4,332 Results for:SQL Server Security

  • Sort by: 

wearables security

Wearables security is the area of system and data protection concerned with the particular risks related to computing devices worn on the user's body such as smartwatches, headsets and fitness trackers. Read Full Definition

Security, Trust and Assurance Registry (STAR)

The Security, Trust and Assurance Registry (STAR) is an online registry of cloud provider security controls. Read Full Definition

Associated Glossaries

Microsoft Windows Server Datacenter Abstraction Layer (DAL)

The Microsoft Windows Server Datacenter Abstraction Layer (DAL) is a software framework intended to enable consistent monitoring and management of hardware found in the typical data center environment. Read Full Definition

Associated Glossaries

COMSEC (communications security)

Communications security (COMSEC) is the prevention of unauthorized access to telecommunications traffic, or to any information that is transmitted or transferred. Read Full Definition

Associated Glossaries

Oracle Mobile Security Suite (OMSS)

Oracle Mobile Security Suite (OMSS) is a mobile security system intended to allow organizations to provide secure application access from mobile devices to enterprise applications. Read Full Definition

Wireless Transport Layer Security (WTLS)

Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications. Read Full Definition

ICS security (industrial control system security)

ICS security is the area of concern involving the safeguarding of industrial control systems, the integrated hardware and software designed to monitor and control the operation of machinery and associated devices ... Read Full Definition

ISSA (Information Systems Security Association)

The Information Systems Security Association, commonly known as ISSA, is an international, nonprofit organization for information security professionals. Read Full Definition

Associated Glossaries

Blackberry Secure Work Space

BlackBerry Secure Work Space is an option for BlackBerrry Enterprise Service (BES) 10 that allows administrators to secure and manage non-BlackBerry devices through the BES management console. Read Full Definition

Associated Glossaries

authenticated security scan

An authenticated security scan is vulnerability testing performed as a logged in (authenticated) user. The method is also known as logged-in scanning. Authenticated scans determine how secure a network is from an ... Read Full Definition

Associated Glossaries