Technology, Science and Universe
Results for {phrase} ({results_count} of {results_count_total})
Displaying {results_count} results of {results_count_total}
e
- Exploit Protection Description: Exploit Protection is a security feature integrated into various security solutions that focuses on mitigating vulnerabilities in(...) Read more
- Endpoint Detection and Response Description: Endpoint Detection and Response (EDR) refers to a set of security solutions that monitor end-user devices, such as computers,(...) Read more
- Endpoint Management Description: Endpoint management is the process of managing and securing endpoint devices, which are devices that connect to a network, such as(...) Read more
- Evasion Techniques Description: Evasion techniques are methods used by malware to avoid detection by security software, such as antivirus and anti-malware(...) Read more
- Endpoint Isolation Description: Endpoint Isolation is a security measure that restricts network access for infected devices, preventing threats from spreading and(...) Read more
- End-user Training Description: End-user training in the context of a Security Operations Center (SOC) refers to a set of programs and activities designed to(...) Read more
- External Threats Description: External threats are those that originate outside the organization or network, and they represent a significant risk to information(...) Read more
- Escalation Procedures Description: Escalation procedures in the context of IT compliance are defined steps that are followed to elevate issues or incidents to upper(...) Read more
- Endpoint Analysis Description: Endpoint analysis refers to the thorough examination of devices connected to a network, such as computers, servers, and mobile(...) Read more
- Endpoint Protection Platform Description: The Endpoint Protection Platform is a comprehensive security solution designed to manage and protect the security of endpoint(...) Read more
- Event Analysis Description: Event analysis is the process of examining security events to identify patterns or anomalies. This process is fundamental in the(...) Read more
- ESXi Description: ESXi is a hypervisor developed by VMware that enables the creation and management of virtual machines in a virtualization(...) Read more
- Edge Services Description: Edge Services, within the Platform as a Service (PaaS) category, refer to solutions implemented at the edge of the network, that(...) Read more
- Elastic Cloud Storage Description: Elastic cloud storage is an innovative solution that allows organizations to manage their storage needs dynamically and(...) Read more
- Enterprise Architecture Description: Enterprise architecture is a strategic framework used to manage and align IT assets, people, operations, and projects within an(...) Read more