Search Security
Login Register
Explore the Network
  • TechTarget Network
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

P - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • Networking
  • CIO
  • Enterprise Desktop
  • Cloud Computing
  • Computer Weekly
Search Networking
  • How to reduce networking costs without performance loss

    Enterprises face rising network costs due to improper rightsizing, technical debt and manual management. Smart strategies can ...

  • How network modernization creates measurable ROI

    Modern networks improve performance, resiliency, security and flexibility. These gains translate into measurable direct and ...

  • 5 principles of change management in networking

    Network change management includes five principles, including risk analysis and peer review. These best practices can help ...

Search CIO
  • A lawyer's advice for CIOs creating AI-use policies

    AI is transforming the way companies work in unprecedented ways, and CIOs must implement policies to protect their intellectual ...

  • The CLARITY Act explained: Enterprise and IT impacts

    The CLARITY Act establishes federal regulatory framework for cryptocurrency and blockchain, defining SEC and CFTC roles while ...

  • Trump Tariff Refunds: A CIO Playbook for Capturing Cash

    The Supreme Court voided Trump-era tariffs, enabling corporate refund claims, but unclear processes, eligibility rules, ...

Search Enterprise Desktop
  • The End of 10: How Linux could help Windows 10 PCs live on

    With Windows 10 support ending, organizations are evaluating Linux as a viable option to manage costs, extend hardware life and ...

  • Enterprise platforms help establish operational discipline

    Enterprise software platforms are evolving beyond productivity tools into systems that expose operational signals around cost, ...

  • Routine IT updates now shape enterprise governance

    Routine IT updates now shape enterprise governance, as patching, endpoint compliance and identity policies determine how ...

Search Cloud Computing
  • Top 8 benefits of hybrid cloud for business

    Why choose between public cloud and private systems when you can have both? With hybrid cloud, enterprises can address workload ...

  • 5 real-world FinOps use cases to maximize ROI

    FinOps transforms cloud cost management by aligning spending with usage, cutting waste and boosting efficiency. Learn how ...

  • Multi-cloud vs. hybrid cloud: The main difference

    As businesses digitally transform across increasingly distributed environments, know the benefits, challenges, similarities and ...

ComputerWeekly.com
  • AI makes debut in Bridewell cyber security in CNI report

    Regulation has superseded cyber threats as the main driver of cyber security spending, and AI has made its debut for attack and ...

  • NHS digital ambition needs reality check amid frontline work pressures

    The NHS 10-year plan is ambitious and brave. However, Cheshire and Merseyside GP Tom Micklewright says limited funding ...

  • Gartner: Ditch ‘big transformation’ cyber strategies for continuous improvement

    As artificial intelligence reshapes the enterprise, CISOs must abandon risky big bang security transformation initiatives in ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close