Search Security
Login Register
Informa TechTarget Explore the Network
  • Dark Reading
  • Cybersecurity Dive
  • CIO
  • Enterprise AI
  • ComputerWeekly
An Informa TechTarget Publication Explore our brands
  • Search Security
    • Analytics & Automation
    • Application & Platform Security
    • Cloud Security
    • Compliance
    • Data Security & Privacy
    • More Topics
      • IAM
      • Network Security
      • Operations & Management
      • Risk Management
      • Security Careers & Certifications
      • Threat Detection & Response
      • Threats & Vulnerabilities
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

P - Definitions

  • Share this item with your network:
Search Definitions
Most Recent Definitions
  • What is identity and access management? Guide to IAM
  • What is data masking?
  • What is antivirus software?
  • What is a stealth virus and how does it work?
  • What is file integrity monitoring (FIM)?
Latest TechTarget resources
  • CIO
  • Enterprise AI
  • Computer Weekly
Search CIO
  • The top CIO challenges: AI hype, security and rapid change

    TechTarget asked CIOs the biggest challenge they expect next year. Their answers point to AI adoption, rapid change and pressure ...

  • The AI factory model: What CIOs need to know

    The AI experimentation phase is over. Enterprises are now racing to build AI factories that generate revenue, not just consume ...

  • The hidden costs of AI: What leaders must budget

    AI implementation costs extend beyond model fees. Hidden expenses such as data preparation, governance, security and talent ...

Search Enterprise AI
  • AI drones undertake high-risk jobs along the supply chain

    From power line and bridge inspections to remote and heavy cargo deliveries, autonomous AI drones are becoming the supply chain's...

  • Can quantum-inspired algorithms help you now?

    Quantum-inspired algorithms mimic quantum computing principles on classical hardware. Experts share how businesses can benefit ...

  • AI existential risk: Is AI a threat to humanity?

    What should enterprises make of the recent warnings about AI's threat to humanity? AI experts and ethicists offer opinions and ...

ComputerWeekly.com
  • Vodafone to offer 5G fixed wireless access in the UK

    UK provider introduces 5G-based wireless broadband to deliver full-fibre-like speeds to a further 3.7 million homes across the ...

  • What an LA County Court case means for the future of social media

    A recent county court judgment ruled in favour of a plaintiff who sued certain social media companies for damaging her mental ...

  • Interview: Hitachi Vantara takes long view on business and sustainability

    We talk to Hitachi Vantara’s Simon Ninan about how the company looks to the far horizon when trying to match business needs with ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Videos
  • Photo Stories
  • Definitions
  • Guides
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Events
  • E-Products

©2026 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close