Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

H - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • 6 networking resolutions for 2026

    As 2026 begins, leaders must rethink enterprise networking to meet AI and ROI demands. Focus areas include AI-ready ...

  • 5G and AR/VR: Industry use cases and impacts, explained

    Many industries will reap major benefits from integrating augmented and virtual reality technology with 5G. But beware of ...

  • Licensed vs. unlicensed spectrum: Key differences

    Licensed spectrum is reliable and has better performance than unlicensed, which is low cost, easy to deploy and subject to ...

Search CIO
  • Embedded finance: How CIOs must prepare

    Embedded finance is reshaping enterprises, requiring CIOs to own fintech architecture, security and compliance while delivering ...

  • CIO time: How IT leaders manage their calendars

    As CIOs juggle long hours and global demands, they rely on deliberate scheduling and trusted assistants to stay focused on key ...

  • The hidden risks of buy now, pay later

    Buy now, pay later offers consumers speed and flexibility, but its operational and regulatory demands are exposing weaknesses ...

Search Enterprise Desktop
  • How AI and the browser will change end-user IT in 2026

    Looking ahead to 2026, the end-user IT landscape will shift in subtle but critical ways. Here's what to expect, from prompt ...

  • How to use Windows Check Disk to maintain disk health

    Using built-in Windows tools such as Check Disk and SMART helps organizations reduce risks associated with disk errors, extend ...

  • How IT admins can check BIOS or UEFI versions in Windows 11

    Firmware, such as BIOS or UEFI, plays a crucial role in how securely a Windows device starts and operates. Organizations need to ...

Search Cloud Computing
  • A month-by-month roadmap for the three phases of FinOps

    How do you go about establishing a measurable and achievable plan to bring FinOps into your organization? Use this sample roadmap...

  • Nutanix sovereign cloud hits Broadcom with multi-cloud hook

    Nutanix expands its differentiation from Broadcom with a distributed sovereign cloud approach that supports both self-managed and...

  • Plan for repatriation on day one with a hybrid cloud strategy

    In the next 2 years, 87% of orgs plan to repatriate workloads off public cloud. Discover how an exit strategy, paired with hybrid...

ComputerWeekly.com
  • CCRC says multiple Post Office software systems potentially implicated in miscarriages of justice

    Statutory body said its work has widened to multiple IT systems, and could even look at potential Post Office miscarriages of ...

  • SQL Slammer lesson: A Computer Weekly Downtime Upload podcast

    We speak to the head of the Microsoft Security Response Center about how the company works with the industry to get systems ...

  • Home Office digital-only eVisa system could be ruled unlawful

    The Home Office is facing a judicial review over refusing to allow alternative proof of immigration status outside of the ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close