top of page


From A to Z, we have gathered some of the industry's most common IT and network terminology.
Two-Factor Authentication. Also known as Two-Step Verification, Two-Step Authentication, or Multi-Factor Authentication (MFA). An extra step added to the log-in process, such as a code sent to your phone, that helps verify your identity and prevent your private information from being accessed.
3G is defined as the 3rd generation of mobile phone and data communication standards, featuring higher bandwidth for web-based applications and video. An example of 3G is the cell network that is used for many iPhones in the US and abroad.
4G is defined as the 4th generation of mobile phone and data communication standards with even greater data-transfer rates than 3G.
A mobile communications standard intended to replace 4G, allowing wireless internet access at a much higher speed.
Advanced Endpoint Protection. An AEP product is one that provides automatic threat prevention and threat event reporting capabilities for every endpoint system it protects.
Artificial Intelligence. A technology that mimics human intelligence to perform tasks and improve based on the information it collects.
Access point. A networking hardware device that acts as a communication hub for users of a wireless device to connect to a wireless LAN
Application Programming Interface. An API is a set of programming code that enables data transmission between one software product and another.
Android Application Package. A file format required to distribute Android apps.
Access Point Network. An APN directly connects users to the Internet and adding a specific APN to your device's browser lets you connect to the external network with which it is associated.
A proprietary protocol that syncs your mobile device with your Exchange mailbox, so you can access your email, calendar, contacts, tasks, etc.
App Builder
A tool for users to create apps without the need for programming.
App Wrapping
Protecting enterprise information on mobile devices with a security and management layer.
A series of principles, guidelines or rules that describes the practice of organizing and integrating computer systems.
Bring Your Own Device. An ownership model for organizations where employees can use their own personal mobile device for work tasks like accessing their work mail, apps, etc. without compromising security.
Central Authentication Service. CAS is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while providing their credentials (such as user ID and password) only once.
Cloud Access Security Broker. CASB is an on-premises or cloud-based software that will act as an intermediary between the endpoints (e.g., a mobile app/device) and SaaS applications (e.g., Office 365,, etc.). The CASB monitors traffic and allows organizations to enforce data protection and access control policies.
Content Management System. Software that, in one central system, enables the publication, modification, and organisation of content.
Corporate-Owned Business Only. An ownership model for organizations where full control over devices and data is required with little-to-no room for private usage – typically for regulated environments like government.
Company-Owned Personally-Enabled. An ownership model where the device belongs to the company and work data is stored, but the device is also enterprise-managed/controlled and leaves the user with a wall-garden for their private apps and data.
CRM System
Customer Relationship Management System. Allowing for the management, improvement, and support of lead-generation, sales, support, and interactions.
Cascading Style Sheets. Used alongside HTML, it allows for the designing and styling of web pages and hybrid mobile apps.
Choose Your Own Device. Allowing employees to choose the device they would like to use.
A carrier is a company that provides mobile services.
Refers to a vast network of remote servers around the globe which are hooked together and meant to operate as a single ecosystem.
Cloud Computing
A model for delivering information technology services where resources are retrieved from the internet through web-based tools.
The arrangement or set-up of the hardware and software that make up a computer system.
App wrapping creates containers. Containers manage and secure apps.
The practice of protecting critical systems and sensitive information from digital attacks.
Domain Name Server. The system that automatically translates internet addresses to the numeric machine addresses that computers use.
Disaster Recovery. A disaster recovery plan is a set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events.
Endpoint Detection and Response. Also known as endpoint threat detection and response (ETDR). An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.
Enterprise File Sync and Share. EFSS refers to software services that enable organizations to securely synchronize and share documents, photos, videos and files from multiple devices with employees, and external customers and partners.
Enterprise Mobility Management. A set of services and technologies designed to secure corporate data on employees' mobile devices.
Enterprise Resource Planning. Software enabling the management and automation of business processes.
Enhanced Work Profile. For COPE deployments where the device belongs to the company and is fully enterprise-managed/controlled but leaves the user with a wall-garden for their private apps and data, providing a good balance between BYOD and COBO without compromising corporate data security.
End User
A person who ultimately uses or is intended to ultimately use a product.
An endpoint refers to a device that exists at the end of a network connection (e.g. laptop, desktop, mobile phone)
Enterprise Mobility
Using mobiles within the company to increase efficiency and productivity by allowing employees to work away from their desk.
Federated Identity Management. FIM is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
File Transfer Protocol. A software protocol for exchanging information between computers over a network.
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
Global System for Mobile Communication. A digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
Graphical User Interface. A graphics-based operating system interface that uses icons, menus, and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
A gateway is a piece of networking hardware or software used for telecommunications networks that allows data to flow from one discrete network to another.
Hypertext Markup Language. A coding language used to create websites, web pages, web apps, and hybrid mobile apps.
Hypertext Transfer Protocol. HTTP is the set of rules for transferring files - such as text, images, sound, video and other multimedia files - over the web.
Describes those operations that are more abstract in nature; wherein the overall goals and systemic features are typically more concerned with the wider, macro system as a whole.
A hotspot is a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router connected to an Internet service provider.
Identity and Access Management. Also known as IAM, IdM, IdAM, and IDAM) is a security effort to help manage digital identities and control access to corporate resources. It is not a product per se but rather a framework including various well-known security processes, policies, and technologies._
Integrated Circuit Card Identifier. An ICCID is a unique number assigned to a SIM card used in a mobile phone or another cellular device. It provides a standard way to identify each mobile device connected to a cellular network.
International Mobile Equipment Identity. Every mobile device that connects to a cellular network has a unique IMEI number. This includes cell phones, smartphones, cellular-enabled tablets and smartwatches, and other devices that support cellular data.
iOS App Store Package. The format used for distributing iOS apps.
Internet Service Provider. A company that provides subscribers with access to the internet.
Independent Software Vendor. A business or an individual that builds, develops, and sells consumer or enterprise software that is consumed by end users.
Information Technology. The use of computers to create, process, store, retrieve and exchange all kinds of electronic data and information.
Information Technology Infrastructure Library. A set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business.
Identity Provider. A service that stores and verifies user identity.
The basic, underlying framework or features of a system or organization.
A device or system that unrelated entities use to interact.
The ability of equipment, systems, apps or products from different vendors to operate together in a coordinated way, without an end user's involvement.
Internet of Things. The networking capability that allows information to be sent to and received from objects and devices using the Internet.
Mostly used for Android mobile apps, a programming language and framework which enables the building of software.
Like Java, but generally used for creating interactive effects and features, like games, audio, and visual effects.
Knowledge Base
An online library of information regarding a service, product, specific topic, or department. A repository where information gets stored, organized, and then shared - either with employees or customers, depending on the type of knowledge base.
Local Area Network. A collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.
Low Power Wide Area Network. A type of wide-area network wireless communication designed to allow long-range communications that can be used to connect low-power IoT devices onto either a private or commercial wireless network or a third-party cloud-based infrastructure._
Long-Term Evolution. LTE is a 4G telecommunications standard used for transferring data over cellular networks.
Long Time Evolution for Machines. LTE-M is a LPWAN radio technology reusing existing 4G/LTE infrastructures, offering high transmission rates (up to 1Mbps) with a low latency as well as voice transmission capacity (using VoLTE).
LoRa (Long Range) or LoRaWAN (Long Range Wide Area Network) is a non-cellular, unlicensed radio technology used to deploy private/public LPWAN networks. LoRa refers to the modulation technique (physical layer), while LoRaWAN is one of several protocols used to manage network communications (network layer). Devices require a LPWAN gateway to communicate._
A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
Mobile Application Management. Software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
Mobile Content Management. Allowing employees to share and collaborate on content through mobile devices.
Mobile Device Management. The process of enhancing corporate data security by monitoring, managing, and securing the mobile devices such as laptops, smartphones and tablets that are used in enterprises.
Mobile Equipment Identifier. MEID is also commonly known as an Electric Serial Number (ESN). MEID is a unique 14-digit number that is a unique identifier of a specific cell phone. For easy remembering, a phone's MEID number is a phone's IMEI number minus the last digit if it has both.
Multi-Factor Authentication. An authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
Machine Learning. A subfield of artificial intelligence which is broadly defined as the capability of a machine to imitate intelligent human behavior.
Mobile Threat Defense. Software is meant to protect organizations and users from security threats on mobile platforms.
Media Transfer Protocol. A standard for transferring media files between two connected devices.
Mobility as a Service. The integration of various forms of transport services into a single mobility service accessible on demand.
The process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one. Migration can involve upgrading to new hardware, new software or both.
Network Access Point. A major point where internet service providers (ISPs) can connect with one another in peering arrangements.
Narrowband Internet of Things. NB-IOT is a LPWAN radio technology deployed over mobile networks, offering great indoor coverage for a high number of devices, using low-cost radio modules and ensuring long battery life.
Network Operations Center, or "network management center," is one or more locations from which network monitoring and control (or network management) is exercised over a computer, telecommunication or satellite network.
Operating System. An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.
OS Agnostic
Software that runs under any operating system. It may also refer to development tools that support any operating system.
One-Time Password. An automatically generated numeric or alphanumeric string of characters that authenticates a user for a single transaction or login session.
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
Protected/Personal Health Information. Any medical information that can potentially identify an individual, that was created, used or disclosed in the course of providing healthcare service.
Personally Identifiable Information. A general term that is used to describe any form of sensitive data that could be used to identify or contact an individual.
Proof of Concept. A POC is a demonstration to verify that certain concepts or theories have the potential for real-world application.
Point of Sale. This term can refer to the physical space where users can make purchases, and also, this program helps to systematize the control of sales and inventories of the physical point of a business.
Professional Services. Professional services are nonphysical products or services that individuals or companies provide to customers to help them manage or improve a specific area of their businesses. For example, IT specialists may troubleshoot technology issues, install or uninstall software, routine technology updates, and assist with coding or improve technology to benefit operations.
A form of communication that provides a direct path from one fixed point to another.
Quality Assurance. A procedure to ensure the quality of software products or services provided to the customers by an organization.
QR codes
A QR (quick response) code is a type of barcode that can be scanned by certain smartphone applications to direct users to a website or display other useful information.
Quality of Service. Refers to a network's ability to achieve maximum bandwidth and deal with other network performance elements like latency, error rate, and uptime.
Role-Based Access Control, also known as role-based security). An access control method that assigns permissions to end-users based on their role within your organization.
Ransomware as a Service. A software delivery model for malicious software that will encrypt data on the victim's computing devices.
Page 1 of 2
Image by Damian Zaleski

We're Hiring

We are hiring for several new positions.
Visit our career page to find out more!

bottom of page