Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

C - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • How 5G and SD-WAN work together to empower enterprises

    5G's performance advantages and improved integration with SD-WAN make the combination an increasingly powerful and affordable ...

  • Why SNMP remains relevant in enterprise network management

    The Simple Network Management Protocol is almost 40 years old. Despite its age, it remains essential today, ensuring efficient ...

  • The role of DHCP reviews for business continuity

    DHCP is vital for IP address allocation across networks, ensuring business continuity. Regular assessments mitigate risks, ...

Search CIO
  • Real world GenAI use cases: How CIOs are putting AI to work

    As CIOs look to implement GenAI, the number of potential use cases and vendor options can overwhelm them. Discover the tools that...

  • Strategic IT outlook: Tech conferences and events calendar

    Tech conferences are a vital way for CIOs and IT leaders to keep abreast of trends and make real-life connections in a ...

  • How to manage dependency risk in third-party ad tech

    Ad tech risk management is now vital for IT, not just marketing. Organizations must address third-party code risks to protect ...

Search Enterprise Desktop
  • 4 end-user computing trends to watch in 2026

    AI, identity-first security, Windows 10 end of support and VMware's rebranding as Omnissa are reshaping EUC as CIOs make ...

  • How enterprise access decisions are starting to show up earlier

    As work consolidates in browsers and quick-entry paths, access decisions are shifting to the front door of enterprise systems, ...

  • Why 2026 might bring more Linux desktops to the enterprise

    Linux desktops are increasingly viable for enterprise use cases in 2026, offering privacy, sustainability and SaaS-ready ...

Search Cloud Computing
  • Upstart cloud provider Railway turns heads with speed

    Railway began as a PaaS provider but now looks to disrupt hyperscalers with a bespoke back-end hardware design and built-in ...

  • AI will heavily influence cloud-related decisions in 2026

    AI is set to become a defining force in shaping cloud-related decisions and strategies for 2026. See what the experts are saying ...

  • 5 cloud trends to watch for in 2026

    Discover the top cloud trends for 2026 as organizations rethink strategies to tackle rising costs and security challenges, as ...

ComputerWeekly.com
  • Ransomware, reputation, risk: Black Hat Europe in review, 2026 in view

    Black Hat Europe made clear that cyber security can no longer be separated from politics, economics and behaviour, as ransomware,...

  • Inside the trend of tech ‘spinouts’ solving real-world problems

    Technology companies continue to churn out services for retail and hospitality businesses, but there are still many problems that...

  • UK government ‘blindly accepted’ Iver datacentre environmental assurances, it is claimed

    The UK government confirms that its decision to grant planning permission for a hyperscale datacentre, which is at the centre of ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close