Home > Blossary: Information Technology
The entire spectrum of technologies for information processing, including software, hardware, communications technologies and related services. In general, information technology (IT) does not include embedded technologies that do not generate data for enterprise use.

Category: Technology

Company: Gartner

1778 Terms

Created by: consultant

Number of Blossarys: 2

My Terms
Collected Terms
Norwegian Bokmål (NO)
Compare Language

Previously owned or used mobile devices that are sold or given free to other users who typically obtain a new network connection. Secondhand devices sometimes are refurbished systematically before ...

Domain: Technology; Category: Information technology

The symmetric key used in secret-key cryptography. It is a secret shared between communicating parties, but is not truly private. See secret-key cryptography, private key and public-key cryptography.

Domain: Technology; Category: Information technology

In this cryptography method (also known as symmetric-key cryptography), the single key needed to encrypt and decrypt messages is a shared secret between the communicating parties. The biggest problem ...

Domain: Technology; Category: Information technology

Also known as HTTPS, this is an extension of Hypertext Transport Protocol (HTTP) that provides security services for transaction confidentiality, authenticity and integrity between HTTP servers and ...

Domain: Technology; Category: Information technology

An Internet security standard from Netscape Communications, used for its browser and server software.

Domain: Technology; Category: Information technology

Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. A secure Web gateway is a solution that filters unwanted software/malware from user-initiated ...

Domain: Technology; Category: Information technology

Security information and event management (SIEM) technology supports threat detection and security incident response through the real-time collection and historical analysis of security events from a ...

Domain: Technology; Category: Information technology

Member comments


( You can type up to 200 characters )

Poster  
My other Blossarys

A computing practice whereby scalable and elastic ...

Category: Technology

By: consultant