top of page
Convention

Glossary

From A to Z, we have gathered some of the industry's most common IT and network terminology.
Term
Definition
2FA
Two-Factor Authentication. Also known as Two-Step Verification, Two-Step Authentication, or Multi-Factor Authentication (MFA). An extra step added to the log-in process, such as a code sent to your phone, that helps verify your identity and prevent your private information from being accessed.
3G
3G is defined as the 3rd generation of mobile phone and data communication standards, featuring higher bandwidth for web-based applications and video. An example of 3G is the cell network that is used for many iPhones in the US and abroad.
4G
4G is defined as the 4th generation of mobile phone and data communication standards with even greater data-transfer rates than 3G.
5G
A mobile communications standard intended to replace 4G, allowing wireless internet access at a much higher speed.
AEP
Advanced Endpoint Protection. An AEP product is one that provides automatic threat prevention and threat event reporting capabilities for every endpoint system it protects.
AI
Artificial Intelligence. A technology that mimics human intelligence to perform tasks and improve based on the information it collects.
AP
Access point. A networking hardware device that acts as a communication hub for users of a wireless device to connect to a wireless LAN
API
Application Programming Interface. An API is a set of programming code that enables data transmission between one software product and another.
APK
Android Application Package. A file format required to distribute Android apps.
APN
Access Point Network. An APN directly connects users to the Internet and adding a specific APN to your device's browser lets you connect to the external network with which it is associated.
Activesync
A proprietary protocol that syncs your mobile device with your Exchange mailbox, so you can access your email, calendar, contacts, tasks, etc.
App Builder
A tool for users to create apps without the need for programming.
App Wrapping
Protecting enterprise information on mobile devices with a security and management layer.
Architecture
A series of principles, guidelines or rules that describes the practice of organizing and integrating computer systems.
BYOD
Bring Your Own Device. An ownership model for organizations where employees can use their own personal mobile device for work tasks like accessing their work mail, apps, etc. without compromising security.
CAS
Central Authentication Service. CAS is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while providing their credentials (such as user ID and password) only once.
CASB
Cloud Access Security Broker. CASB is an on-premises or cloud-based software that will act as an intermediary between the endpoints (e.g., a mobile app/device) and SaaS applications (e.g., Office 365, Salesforce.com, etc.). The CASB monitors traffic and allows organizations to enforce data protection and access control policies.
CMS
Content Management System. Software that, in one central system, enables the publication, modification, and organisation of content.
COBO
Corporate-Owned Business Only. An ownership model for organizations where full control over devices and data is required with little-to-no room for private usage – typically for regulated environments like government.
COPE
Company-Owned Personally-Enabled. An ownership model where the device belongs to the company and work data is stored, but the device is also enterprise-managed/controlled and leaves the user with a wall-garden for their private apps and data.
CRM System
Customer Relationship Management System. Allowing for the management, improvement, and support of lead-generation, sales, support, and interactions.
CSS
Cascading Style Sheets. Used alongside HTML, it allows for the designing and styling of web pages and hybrid mobile apps.
CYOD
Choose Your Own Device. Allowing employees to choose the device they would like to use.
Carrier
A carrier is a company that provides mobile services.
Cloud
Refers to a vast network of remote servers around the globe which are hooked together and meant to operate as a single ecosystem.
Cloud Computing
A model for delivering information technology services where resources are retrieved from the internet through web-based tools.
Configuration
The arrangement or set-up of the hardware and software that make up a computer system.
Containerization
App wrapping creates containers. Containers manage and secure apps.
Cybersecurity
The practice of protecting critical systems and sensitive information from digital attacks.
DNS
Domain Name Server. The system that automatically translates internet addresses to the numeric machine addresses that computers use.
DR
Disaster Recovery. A disaster recovery plan is a set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events.
EDR
Endpoint Detection and Response. Also known as endpoint threat detection and response (ETDR). An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.
EFSS
Enterprise File Sync and Share. EFSS refers to software services that enable organizations to securely synchronize and share documents, photos, videos and files from multiple devices with employees, and external customers and partners.
EMM
Enterprise Mobility Management. A set of services and technologies designed to secure corporate data on employees' mobile devices.
ERP
Enterprise Resource Planning. Software enabling the management and automation of business processes.
EWP
Enhanced Work Profile. For COPE deployments where the device belongs to the company and is fully enterprise-managed/controlled but leaves the user with a wall-garden for their private apps and data, providing a good balance between BYOD and COBO without compromising corporate data security.
End User
A person who ultimately uses or is intended to ultimately use a product.
Endpoint
An endpoint refers to a device that exists at the end of a network connection (e.g. laptop, desktop, mobile phone)
Enterprise
Business
Enterprise Mobility
Using mobiles within the company to increase efficiency and productivity by allowing employees to work away from their desk.
FIM
Federated Identity Management. FIM is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
FTP
File Transfer Protocol. A software protocol for exchanging information between computers over a network.
Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
GSM
Global System for Mobile Communication. A digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
GUI
Graphical User Interface. A graphics-based operating system interface that uses icons, menus, and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
Gateway
A gateway is a piece of networking hardware or software used for telecommunications networks that allows data to flow from one discrete network to another.
HTML
Hypertext Markup Language. A coding language used to create websites, web pages, web apps, and hybrid mobile apps.
HTTP
Hypertext Transfer Protocol. HTTP is the set of rules for transferring files - such as text, images, sound, video and other multimedia files - over the web.
High-level
Describes those operations that are more abstract in nature; wherein the overall goals and systemic features are typically more concerned with the wider, macro system as a whole.
Hotspot
A hotspot is a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router connected to an Internet service provider.
IAM
Identity and Access Management. Also known as IAM, IdM, IdAM, and IDAM) is a security effort to help manage digital identities and control access to corporate resources. It is not a product per se but rather a framework including various well-known security processes, policies, and technologies._
ICCID
Integrated Circuit Card Identifier. An ICCID is a unique number assigned to a SIM card used in a mobile phone or another cellular device. It provides a standard way to identify each mobile device connected to a cellular network.
IMEI
International Mobile Equipment Identity. Every mobile device that connects to a cellular network has a unique IMEI number. This includes cell phones, smartphones, cellular-enabled tablets and smartwatches, and other devices that support cellular data.
IPA
iOS App Store Package. The format used for distributing iOS apps.
ISP
Internet Service Provider. A company that provides subscribers with access to the internet.
ISV
Independent Software Vendor. A business or an individual that builds, develops, and sells consumer or enterprise software that is consumed by end users.
IT
Information Technology. The use of computers to create, process, store, retrieve and exchange all kinds of electronic data and information.
ITLL
Information Technology Infrastructure Library. A set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business.
IdP
Identity Provider. A service that stores and verifies user identity.
Infrastructure
The basic, underlying framework or features of a system or organization.
Interface
A device or system that unrelated entities use to interact.
Interoperability
The ability of equipment, systems, apps or products from different vendors to operate together in a coordinated way, without an end user's involvement.
IoT
Internet of Things. The networking capability that allows information to be sent to and received from objects and devices using the Internet.
Java
Mostly used for Android mobile apps, a programming language and framework which enables the building of software.
JavaScript
Like Java, but generally used for creating interactive effects and features, like games, audio, and visual effects.
Knowledge Base
An online library of information regarding a service, product, specific topic, or department. A repository where information gets stored, organized, and then shared - either with employees or customers, depending on the type of knowledge base.
LAN
Local Area Network. A collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.
LPWAN
Low Power Wide Area Network. A type of wide-area network wireless communication designed to allow long-range communications that can be used to connect low-power IoT devices onto either a private or commercial wireless network or a third-party cloud-based infrastructure._
LTE-A
Long-Term Evolution. LTE is a 4G telecommunications standard used for transferring data over cellular networks.
LTE-M
Long Time Evolution for Machines. LTE-M is a LPWAN radio technology reusing existing 4G/LTE infrastructures, offering high transmission rates (up to 1Mbps) with a low latency as well as voice transmission capacity (using VoLTE).
LoRa/LoRaWAN
LoRa (Long Range) or LoRaWAN (Long Range Wide Area Network) is a non-cellular, unlicensed radio technology used to deploy private/public LPWAN networks. LoRa refers to the modulation technique (physical layer), while LoRaWAN is one of several protocols used to manage network communications (network layer). Devices require a LPWAN gateway to communicate._
Log
A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
Page 1 of 2
Image by Damian Zaleski

We're Hiring

We are hiring for several new positions.
Visit our career page to find out more!

bottom of page