KNOWLEDGE HUB
ITÂ GLOSSARY
Our IT glossary contains all the related terminology specific to IT and Microsoft Applications
- Home/
- Knowledge Hub/
- IT/
A
-
Acronis
Acronis Backup is designed to safeguard critical data, applications, and systems from data loss, cyber threats, and other disasters.
-
Active Directory
Active Directory (AD) is a directory service that functions as a centralised and standardised system for managing and organising information.
-
Azure
Microsoft Azure is a comprehensive cloud computing platform empowering businesses to build, deploy, and manage applications and services.
-
Azure Virtual Desktop (AVD)
Azure Virtual Desktop is a cloud-based desktop and application virtualisation service. It enables users to access a virtualised Windows experience from virtually any device.
-
Azure Virtual WAN
Azure Virtual WAN is a networking service provided by Microsoft Azure, offering a streamlined and automated solution for connecting branch offices, data centres, and the Azure cloud.
B
-
Backup
Secure backup systematically and securely copies and stores data to facilitate recovery in case of accidental deletion, data corruption, hardware failure, or other unforeseen events.
-
Business Continuity Plan (BCP)
Business Continuity Planning (BCP) refers to an organisation's capability to maintain critical functions, operations, and services during and after disruptions or emergencies.
C
-
Cisco Meraki Networking
Cisco Meraki is a cloud networking platform that includes wireless access points, cloud-managed switches, SD-WAN solutions, endpoint management, and location analytics.
-
Cloud Backup
Cloud backup refers to the practice of securely storing copies of important data and files in an offsite server or data centre hosted by a third-party service provider.
-
Cloud Computing
Cloud computing provides computing services over the internet, eliminating the need for physical hardware ownership. The benefits of cloud computing are substantial.
-
Cloud Migration
Cloud migration is the process of transferring digital assets, including data, applications, and IT processes, from on-premises infrastructure to a cloud computing environment.
-
Cyber Essentials
Cyber Essentials is a robust, government-endorsed initiative designed to safeguard businesses of all sizes from a diverse range of common cyber threats.
-
Cyber Essentials Plus
Cyber Essentials Plus involves a two-step process: initiating the online assessment and undergoing a subsequent technical systems audit by an accredited assessor.
-
Cyber Security
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
-
Cyber Security Audit
A cyber security audit systematically reviews an organisation's information systems, processes and policies to assess cybersecurity measures.
D
-
Dark Web Monitoring
Dark Web Monitoring proactively searches information circulating on the dark web. This involves identifying compromised or leaked data and other highly sensitive information.
-
Defender
Microsoft Defender is a comprehensive antivirus and anti-malware software designed to provide real-time protection against various threats.
-
Disaster Recovery
Disaster recovery encompasses a comprehensive set of strategies and processes geared towards the swift and efficient restoration of IT systems, data, and operations following a disruptive event.
-
Dynamics 365
Microsoft Dynamics 365 is a suite of intelligent business applications, integrating Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).
E
-
Edge Security
Edge security is focused on protecting the entry and exit points of a network, where data traffic enters or leaves an organisation.
-
Email Security
Email security involves implementing measures to safeguard email communication systems from cyber threats and unauthorised access.
-
Endpoint Protection
Endpoint protection involves safeguarding devices equipped with a security client from potential malicious threats and cyberattacks.
-
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM) is the set of technologies, processes, and policies designed to manage and secure mobile devices, networks, and applications within a business.
-
Ethernet
Ethernet is a technology used for connecting computers, servers, routers, switches, and other network devices within a local area network (LAN) in a larger network infrastructure.
-
Exclaimer
Exclaimer manages Exchange signatures across various devices. It seamlessly incorporates signatures into all emails processed through Exchange, regardless of the email client or the device used.
F
-
Firewalls
A firewall is a network security system designed to monitor, control, and manage incoming and outgoing network traffic based on predetermined security rules.
-
Firmware
Firmware is a software that is embedded in electronic devices to control and manage the device's specific hardware.
H
-
Hybrid Backup
Hybrid backup refers to a data backup strategy that combines elements of both local (on-premises) and cloud-based backup solutions.
I
-
Infrastructure as a Service
Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualised computing resources over the internet.
-
IT Consultancy
IT consultancy refers to the professional service provided by experts in the field of information technology to assist organisations in leveraging technology to achieve their business objectives.
-
IT Glue
IT Glue is a cloud-based IT documentation platform designed to help managed service providers (MSPs) and IT professionals organise, centralise and streamline their IT documentation.
-
IT Governance
IT governance refers to the framework of policies, processes, and decision-making structures that guide and ensure the effective and efficient use of information technology (IT) within an organisation.
-
IT Infrastructure
IT infrastructure is the collection of hardware, software, networks, facilities, and other components that support the overall operation and functionality of an organisation's IT environment.
-
IT Infrastructure Management
IT Infrastructure management is the process of keeping an businesses IT infrastructure, hardware, data, operating systems, networks and communications and applications running smoothly.
-
IT Outsourcing
IT outsourcing refers to the practice of contracting out certain information technology functions or services to external service providers.
-
IT Service Desk
An IT service desk, also known as a help desk, serves as a centralised point of contact within an organisation, providing support and assistance to end-users facing IT-related issues or service requests.
-
IT Strategy
An IT strategy is a comprehensive plan outlining how an organisation will use information technology to achieve its business objectives.
M
-
Malware
Malware, short for malicious software, refers to any software specifically designed to harm, exploit, or compromise computer systems, networks, or user devices.
-
Managed Cloud
Managed Cloud is a cloud computing service where a third-party provider takes responsibility for the management, security, and optimisation of cloud infrastructure on behalf of the client.
-
Managed IT
Managed IT is when a business chooses to outsourcing their IT infrastructure, support, services, and systems to a third-party provider, known as a Managed Service Provider (MSP).
-
Managed Service Provider (MSP)
A Managed Service Provider (MSP) is a third-party company that delivers a range of IT services and support to businesses, typically on a subscription or outsourcing model.
-
Managed Service Security Provider (MSSP)
A Managed Security Service Provider (MSSP) is a specialised third-party company that offers comprehensive cybersecurity services to organisations.
-
Microsoft 365
Microsoft 365 is a comprehensive suite of cloud-based productivity tools and services provided by Microsoft.
-
Microsoft Exchange
Microsoft Exchange is a messaging and collaborative platform developed by Microsoft. Applications for email, calendaring, task management, contact management, and more.
-
Microsoft Solutions Partner
Microsoft Solution Partners possess extensive technical capabilities, a commitment to skill development and training, and a proven track record of in specific Microsoft Cloud solution areas.
-
Mimecast
Mimecast provides cloud cyber security services that safeguard essential communications, individuals and data ensuring the security of vital information.
N
-
Network as a Service (NaaS)
NaaS stands for Network as a Service, a cloud computing model that delivers networking services over the internet.
O
-
Outsourced IT
Outsourced IT is when a business chooses to outsource all or part of their IT function to a Managed Service Provider.
P
-
Phishing
Phishing is a type of cyber attack in which attackers use deceptive techniques to trick individuals into providing sensitive information.
R
-
Ransomware
Ransomware is a type of malware designed to encrypt a user's files or lock them out of their computer system, rendering the data inaccessible without a paid ransom.
-
Remote Backup
Remote backup, also known as online or cloud backup, involves securely storing data on an offsite server or cloud platform using the internet.
S
-
SD-WAN
SD-WAN, short for Software-Defined Wide Area Network, is a virtual architecture designed to empower enterprises with the flexibility to utilise various transport services.
-
Server
A server is a computer or system that is dedicated to managing and facilitating network resources and services.
-
Sharepoint
SharePoint is a cloud collaboration platform integrated with Microsoft 365. It is used for storing, organising, sharing, and accessing information from any device with a web browser.
-
Software as a Service (SaaS)
Software as a Service (SaaS) is a cloud computing model that delivers software applications over the internet on a subscription basis.
-
SoGEA
SoGEA broadband is a type of internet connection that provides high-speed access to the internet and does not include a traditional landline phone service.
T
-
Teams
Microsoft Teams is a collaboration platform developed by Microsoft as part of its Microsoft 365 suite of productivity tools.
-
Threat Protection
Threat protection is a set of security measures and technologies designed to detect, prevent, and respond to various cyber security threats that can compromise the integrity of information systems and data.
-
Two Factor Authentication (2FA)
Two-Factor Authentication (2FA) is a security process that requires users to provide two different authentication factors to verify their identity.
V
-
Virtual Server
A virtual server, also known as a virtual machine, is a software-based emulation of a physical computer.
Z
-
Zero Trust Security
Zero Trust security represents a comprehensive IT security model that mandates rigorous identity verification for every individual and device seeking access within a private network.