Searching all of TechTarget| 40,554 results for "program"

program: In computing, a program is a specific set of ordered operations for a computer to perform.

See all definition search results provided by Whatis.com

Conversations: Creating programs using Java

See all conversation search results provided by ITKE.

SearchSecurity

By Sharon Shea News Apr 28, 2015

Despite benefits, skepticism surrounds bug bounty programs

Some people think bug bounty programs are the answers to vulnerability woes, yet others remain skeptical of the negative impacts they present. RSA Conference panelists discussed both sides of one of today's hottest... Continue Reading

SearchSecurity

By Sharon Shea News Apr 28, 2015

Insider threat programs need people, not technology

A panel discussion at RSA Conference 2015 outlined strategic methods enterprises can use to build and advocate for an insider threat program. Continue Reading

SearchDataManagement

By Anne Marie Smith, Ph.D. Get Started Feb 19, 2015

Five steps to implementing an MDM program

Instituting a master data management program involves discovery, analysis, construction, implementation and sustainment processes, according to MDM expert Anne Marie Smith. Continue Reading

SearchITChannel

By Spencer Smith News Apr 10, 2015

Barracuda Networks restructures Barracuda partner program

This week in IT channel news, Barracuda Networks redesigned its channel program; SanDisk unwrapped an enterprise reseller program; and more. Continue Reading

SearchITChannel

By Spencer Smith News Mar 27, 2015

Partner Advantage Program takes aim at Verizon competitors

In channel news this week, Verizon introduced the Partner Advantage Program; Microsoft added a SkyKick migration benefit to its Internal Use Rights program; and more. Continue Reading

SearchCloudSecurity

By Dan Sullivan Get Started Mar 23, 2015

What policies should be in a cloud infrastructure security program?

Expert Dan Sullivan explains which policies and security controls enterprises should include in their cloud infrastructure security program to prevent cloud security compromises. Continue Reading

SearchSecurity

By Brian Prince News Mar 09, 2015

For threat intelligence programs, ROI evaluation proves tricky

Threat intelligence programs are taking root in many enterprises, but experts say variables like disparate service offerings, pricing models and response capabilities make ROI evaluation a vexing proposition. Continue Reading

SearchSecurity

News Mar 02, 2015

Is the bug bounty program concept flawed?

Looking for security vulnerabilities? Tread lightly. The benefits of vulnerability rewards programs are great, but so are the risks. Continue Reading

SearchEnterpriseDesktop

By Dan Sullivan Get Started Feb 25, 2015

Assess devices, users to get started on a mobility program

The need for a mobility program may be apparent, and BYOD is a necessary step in the progress from centralized control to focusing on apps and data. Continue Reading

SearchSecurity

Get Started Oct 01, 2014

Continuous monitoring program demystified

For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple or complex, depending on your technology, budget, and compliance ... Continue Reading