top of page
Glossary
From A to Z, we have gathered some of the industry's most common IT and network terminology.
Term | Definition |
---|---|
2FA | Two-Factor Authentication. Also known as Two-Step Verification, Two-Step Authentication, or
Multi-Factor Authentication (MFA). An extra step added to the log-in process, such as a code sent to your phone, that helps verify your identity and prevent your private information from being accessed. |
3G | 3G is defined as the 3rd generation of mobile phone and data communication standards, featuring higher bandwidth for web-based applications and video. An example of 3G is the cell network that is used for many iPhones in the US and abroad. |
4G | 4G is defined as the 4th generation of mobile phone and data communication standards with even greater data-transfer rates than 3G. |
5G | A mobile communications standard intended to replace 4G, allowing wireless internet access at a much higher speed. |
AEP | Advanced Endpoint Protection. An AEP product is one that provides automatic threat prevention and threat event reporting capabilities for every endpoint system it protects. |
AI | Artificial Intelligence. A technology that mimics human intelligence to perform tasks and improve based on the information it collects. |
AP | Access point. A networking hardware device that acts as a communication hub for users of a wireless device to connect to a wireless LAN |
API | Application Programming Interface. An API is a set of programming code that enables data transmission between one software product and another. |
APK | Android Application Package. A file format required to distribute Android apps. |
APN | Access Point Network. An APN directly connects users to the Internet and adding a specific APN to your device's browser lets you connect to the external network with which it is associated. |
Activesync | A proprietary protocol that syncs your mobile device with your Exchange mailbox, so you can access your email, calendar, contacts, tasks, etc. |
App Builder | A tool for users to create apps without the need for programming. |
App Wrapping | Protecting enterprise information on mobile devices with a security and management layer. |
Architecture | A series of principles, guidelines or rules that describes the practice of organizing and integrating computer systems. |
BYOD | Bring Your Own Device. An ownership model for organizations where employees can use their own personal mobile device for work tasks like accessing their work mail, apps, etc. without compromising security. |
CAS | Central Authentication Service. CAS is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while providing their credentials (such as user ID and password) only once. |
CASB | Cloud Access Security Broker. CASB is an on-premises or cloud-based software that will act as an intermediary
between the endpoints (e.g., a mobile app/device) and SaaS applications (e.g., Office 365, Salesforce.com, etc.). The CASB monitors traffic and allows organizations to enforce data protection and access control policies. |
CMS | Content Management System. Software that, in one central system, enables the publication, modification, and organisation of content. |
COBO | Corporate-Owned Business Only. An ownership model for organizations where full control over devices and
data is required with little-to-no room for private usage – typically for regulated environments like government. |
COPE | Company-Owned Personally-Enabled. An ownership model where the device belongs to the company and work data is stored, but the device is also enterprise-managed/controlled and leaves the user with a wall-garden for their private apps and data. |
CRM System | Customer Relationship Management System. Allowing for the management, improvement, and support of lead-generation, sales, support, and interactions. |
CSS | Cascading Style Sheets. Used alongside HTML, it allows for the designing and styling of web pages and hybrid mobile apps. |
CYOD | Choose Your Own Device. Allowing employees to choose the device they would like to use. |
Carrier | A carrier is a company that provides mobile services. |
Cloud | Refers to a vast network of remote servers around the globe which are hooked together and meant to operate as a single ecosystem. |
Cloud Computing | A model for delivering information technology services where resources are retrieved from the internet through web-based tools. |
Configuration | The arrangement or set-up of the hardware and software that make up a computer system. |
Containerization | App wrapping creates containers. Containers manage and secure apps. |
Cybersecurity | The practice of protecting critical systems and sensitive information from digital attacks. |
DNS | Domain Name Server. The system that automatically translates internet addresses to the numeric machine
addresses that computers use. |
DR | Disaster Recovery. A disaster recovery plan is a set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events. |
EDR | Endpoint Detection and Response. Also known as endpoint threat detection and response (ETDR). An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities. |
EFSS | Enterprise File Sync and Share. EFSS refers to software services that enable organizations to securely synchronize and share documents, photos, videos and files from multiple devices with employees, and external customers and partners. |
EMM | Enterprise Mobility Management. A set of services and technologies designed to secure corporate data on employees' mobile devices. |
ERP | Enterprise Resource Planning. Software enabling the management and automation of business processes. |
EWP | Enhanced Work Profile. For COPE deployments where the device belongs to the company and is fully
enterprise-managed/controlled but leaves the user with a wall-garden for their private apps and data, providing a good balance between BYOD and COBO without compromising corporate data security. |
End User | A person who ultimately uses or is intended to ultimately use a product. |
Endpoint | An endpoint refers to a device that exists at the end of a network connection (e.g. laptop, desktop, mobile phone) |
Enterprise | Business |
Enterprise Mobility | Using mobiles within the company to increase efficiency and productivity by allowing employees to work away from their desk. |
FIM | Federated Identity Management. FIM is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group. |
FTP | File Transfer Protocol. A software protocol for exchanging information between computers over a network. |
Firewall | A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules. |
GSM | Global System for Mobile Communication. A digital mobile network that is widely used by mobile phone
users in Europe and other parts of the world. |
GUI | Graphical User Interface. A graphics-based operating system interface that uses icons, menus, and a mouse (to click on the icon or pull down the menus) to manage interaction with the system. |
Gateway | A gateway is a piece of networking hardware or software used for telecommunications networks that allows data to flow from one discrete network to another. |
HTML | Hypertext Markup Language. A coding language used to create websites, web pages, web apps, and hybrid mobile apps. |
HTTP | Hypertext Transfer Protocol. HTTP is the set of rules for transferring files - such as text, images, sound, video and other multimedia files - over the web. |
High-level | Describes those operations that are more abstract in nature; wherein the overall goals and systemic features are typically more concerned with the wider, macro system as a whole. |
Hotspot | A hotspot is a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router connected to an Internet service provider. |
IAM | Identity and Access Management. Also known as IAM, IdM, IdAM, and IDAM) is a security
effort to help manage digital identities and control access to corporate resources. It is not a product per se but rather a framework including various well-known security processes, policies, and technologies._ |
ICCID | Integrated Circuit Card Identifier. An ICCID is a unique number assigned to a SIM card used in a mobile phone or another cellular device. It provides a standard way to identify each mobile device connected to a cellular network. |
IMEI | International Mobile Equipment Identity. Every mobile device that connects to a cellular network has a unique IMEI number. This includes cell phones, smartphones, cellular-enabled tablets and smartwatches, and other devices that support cellular data. |
IPA | iOS App Store Package. The format used for distributing iOS apps. |
ISP | Internet Service Provider. A company that provides subscribers with access to the internet. |
ISV | Independent Software Vendor. A business or an individual that builds, develops, and sells consumer or
enterprise software that is consumed by end users. |
IT | Information Technology. The use of computers to create, process, store, retrieve and exchange all kinds of
electronic data and information. |
ITLL | Information Technology Infrastructure Library. A set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. |
IdP | Identity Provider. A service that stores and verifies user identity. |
Infrastructure | The basic, underlying framework or features of a system or organization. |
Interface | A device or system that unrelated entities use to interact. |
Interoperability | The ability of equipment, systems, apps or products from different vendors to operate together in a coordinated way, without an end user's involvement. |
IoT | Internet of Things. The networking capability that allows information to be sent to and received from objects and devices using the Internet. |
Java | Mostly used for Android mobile apps, a programming language and framework which enables the building of software. |
JavaScript | Like Java, but generally used for creating interactive effects and features, like games, audio, and visual effects. |
Knowledge Base | An online library of information regarding a service, product, specific topic, or department. A repository where information gets stored, organized, and then shared - either with employees or customers, depending on the type of knowledge base. |
LAN | Local Area Network. A collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school. |
LPWAN | Low Power Wide Area Network. A type of wide-area network wireless communication designed to allow long-range communications that can be used to connect low-power IoT devices onto either a private or commercial wireless network or a third-party cloud-based infrastructure._ |
LTE-A | Long-Term Evolution. LTE is a 4G telecommunications standard used for transferring data over cellular networks. |
LTE-M | Long Time Evolution for Machines. LTE-M is a LPWAN radio technology reusing existing 4G/LTE infrastructures,
offering high transmission rates (up to 1Mbps) with a low latency as well as voice transmission capacity (using VoLTE). |
LoRa/LoRaWAN | LoRa (Long Range) or LoRaWAN (Long Range Wide Area Network) is a non-cellular, unlicensed radio technology used to deploy private/public LPWAN networks. LoRa refers to the modulation technique (physical layer), while LoRaWAN is one of several protocols used to manage network communications (network layer). Devices require a LPWAN gateway to communicate._ |
Log | A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system. |
Page 1 of 2
bottom of page