Search and explore common IT and cybersecurity terms
The incorporation of fifth-generation cellular network technology into existing network infrastructure.
Fifth generation of cellular network technology offering higher speeds and lower latency.
Rules and procedures governing access to information systems.
A category of security solutions that defend against sophisticated malware and cyber attacks.
Iterative approach to software development emphasizing flexibility and customer satisfaction.
Programs designed to detect, prevent, and remove malicious software (malware) from computers and networks.
Set of protocols and tools for building software applications and enabling their interaction.
Tools and practices for tracking application performance and user experience.
Computer systems capable of performing tasks that typically require human intelligence.
Systematic approach to governing and maintaining IT assets throughout their lifecycle.
Chronological record providing documentary evidence of system activities.
Technology overlaying digital information onto the real world environment.
The process of verifying the identity of a user, device, or system, typically through passwords, biometrics, or security tokens.
Determining the access rights or privileges of a user or system, specifying what resources they can access and what actions they can perform.
Self-governing systems capable of operating without human intervention.
The process of creating copies of data to protect against loss.
The maximum rate of data transfer across a network path.
The maximum rate of data transfer across a network connection.
The maximum rate at which data can be transferred over an internet connection, typically measured in Mbps or Gbps.
Extremely large data sets that can be analyzed to reveal patterns and trends.
Technology measuring and analyzing human physical and behavioral characteristics.
Distributed ledger technology providing secure, decentralized record-keeping of transactions.
Personal scheduling service allowing others to book time with you based on your availability.
Creating systems of prevention and recovery from potential IT threats.
Technologies and practices for collecting, integrating, analyzing, and presenting business information.
Specialized internet service packages designed for commercial use with enhanced reliability and support.
Policy allowing employees to use personal devices for work purposes.
Process of testing and verifying that installed cabling meets industry standards and specifications.
System for organizing and protecting network cables to maintain proper airflow and accessibility.
Temporary storage area that provides fast access to frequently used data.
Process of determining IT resources needed to meet future demands.
Enhanced Category 5 cabling supporting data rates up to 1 Gbps over 100 meters, commonly used in Ethernet networks.
Category 6 cabling supporting up to 10 Gbps over short distances (up to 55m) and 1 Gbps over 100m, with improved specifications over Cat5e.
Augmented Category 6 cabling supporting 10 Gbps speeds over the full 100m distance, with improved alien crosstalk specifications.
Category 7 cabling supporting up to 40 Gbps over 50m and 100 Gbps over 15m, featuring fully shielded cable design.
Category 8 cabling supporting up to 40 Gbps over 30m, designed for high-speed data center applications.
Law enhancing privacy rights and consumer protection for California residents.
Primary processor executing instructions of a computer program.
Structured approach to transitioning individuals, teams, and organizations to a desired future state.
Searchable archive of past instant messages and conversations.
Combined practices of continuous integration and continuous delivery in software development.
Data encryption that occurs on the user's device before transmission to servers.
Service that makes copies of data and stores them on remote servers for disaster recovery purposes.
The delivery of computing services over the internet, including servers, storage, databases, and software.
The process of moving data, applications, or other business elements to a cloud computing environment.
Automated arrangement, coordination, and management of complex cloud systems and services.
Policies, technologies, and controls deployed to protect data, applications, and infrastructure in cloud computing environments.
Online storage service that allows data to be stored and accessed over the internet.
Online storage service allowing data to be stored, accessed, and managed in the cloud.
Storage location for managing source code and version history.
Educational programs ensuring staff understand compliance requirements and procedures.
AI field enabling computers to understand and process visual information from images or videos.
Process of maintaining IT systems, products, and assets in a desired state.
OS-level virtualization method for deploying and running distributed applications.
Security framework that adapts access controls based on the context of access requests.
Customer Relationship Management software for managing customer interactions and data.
Moving data that is no longer actively used to a separate storage device for long-term retention.
Process of organizing data by sensitivity level and business impact.
Framework for managing the availability, usability, integrity, and security of data.
Process of combining data from different sources into a unified view.
Storage repository that holds a vast amount of raw data in its native format.
Policy-based approach to managing the flow of data throughout its lifecycle.
Process of discovering patterns and relationships in large data sets.
Contract regulating the processing of personal data between parties.
Process to identify and minimize data protection risks in projects.
Practice of maintaining high-quality information that is reliable, accurate, and accessible.
Process of storing data in multiple locations to improve availability and accessibility.
Graphical representation of information and data using visual elements.
A large storage system optimized for analysis and reporting of business data.
Method of splitting and storing a single logical dataset in multiple databases.
Services designed to detect and filter out DDoS attack traffic while allowing legitimate traffic through.
A dedicated line for internet access ensuring consistent bandwidth and performance.
Set of practices combining software development and IT operations.
Virtual representation of physical objects or processes for simulation and analysis.
Cable specifically designed to be installed underground without additional conduit protection.
A documented process to recover and protect business IT infrastructure in case of a disaster.
System that translates domain names into IP addresses.
Processing data near the edge of the network where it's generated instead of in a centralized location.
Computing infrastructure enabling data processing closer to the source of data generation.
Electronic discovery process of identifying and collecting electronic information for legal proceedings.
Security solution monitoring end-user devices to detect and respond to cyber threats.
Services connecting enterprise phone systems to the public telephone network via IP-based connections.
Software that manages day-to-day business activities like accounting and project management.
Process of combining data from multiple sources into a large, centralized data store.
Cloud-hosted enterprise email, calendar, and contact management service.
Umbrella term for AR, VR, and mixed reality technologies.
A high-speed internet connection using fiber-optic cables to transmit data as light signals, offering higher bandwidth and lower latency.
Hardware converting optical signals to electrical signals and vice versa.
Ability to share documents and files with other users through communication platforms.
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Dedicated hardware device providing network security protection.
EU regulation on data protection and privacy for all individuals within the EU and EEA.
Professional email service with custom domain support, enhanced security, and business features.
Central management interface for Google Workspace settings, users, and security policies.
Scheduling and time-management application with resource booking and team calendar features.
Team messaging platform with direct messages, group conversations, and bot integrations.
Collaborative workspace for team messaging, file sharing, and project coordination.
Enterprise search tool providing unified search across Google Workspace and third-party services.
Cloud-based document creation and editing tool with real-time collaboration capabilities.
Cloud storage and file sharing platform with advanced security and administration features.
Survey and data collection tool with automatic response gathering and analysis.
Collaborative inbox and discussion forum tool for team communication and project management.
Note-taking service integrated with Google Workspace for capturing and sharing ideas.
Video conferencing solution supporting secure, high-quality virtual meetings and webinars.
Feature allowing users to join meetings using multiple devices for enhanced participation.
Online spreadsheet application with advanced data analysis and collaboration features.
Website creation tool for building internal and external websites without coding.
Presentation software enabling collaborative creation and sharing of professional presentations.
Information governance and eDiscovery tool for managing, retaining, and searching data.
Cloud-based productivity and collaboration suite including Gmail, Docs, Drive, Meet, and more.
Premium plan offering advanced security, management, and compliance features.
Entry-level plan focusing on collaboration tools without email services.
Directory of third-party applications and integrations for Google Workspace.
Tool for migrating content from legacy systems to Google Workspace applications.
Specialized processor designed to accelerate graphics rendering.
Data storage device using magnetic storage to store and retrieve digital data.
Physical device providing network security by filtering traffic.
Technical support service providing assistance to users experiencing computer or IT-related problems.
US legislation providing data privacy and security provisions for safeguarding medical information.
Protocol for transmitting data over the World Wide Web.
A computing environment combining on-premises infrastructure with public cloud services, allowing data and applications to be shared between them.
Process of responding to and resolving IT service disruptions to restore normal operations.
Documented approach to addressing and managing security incidents.
Document defining rules and procedures for maintaining information security.
Cloud-based services that provide virtualized computing resources over the internet.
Real-time text transmission over the Internet for immediate communication.
Network of physical objects embedded with sensors, software, and connectivity to exchange data.
Network of physical objects embedded with sensors and connectivity for data exchange.
Multiple internet connections from different providers to ensure continuous service if one connection fails.
Unique numerical identifier assigned to each device on a network.
International standard for information security management systems.
Company that provides Internet access to subscribers.
Framework ensuring IT investments support business objectives.
Framework of best practices for delivering IT services and aligning them with business needs.
Process of creating, sharing, using, and managing IT knowledge and information.
Hardware allowing control of multiple computers from single keyboard, video, and mouse.
Network connecting computers within a limited area.
Time delay between the initiation and execution of a process.
The time it takes for data to travel from the source to the destination, measured in milliseconds (ms). Lower latency is essential for real-time applications.
Network switching that operates at the network layer, combining routing and switching functions.
Small form-factor fiber optic connector commonly used in high-density applications.
Real-time conversion of spoken words into written text during meetings.
Hardware device distributing network traffic across multiple servers.
Distribution of network traffic across multiple servers to optimize resource utilization.
Distribution of workloads across multiple computing resources.
AI subset enabling systems to learn and improve from experience without explicit programming.
Outsourced IT services where a provider manages and assumes responsibility for providing IT functions.
Method of enabling an organization to link all critical data to a common point of reference.
Tools providing insights into meeting participation, engagement, and effectiveness.
Capability to capture and store audio, video, and shared content from virtual meetings.
A network topology where devices connect directly and cooperate to route data efficiently.
Software development approach structuring applications as collections of loosely coupled services.
Cloud-based subscription service combining Office applications, cloud storage, and enterprise-grade security.
Scheduling and appointment management tool for service-based businesses.
Tool for managing and tracking compliance requirements and controls.
Advanced threat protection service safeguarding against sophisticated attacks.
Survey and quiz creation tool for gathering feedback and data collection.
Suite of tools for discovering, classifying, and protecting sensitive information.
Information tracking application for organizing work and managing data.
Collaborative application helping teams think, plan, and create together.
Task management tool for organizing teamwork and tracking project progress.
Low-code development platform for building custom business applications.
Enterprise video service for uploading, sharing, and managing video content.
Digital storytelling application for creating and sharing interactive reports and presentations.
Collaboration platform combining chat, video meetings, file storage, and application integration.
Collaboration platform integrating chat, video meetings, file storage, and application integration.
Enhanced version of Teams with advanced meeting features and security options.
Enhanced Teams platform offering advanced meeting features, security, and personalization options.
Meeting room solution integrating hardware and software for hybrid meetings.
Task management application for personal and professional task organization.
Employee experience platform integrating communications, knowledge, learning, and insights.
Employee experience platform combining communications, knowledge, learning, and insights.
Digital canvas for collaborative brainstorming and visual content creation.
Main circuit board connecting and enabling communication between crucial components.
High-density fiber optic connector supporting multiple fiber strands, used in data center applications.
Using multiple cloud computing services from different providers to optimize resources and reduce dependency on a single vendor.
A security system that requires multiple forms of verification before granting access, such as a password combined with a fingerprint scan or a one-time code.
Fiber optic cable using multiple light paths, suitable for shorter distances up to 400m, commonly used in data centers.
AI technology enabling computers to understand and process human language.
Security solution enforcing policy on devices before they're granted network access.
Storage device connected to a network providing file-level data access.
Hardware connecting multiple network segments at data link layer.
Device verifying proper installation and functionality of network cables.
Hardware component enabling network connectivity in computers.
Hardware device serving as entrance to another network.
Hardware component enabling computer connection to a network.
The time delay between the sending and receiving of data packets across a network.
The continuous observation and analysis of network performance and security.
The process of providing alternative paths for network traffic in case of component failure.
Division of a network into smaller, isolated segments for improved security and performance.
Hardware connecting devices in a computer network.
Computing systems inspired by biological neural networks for machine learning.
Guidelines for managing and reducing cybersecurity risk.
Laser-optimized multi-mode fiber supporting 100 Gbps over 150m, ideal for high-speed data center applications.
Cloud storage service providing secure file sharing and synchronization capabilities.
Process of distributing and applying updates to software applications.
Hardware assembly mounting connecting hardware for network cables.
Hardware unit that organizes and manages network cable connections, typically mounted in a rack.
Payment Card Industry Data Security Standard for organizations handling credit card information.
Authorized simulated cyberattack to evaluate the security of a computer system.
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
Cloud services offering hardware and software tools over the internet, typically for application development.
Cable designed for use in plenum spaces, featuring fire-resistant properties and low smoke emission.
Cloud-based service for creating automated workflows between applications and services.
Workflow automation service for creating automated processes between applications.
Microsoft's business analytics service for interactive visualizations and business intelligence.
Device fitting multiple power outlets providing power to electronic equipment.
Technology enabling network cables to carry electrical power to network devices.
Hardware component converting power for computer system components.
Technology using data, statistical algorithms, and machine learning to identify future outcomes.
Real-time indication of a user's availability status in communication systems.
Analysis of how personally identifiable information is collected and protected.
Process of identifying and managing the causes of incidents in IT services.
Planning, organizing, and managing resources to achieve specific IT project goals.
Set of rules governing data communication between devices.
Server acting as an intermediary for requests between clients and other servers.
Control mechanism for ensuring performance levels for critical applications.
The ability to prioritize different types of network traffic to ensure performance for critical applications.
Network settings that prioritize critical business applications and traffic over less important data.
Computing using quantum-mechanical phenomena for processing power beyond classical computers.
Data storage technology combining multiple disk drives.
Data storage virtualization technology combining multiple disk drives.
Hardware managing multiple disk drives for redundancy or performance.
High-speed volatile memory providing quick data access for active programs.
A type of malicious software that encrypts files and demands payment for decryption keys.
Policy defining how long organizations must keep records and documents.
Adherence to laws, regulations, guidelines, and specifications relevant to business processes.
Process of managing, planning, and controlling software builds through different stages.
Process of identifying and evaluating potential risks to information systems.
Standard connector for twisted pair Ethernet cables, featuring eight pins for data transmission.
Technology automating repetitive tasks through software robots or artificial intelligence workers.
Networking device forwarding data packets between computer networks.
Software delivery model where applications are hosted and licensed on a subscription basis.
Ability of a system to handle growing amounts of work.
Feature allowing users to broadcast their screen content to other meeting participants.
Software-defined networking technology applied to WAN connections for improved performance and management.
System providing real-time analysis of security alerts generated by applications and network hardware.
Facility housing security analysts who monitor, analyze, and respond to cybersecurity incidents.
Solutions that combine security orchestration, automation and incident response functionality.
Physical device used to prove identity electronically, often as part of two-factor authentication.
Computer hardware designed to process requests and deliver data to other computers.
Framework for mounting multiple hardware devices in an organized manner.
Organized list of all IT services available to customers or employees.
Single point of contact between service providers and users for IT-related issues.
Contract between service providers and clients defining expected service levels and performance metrics.
A contract defining the expected level of service, including uptime guarantees, response times, and performance metrics.
Method for managing all IT services throughout their lifecycle.
Cloud-based platform for creating websites, storing documents, and sharing information securely.
Twisted pair cable with additional metallic shielding to protect against electromagnetic interference.
Fiber optic cable using a single light path, ideal for long-distance transmission up to 100km.
Self-executing contracts with terms directly written into code.
Auditing procedure ensuring service providers securely manage customer data.
Software distribution model where applications are hosted by a service provider and made available to customers over the internet.
Process of controlling and documenting software licensing in an organization.
An approach to networking that uses software-based controllers to direct traffic.
Standard language for managing and manipulating relational databases.
Storage device using integrated circuit assemblies to store data persistently.
Protocols providing secure communication over a computer network.
A fixed IP address that doesn't change, essential for hosting servers or remote access solutions.
Dedicated high-speed network providing block-level network access to storage.
Standardized approach to building network infrastructure using organized cabling and associated hardware.
Internet connection providing equal upload and download speeds, ideal for business applications.
Data storage device reading and writing data on magnetic tape.
Core protocols of the Internet Protocol suite.
Use of software to execute tests and compare actual outcomes with predicted outcomes.
Actual amount of data successfully transferred through a network.
AI-powered feature placing meeting participants in shared virtual spaces.
Cabling where pairs of wires are twisted together to reduce electromagnetic interference, commonly used in Ethernet networks.
An extra layer of security requiring two different forms of verification before granting access.
A secure access control system with touch-screen readers, integrated video for entry/exit events, multi-tenant intercom systems, and flexible mobile credentials.
Point-to-point wireless bridge solution for connecting separate network locations.
All-in-one solutions combining advanced routing, security features, and the capability to manage UniFi applications, ideal for large-scale deployments.
An enterprise platform for managing digital signage, EV charging stations, building-wide lighting, and display content with centralized control.
A visualization and planning tool that allows users to simulate a complete UniFi system for network optimization.
Central controller for UniFi Access door control system managing multiple access points.
Enterprise-grade network appliance with integrated security gateway, network controller, and NVR capabilities.
All-in-one networking device combining a router, switch, access point, and network controller.
Wall-mounted network appliance combining security gateway, PoE switch, and network controller functionality.
High-performance security gateway supporting 10G WAN connectivity and advanced routing features.
A networking solution integrating internet gateways with scalable Wi-Fi and switching capabilities, providing real-time traffic dashboards and optimization tips.
Software interface for managing and monitoring UniFi network devices and configurations.
An AI-driven camera platform for local video storage, featuring smart detection, customizable recording schedules, and flexible notification settings.
Intelligent power distribution unit with remote monitoring and control capabilities.
A plug-and-play VoIP system for small and medium businesses, including advanced call routing and administrative features with touchscreen phones.
Integration of enterprise communication services like instant messaging, voice, video, and presence information.
Cloud-delivered unified communications model that supports six main functions: enterprise telephony, meetings, unified messaging, instant messaging, mobility, and communications-enabled business processes.
An integrated security solution combining multiple security features like firewall, antivirus, and intrusion detection.
Battery backup providing temporary power during outages.
Twisted pair cable without additional shielding, commonly used in office environments.
Reference to a web resource specifying its location on a network.
Process of managing third-party service providers and suppliers.
System for tracking and managing changes to software code.
Real-time video communication between two or more participants.
Feature allowing meeting hosts to split participants into smaller groups for focused discussions.
A secure, encrypted connection over a less secure network, typically the internet.
Computer-generated simulation of a three-dimensional environment for interactive user experience.
A logical grouping of network devices that allows them to communicate as if they were on the same physical network.
Technology enabling voice calls using Internet Protocol networks.
Tool that assesses computers, networks or applications for known vulnerabilities.
Network extending over a large geographical area.
Online service for hosting virtual meetings, presentations, and collaborations in real-time.
The latest generation of Wi-Fi technology (802.11ax) offering improved speed and efficiency.
Next-generation Wi-Fi standard (802.11be) promising significantly higher speeds and lower latency.
Networking hardware device enabling Wi-Fi connection to a wired network.
Computer designed for technical or scientific applications.
Security concept requiring verification from everyone trying to access network resources.
A security model that operates on the principle of 'never trust, always verify,' requiring strict identity verification for every person and device attempting to access resources, regardless of their location within or outside the network.
Security concept requiring strict identity verification for every person and device attempting to access resources.
A software security flaw unknown to the vendor that can be exploited before a patch is available.