our network of industry-specific IT Web sites.

Invitation-Only Conferences: TechTarget Conferences bring unprecedented networking and face-to-face marketing opportunities to the table. Our delegates attend free of charge and are selected based on budget, purchase authority, size of implementation, title and other qualifying criteria. Learn more about TechTarget Conferences on the TechTarget Conferences Web Site.

-ADS BY GOOGLE

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • reverse brute-force attack

    A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple ...

  • orphan account

    An orphan account, also referred to as an orphaned account, is a user account that can provide access to corporate systems, ...

  • voice squatting (skill squatting)

    Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

SearchStorage

  • primary storage (main storage)

    Primary storage is the collective methods and technologies used to capture and retain digital information that is in active use ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close