Browse Definitions :

SearchMidmarketSecurity

Get in-depth technical advice and learning materials related to the strategies, technologies and business processes associated with the mid-market security space. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professionals.

View the complete archive of Midmarket Security Management news, research and expert advice.

Go to:  SearchMidmarketSecurity

Recently on  SearchMidmarketSecurity

(ISC)² Security Congress 2018

(ISC)²'s Security Congress will bring cybersecurity professionals together from around the world for three days of education and thought-leadership sessions, best-practice sharing and networking.

More Highlights
Definitions
  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • zombie computer (zombie bot)

    A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. (Continued)

Browse Midmarket Security Topics

Assessing and Managing Risk

Midmarket IT organizations need a streamlined approach to risk management and risk assessments. Here, you'll learn the strategic side to security, including the basics on risk assessments, metrics and reporting; choosing managed security services; audit and regulatory compliance planning; writing and enforcing IT security policies; and end user training and awareness training.

Recent Definitions

  • risk analysis

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or critical projects in order to help organizations avoid or mitigate those risks.

  • clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • managed security services (MSS)

    Managed security services (MSS) is a systematic approach to managing an organization's security needs.

Highlights

More Assessing and Managing Risk Topics

Back to Top

Windows Security

Most midmarket IT organizations are heavily invested in Windows. Rather than bolt on security, those IT teams must extend the capabilities offered in Windows Server, Windows Vista and Windows XP to simplify management and keep costs in check. Here you'll learn more about identity and access management, configuration and patch management, endpoint security management, threat management and security integration and centralized security management within Windows.

Recent Definitions

  • stack overflow

    A stack overflow is an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In programming, the call stack is a buffer that stores requests that need to be handled.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • Back Orifice

    Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems. The program's name is inspired by the name of Microsoft's BackOffice product. Created by a group of hackers called the Cult of the Dead Cow, Back Orifice allows someone at one computer to control everything on another, remote computer running Windows. (Continued)

Highlights

More Windows Security Topics

Back to Top

Network Security

The security of a midmarket organization's IT network is important to the protection of network infrastructure and resources available over a network. Here you'll learn about intrusion prevention and detection, firewall management, wireless security, the integration of security into the network, as well as network access controls.

Recent Definitions

  • IPsec (Internet Protocol Security)

    IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.

  • intrusion detection system (IDS)

    An intrusion detection system (IDS) is a system that monitors network traffic for suspicious activity and issues alerts when such activity is discovered.

  • Snort

    Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.

Highlights

More Network Security Topics

Back to Top

Threats and Vulnerabilities

Threat and vulnerability management is crucial to the protection of data stored in servers, desktops, laptops and workstations. Here, midmarket IT organizations will find expert help and training on the use and management of integrated security appliances and systems such as unified threat management appliances, antimalware management, configuration and patch management, email and mobile device protection and security vulnerability management.

Recent Definitions

  • risk analysis

    Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or critical projects in order to help organizations avoid or mitigate those risks.

  • IPsec (Internet Protocol Security)

    IPsec, also known as the Internet Protocol Security or IP Security protocol, defines the architecture for security services for IP network traffic.

  • email virus

    An email virus consists of malicious code that is distributed in email messages, and it can be activated when a user clicks on a link in an email message, opens an email attachment or interacts in some other way with the infected email message.

Highlights

More Threats and Vulnerabilities Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close