Browse Definitions :
188 results for:

Hypervisor

client hypervisor

Definition | SearchVirtualDesktop

A client hypervisor is a hypervisor that resides on a laptop, PC or other client device.

Type 2 hypervisor (hosted hypervisor)

Definition | SearchServerVirtualization

A Type 2 hypervisor, also known as a hosted hypervisor, is a virtual machine manager that installs on top of a host's operating system (OS). 

thin hypervisor

Definition | SearchServerVirtualization

A thin hypervisor is a stripped down hypervisor that allows multiple operating systems to run on one host.

embedded hypervisor

Definition | SearchVMware

An embedded hypervisor is a hypervisor that is programmed (embedded) directly into a processor, personal computer (PC) or server. This architecture ...

hypervisor

Definition | SearchServerVirtualization

A hypervisor is a function which abstracts -- isolates -- operating systems and applications from the underlying computer hardware.

hypervisor security

Definition | SearchCloudSecurity

Hypervisor security is the process of ensuring the hypervisor, the software that enables virtualization, is secure throughout its life cycle, ...

KVM hypervisor

Definition | WhatIs.com

KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM).  A hypervisor is a program that allows multiple operating systems ...

storage hypervisor

Definition | SearchStorage

Storage hypervisors make more efficient use of storage resources in a virtual environment.

network hypervisor

Definition | SearchNetworking

A network hypervisor is a program that provides an abstraction layer for network hardware.  Network hypervisors allow network engineers to create ...

hypervisor attack

Definition | WhatIs.com

A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual ...

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • spear phishing

    Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • bridge

    A bridge is a class of network device that’s designed to connect networks at OSI Level 2, which is the data link layer of a ...

  • browser isolation

    Browser isolation is a cybersecurity model for web browsing that can be used to physically separate an internet user’s browsing ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close