A technology that abstracts physical computing resources.
A virtualization technology that hosts desktop operating systems on centralized servers.
Microsoft's relational database system.
A cloud computing model in which applications are centrally hosted and accessed over the Internet.
Malicious software that encrypts or threatens to expose data.
A cyberattack that deceives users into revealing sensitive information.
An individual or organization that formally collaborates with another company.
A family of proprietary operating systems from Microsoft.
An IT strategy that uses services from two or more cloud providers.
A security process requiring two or more independent verification factors.
A third-party company that remotely manages a client's IT infrastructure.
Software intentionally designed to damage system.
An interconnected system of computers.
A security principle requiring that users operate with only the minimum access permissions.
The evidence-based collection and analysis of information about cyber threats.