Service Index
Definitions and clarifications to
help you decode IT jargon.
help you decode IT jargon.
Cyber Security
Intrusion Detection System
(IDS)
An IDS is a security tool that monitors and analyzes network traffic to detect and alert on suspicious or malicious activity. It helps identify potential threats and enables organizations to respond in a timely manner.
Antivirus Software
(AV)
Antivirus software detects, prevents, and removes malware from computer systems. It scans files and programs for known threats, helping to keep systems protected from viruses, worms, and other malicious software.
Vulnerability Scanning
Vulnerability scanning tools assess IT infrastructure for security weaknesses and vulnerabilities. These tools help identify potential vulnerabilities before they can be exploited by attackers, enabling organizations to take proactive measures to secure their systems.
Security Information & Event Management
(SIEM)
SIEM systems collect and analyze log data from various sources to identify security incidents and suspicious activities. They provide real-time monitoring and correlation of events, improving incident detection and response capabilities.
Communications
Voice over IP
(VoIP)
VoIP is a technology that allows voice communication over the internet. It enables organizations to make calls, send messages, and conduct video conferences using IP networks, leading to cost savings and increased flexibility.
Unified Communications
(UC)
UC integrates various communication services such as voice, video, messaging, and conferencing into a single platform. It improves collaboration and productivity by enabling seamless communication across different channels and devices.
Email Service Provider
(ESP)
An ESP offers email services, including email hosting, email security, and management tools. It ensures reliable and secure email communication, protecting against spam, phishing, and other email-based threats.
Web Conferencing
Web conferencing tools allow real-time audio and video communication between multiple participants over the internet. They facilitate remote collaboration and enable virtual meetings, presentations, and training sessions.
Instant Messaging
(IM)
Instant messaging services enable real-time text-based communication between individuals or groups. They offer features like file sharing, presence information, and encryption to enhance productivity and secure communication.
Backup
Cloud Backup
Cloud backup services provide secure storage and backup of data in remote servers. They offer automated backup, easy data recovery, and offsite storage, ensuring data protection and business continuity.
Backup & Recovery
Backup and recovery, or business continuity software allows organizations to schedule, manage, and restore backups of critical data. It offers features like incremental backups, data deduplication, and encryption, ensuring data availability and resilience.
Disaster Recovery as a Service
(DRaaS)
DRaaS provides an infrastructure and services for organizations to recover their IT systems and data after a disruptive event. It offers rapid recovery, failover support, and automated failback capabilities.
Continuous Data Protection
(CDP)
CDP technology enables real-time or near-real-time data replication and backup. It provides constant protection against data loss and allows organizations to recover from any point in time.
Email Security
Secure Email Gateway
Secure email gateways analyze incoming and outgoing emails to detect and block spam, malware, phishing attempts, and other email-based threats. They help ensure secure communication and prevent email-borne attacks.
Email Encryption
Email encryption solutions secure the content of emails during transmission and storage. They use encryption algorithms to protect sensitive information from unauthorized access.
Data Loss Prevention
(DLP)
DLP solutions monitor email communications to identify and prevent the unauthorized transmission of sensitive or confidential data. They help organizations comply with data protection regulations and prevent data breaches.
Email Archiving
Email archiving platforms capture, preserve, and store email messages and attachments for long-term retention. They facilitate email management, legal compliance, and e-discovery processes.
Email Authentication
Email authentication technologies, such as SPF, DKIM, and DMARC, help verify the authenticity and integrity of emails. They reduce the risk of email spoofing and phishing attacks.
Compliance
Governance, Risk, and Compliance
(GRC)
GRC software provides a framework for managing corporate governance, risk management, and compliance initiatives. It helps organizations streamline processes, ensure regulatory compliance, and mitigate risks.
Security Information & Event Management
(SIEM)
SIEM systems, mentioned earlier under Cyber Security, also play a role in compliance by providing visibility into security events and helping organizations meet regulatory requirements.
Audit Management Software
Audit management software streamlines the audit process, from planning and scheduling to execution and reporting. It helps organizations maintain compliance with regulations, standards, and internal policies.
Policy and Procedure Management
Policy and procedure management tools enable organizations to create, distribute, and manage policies and procedures in a centralized manner. They help ensure compliance and provide a reference for employees.
Data Privacy Management
Data privacy management solutions help organizations manage and comply with data protection regulations, such as HIPAA, PCI, GDPR and CCPA. They assist with data classification, consent management, and privacy impact assessments.
Print & Imaging
Managed Print Services
(MPS)
MPS involves outsourcing the management of print devices, printing infrastructure, and document workflows. It optimizes print operations, reduces costs, and enhances security and environmental sustainability.
Document Management System
(DMS)
A DMS helps organizations store, manage, and track electronic documents. It facilitates collaboration, version control, and secure document sharing while reducing reliance on physical documents.
Secure Print Solutions
Secure print solutions protect print devices and networks from unauthorized access, data breaches, and malware attacks. They enforce secure printing practices, manage user authentication, and provide auditing capabilities.
Mobile Printing
Mobile printing solutions enable users to print documents from mobile devices, such as smartphones and tablets. They provide flexibility and convenience without sacrificing security and control.
Networking
Router
Routers manage the flow of data between different networks. They direct network traffic, establish connections, and provide security features to protect against unauthorized access.
Switch
Switches connect multiple devices within a network using cabled connections. They forward network traffic based on MAC addresses, facilitating efficient and secure communications between devices.
Wireless Access Point
(WAP) (AP)
WAPs provide wireless connectivity to devices within a network. They enable Wi-Fi access and help extend network coverage for mobile devices and IoT devices.
Network Firewall
Network firewalls filter and monitor incoming and outgoing network traffic based on predefined security rules. They protect networks from unauthorized access, malware, and other security threats.
Virtual Private Network
(VPN)
VPNs establish secure encrypted connections over public networks, such as the internet. They enable remote users to securely access the organization's network and resources.
Identity & Access
Enterprise Password Manager
(EPM)
EPM software provides a simple solution for managing passwords and enhances an organization's security by offering military-grade encryption, two-factor authentication, and automatic password generation. It effectively safeguards sensitive data and minimizes the risk of unauthorized access.
Single Sign-On
(SSO)
SSO enables users to authenticate once and access multiple applications and systems without the need to re-enter credentials. It improves user experience, simplifies access management, and enhances security.
Identity and Access Management
(IAM)
IAM solutions centralize the management of user identities, access rights, and privileges. They enforce strong authentication, role-based access control, and provide user provisioning and deprovisioning capabilities.
Multi-Factor Authentication
(MFA)
MFA requires users to provide additional factors (besides a password) to verify their identity, such as biometrics, SMS codes, or hardware tokens. It adds an extra layer of security and helps prevent unauthorized access.
Privileged Access Management
(PAM)
PAM solutions manage and control privileged accounts and access to critical systems and data. They enforce least privilege principles, monitor privileged activity, and assist with privileged session management.
Identity Governance and Administration
(IGA)
IGA systems automate and simplify the management of user identities, entitlements, and compliance. They streamline user onboarding, offboarding, and access request processes while ensuring regulatory compliance.