IT & Cybersecurity Glossary

Search and explore common IT and cybersecurity terms

5G Integration

The incorporation of fifth-generation cellular network technology into existing network infrastructure.

networking

5G Technology

Fifth generation of cellular network technology offering higher speeds and lower latency.

emerging-tech

Access Control Policy

Rules and procedures governing access to information systems.

compliance

Advanced Threat Protection (ATP)

A category of security solutions that defend against sophisticated malware and cyber attacks.

cybersecurity

Agile Methodology

Iterative approach to software development emphasizing flexibility and customer satisfaction.

Software

Antivirus Software

Programs designed to detect, prevent, and remove malicious software (malware) from computers and networks.

cybersecurity

API (Application Programming Interface)

Set of protocols and tools for building software applications and enabling their interaction.

Software

Application Monitoring

Tools and practices for tracking application performance and user experience.

Software

Artificial Intelligence (AI)

Computer systems capable of performing tasks that typically require human intelligence.

emerging-tech

Asset Management

Systematic approach to governing and maintaining IT assets throughout their lifecycle.

it-services

Audit Trail

Chronological record providing documentary evidence of system activities.

compliance

Augmented Reality (AR)

Technology overlaying digital information onto the real world environment.

emerging-tech

Authentication

The process of verifying the identity of a user, device, or system, typically through passwords, biometrics, or security tokens.

authentication

Authorization

Determining the access rights or privileges of a user or system, specifying what resources they can access and what actions they can perform.

authentication

Autonomous Systems

Self-governing systems capable of operating without human intervention.

emerging-tech

Backup

The process of creating copies of data to protect against loss.

Data Management

Bandwidth

The maximum rate of data transfer across a network path.

networking

Bandwidth

The maximum rate of data transfer across a network connection.

misc

Bandwidth

The maximum rate at which data can be transferred over an internet connection, typically measured in Mbps or Gbps.

isp

Big Data

Extremely large data sets that can be analyzed to reveal patterns and trends.

Data Management

Biometrics

Technology measuring and analyzing human physical and behavioral characteristics.

emerging-tech

Blockchain

Distributed ledger technology providing secure, decentralized record-keeping of transactions.

emerging-tech

Bookings with Me

Personal scheduling service allowing others to book time with you based on your availability.

communication

Business Continuity Planning

Creating systems of prevention and recovery from potential IT threats.

it-services

Business Intelligence (BI)

Technologies and practices for collecting, integrating, analyzing, and presenting business information.

Data Management

Business Internet Plans

Specialized internet service packages designed for commercial use with enhanced reliability and support.

isp

BYOD (Bring Your Own Device)

Policy allowing employees to use personal devices for work purposes.

it-services

Cable Certification

Process of testing and verifying that installed cabling meets industry standards and specifications.

network-cabling

Cable Management

System for organizing and protecting network cables to maintain proper airflow and accessibility.

network-cabling

Cache

Temporary storage area that provides fast access to frequently used data.

misc

Capacity Planning

Process of determining IT resources needed to meet future demands.

it-services

Cat5e

Enhanced Category 5 cabling supporting data rates up to 1 Gbps over 100 meters, commonly used in Ethernet networks.

network-cabling

Cat6

Category 6 cabling supporting up to 10 Gbps over short distances (up to 55m) and 1 Gbps over 100m, with improved specifications over Cat5e.

network-cabling

Cat6a

Augmented Category 6 cabling supporting 10 Gbps speeds over the full 100m distance, with improved alien crosstalk specifications.

network-cabling

Cat7

Category 7 cabling supporting up to 40 Gbps over 50m and 100 Gbps over 15m, featuring fully shielded cable design.

network-cabling

Cat8

Category 8 cabling supporting up to 40 Gbps over 30m, designed for high-speed data center applications.

network-cabling

CCPA (California Consumer Privacy Act)

Law enhancing privacy rights and consumer protection for California residents.

compliance

Central Processing Unit (CPU)

Primary processor executing instructions of a computer program.

Hardware

Change Management

Structured approach to transitioning individuals, teams, and organizations to a desired future state.

it-services

Chat History

Searchable archive of past instant messages and conversations.

communication

CI/CD Pipeline

Combined practices of continuous integration and continuous delivery in software development.

Software

Client-side Encryption (CSE)

Data encryption that occurs on the user's device before transmission to servers.

cybersecurity

Cloud Backup

Service that makes copies of data and stores them on remote servers for disaster recovery purposes.

Cloud Computing

Cloud Computing

The delivery of computing services over the internet, including servers, storage, databases, and software.

networking

Cloud Migration

The process of moving data, applications, or other business elements to a cloud computing environment.

Cloud Computing

Cloud Orchestration

Automated arrangement, coordination, and management of complex cloud systems and services.

Cloud Computing

Cloud Security

Policies, technologies, and controls deployed to protect data, applications, and infrastructure in cloud computing environments.

Cloud Computing

Cloud Storage

Online storage service that allows data to be stored and accessed over the internet.

Data Management

Cloud Storage

Online storage service allowing data to be stored, accessed, and managed in the cloud.

Cloud Computing

Code Repository

Storage location for managing source code and version history.

Software

Compliance Training

Educational programs ensuring staff understand compliance requirements and procedures.

compliance

Computer Vision

AI field enabling computers to understand and process visual information from images or videos.

emerging-tech

Configuration Management

Process of maintaining IT systems, products, and assets in a desired state.

it-services

Containerization

OS-level virtualization method for deploying and running distributed applications.

Software

Context-Aware Access

Security framework that adapts access controls based on the context of access requests.

cybersecurity

CRM Software

Customer Relationship Management software for managing customer interactions and data.

Software

Data Archiving

Moving data that is no longer actively used to a separate storage device for long-term retention.

Data Management

Data Classification

Process of organizing data by sensitivity level and business impact.

compliance

Data Governance

Framework for managing the availability, usability, integrity, and security of data.

Data Management

Data Integration

Process of combining data from different sources into a unified view.

Data Management

Data Lake

Storage repository that holds a vast amount of raw data in its native format.

Data Management

Data Lifecycle Management

Policy-based approach to managing the flow of data throughout its lifecycle.

Data Management

Data Mining

Process of discovering patterns and relationships in large data sets.

Data Management

Data Processing Agreement

Contract regulating the processing of personal data between parties.

compliance

Data Protection Impact Assessment

Process to identify and minimize data protection risks in projects.

compliance

Data Quality Management

Practice of maintaining high-quality information that is reliable, accurate, and accessible.

Data Management

Data Replication

Process of storing data in multiple locations to improve availability and accessibility.

Data Management

Data Visualization

Graphical representation of information and data using visual elements.

Data Management

Data Warehouse

A large storage system optimized for analysis and reporting of business data.

Data Management

Database Sharding

Method of splitting and storing a single logical dataset in multiple databases.

Data Management

DDoS Mitigation Services

Services designed to detect and filter out DDoS attack traffic while allowing legitimate traffic through.

cybersecurity

Dedicated Internet Access (DIA)

A dedicated line for internet access ensuring consistent bandwidth and performance.

isp

DevOps

Set of practices combining software development and IT operations.

Software

Digital Twin

Virtual representation of physical objects or processes for simulation and analysis.

emerging-tech

Direct Burial Cable

Cable specifically designed to be installed underground without additional conduit protection.

network-cabling

Disaster Recovery Plan

A documented process to recover and protect business IT infrastructure in case of a disaster.

Data Management

DNS (Domain Name System)

System that translates domain names into IP addresses.

misc

Edge Computing

Processing data near the edge of the network where it's generated instead of in a centralized location.

networking

Edge Computing

Computing infrastructure enabling data processing closer to the source of data generation.

emerging-tech

eDiscovery

Electronic discovery process of identifying and collecting electronic information for legal proceedings.

compliance

Endpoint Detection and Response (EDR)

Security solution monitoring end-user devices to detect and respond to cyber threats.

cybersecurity

Enterprise Trunking Solutions

Services connecting enterprise phone systems to the public telephone network via IP-based connections.

communication

ERP (Enterprise Resource Planning)

Software that manages day-to-day business activities like accounting and project management.

Software

ETL (Extract, Transform, Load)

Process of combining data from multiple sources into a large, centralized data store.

Data Management

Exchange Online

Cloud-hosted enterprise email, calendar, and contact management service.

microsoft-365

Extended Reality (XR)

Umbrella term for AR, VR, and mixed reality technologies.

emerging-tech

Fiber Optic Internet

A high-speed internet connection using fiber-optic cables to transmit data as light signals, offering higher bandwidth and lower latency.

isp

Fiber Optic Transceiver

Hardware converting optical signals to electrical signals and vice versa.

Hardware

File Sharing

Ability to share documents and files with other users through communication platforms.

communication

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

cybersecurity

Firewall Appliance

Dedicated hardware device providing network security protection.

Hardware

GDPR (General Data Protection Regulation)

EU regulation on data protection and privacy for all individuals within the EU and EEA.

compliance

Gmail for Business

Professional email service with custom domain support, enhanced security, and business features.

google-workspace

Google Admin Console

Central management interface for Google Workspace settings, users, and security policies.

google-workspace

Google Calendar

Scheduling and time-management application with resource booking and team calendar features.

google-workspace

Google Chat

Team messaging platform with direct messages, group conversations, and bot integrations.

google-workspace

Google Chat Spaces

Collaborative workspace for team messaging, file sharing, and project coordination.

communication

Google Cloud Search

Enterprise search tool providing unified search across Google Workspace and third-party services.

google-workspace

Google Docs

Cloud-based document creation and editing tool with real-time collaboration capabilities.

google-workspace

Google Drive Enterprise

Cloud storage and file sharing platform with advanced security and administration features.

google-workspace

Google Forms

Survey and data collection tool with automatic response gathering and analysis.

google-workspace

Google Groups for Business

Collaborative inbox and discussion forum tool for team communication and project management.

google-workspace

Google Keep

Note-taking service integrated with Google Workspace for capturing and sharing ideas.

google-workspace

Google Meet

Video conferencing solution supporting secure, high-quality virtual meetings and webinars.

google-workspace

Google Meet Companion Mode

Feature allowing users to join meetings using multiple devices for enhanced participation.

communication

Google Sheets

Online spreadsheet application with advanced data analysis and collaboration features.

google-workspace

Google Sites

Website creation tool for building internal and external websites without coding.

google-workspace

Google Slides

Presentation software enabling collaborative creation and sharing of professional presentations.

google-workspace

Google Vault

Information governance and eDiscovery tool for managing, retaining, and searching data.

google-workspace

Google Workspace

Cloud-based productivity and collaboration suite including Gmail, Docs, Drive, Meet, and more.

google-workspace

Google Workspace Enterprise Plus

Premium plan offering advanced security, management, and compliance features.

google-workspace

Google Workspace Essentials

Entry-level plan focusing on collaboration tools without email services.

google-workspace

Google Workspace Marketplace

Directory of third-party applications and integrations for Google Workspace.

google-workspace

Google Workspace Migrate

Tool for migrating content from legacy systems to Google Workspace applications.

google-workspace

Graphics Processing Unit (GPU)

Specialized processor designed to accelerate graphics rendering.

Hardware

Hard Disk Drive (HDD)

Data storage device using magnetic storage to store and retrieve digital data.

Hardware

Hardware Firewall

Physical device providing network security by filtering traffic.

Hardware

Help Desk Support

Technical support service providing assistance to users experiencing computer or IT-related problems.

it-services

HIPAA

US legislation providing data privacy and security provisions for safeguarding medical information.

compliance

HTTP (Hypertext Transfer Protocol)

Protocol for transmitting data over the World Wide Web.

misc

Hybrid Cloud

A computing environment combining on-premises infrastructure with public cloud services, allowing data and applications to be shared between them.

Cloud Computing

Incident Management

Process of responding to and resolving IT service disruptions to restore normal operations.

it-services

Incident Response Plan

Documented approach to addressing and managing security incidents.

compliance

Information Security Policy

Document defining rules and procedures for maintaining information security.

compliance

Infrastructure as a Service (IaaS)

Cloud-based services that provide virtualized computing resources over the internet.

Cloud Computing

Instant Messaging (IM)

Real-time text transmission over the Internet for immediate communication.

communication

Internet of Things (IoT)

Network of physical objects embedded with sensors, software, and connectivity to exchange data.

networking

Internet of Things (IoT)

Network of physical objects embedded with sensors and connectivity for data exchange.

emerging-tech

Internet Redundancy

Multiple internet connections from different providers to ensure continuous service if one connection fails.

isp

IP Address

Unique numerical identifier assigned to each device on a network.

misc

ISO 27001

International standard for information security management systems.

compliance

ISP (Internet Service Provider)

Company that provides Internet access to subscribers.

misc

IT Governance

Framework ensuring IT investments support business objectives.

it-services

ITIL (Information Technology Infrastructure Library)

Framework of best practices for delivering IT services and aligning them with business needs.

it-services

Knowledge Management

Process of creating, sharing, using, and managing IT knowledge and information.

it-services

KVM Switch

Hardware allowing control of multiple computers from single keyboard, video, and mouse.

Hardware

LAN (Local Area Network)

Network connecting computers within a limited area.

misc

Latency

Time delay between the initiation and execution of a process.

misc

Latency

The time it takes for data to travel from the source to the destination, measured in milliseconds (ms). Lower latency is essential for real-time applications.

isp

Layer 3 Switching

Network switching that operates at the network layer, combining routing and switching functions.

networking

LC Connector

Small form-factor fiber optic connector commonly used in high-density applications.

network-cabling

Live Transcription

Real-time conversion of spoken words into written text during meetings.

communication

Load Balancer

Hardware device distributing network traffic across multiple servers.

Hardware

Load Balancing

Distribution of network traffic across multiple servers to optimize resource utilization.

networking

Load Balancing

Distribution of workloads across multiple computing resources.

misc

Machine Learning

AI subset enabling systems to learn and improve from experience without explicit programming.

emerging-tech

Managed IT Services

Outsourced IT services where a provider manages and assumes responsibility for providing IT functions.

it-services

Master Data Management

Method of enabling an organization to link all critical data to a common point of reference.

Data Management

Meeting Analytics

Tools providing insights into meeting participation, engagement, and effectiveness.

communication

Meeting Recording

Capability to capture and store audio, video, and shared content from virtual meetings.

communication

Mesh Networking

A network topology where devices connect directly and cooperate to route data efficiently.

networking

Microservices Architecture

Software development approach structuring applications as collections of loosely coupled services.

Software

Microsoft 365

Cloud-based subscription service combining Office applications, cloud storage, and enterprise-grade security.

microsoft-365

Microsoft Bookings

Scheduling and appointment management tool for service-based businesses.

microsoft-365

Microsoft Compliance Manager

Tool for managing and tracking compliance requirements and controls.

microsoft-365

Microsoft Defender for Office 365

Advanced threat protection service safeguarding against sophisticated attacks.

microsoft-365

Microsoft Forms

Survey and quiz creation tool for gathering feedback and data collection.

microsoft-365

Microsoft Information Protection

Suite of tools for discovering, classifying, and protecting sensitive information.

microsoft-365

Microsoft Lists

Information tracking application for organizing work and managing data.

microsoft-365

Microsoft Loop

Collaborative application helping teams think, plan, and create together.

Software

Microsoft Planner

Task management tool for organizing teamwork and tracking project progress.

microsoft-365

Microsoft Power Apps

Low-code development platform for building custom business applications.

microsoft-365

Microsoft Stream

Enterprise video service for uploading, sharing, and managing video content.

microsoft-365

Microsoft Sway

Digital storytelling application for creating and sharing interactive reports and presentations.

microsoft-365

Microsoft Teams

Collaboration platform combining chat, video meetings, file storage, and application integration.

Software

Microsoft Teams

Collaboration platform integrating chat, video meetings, file storage, and application integration.

microsoft-365

Microsoft Teams Premium

Enhanced version of Teams with advanced meeting features and security options.

Software

Microsoft Teams Premium

Enhanced Teams platform offering advanced meeting features, security, and personalization options.

communication

Microsoft Teams Rooms

Meeting room solution integrating hardware and software for hybrid meetings.

microsoft-365

Microsoft To Do

Task management application for personal and professional task organization.

microsoft-365

Microsoft Viva

Employee experience platform integrating communications, knowledge, learning, and insights.

Software

Microsoft Viva

Employee experience platform combining communications, knowledge, learning, and insights.

microsoft-365

Microsoft Whiteboard

Digital canvas for collaborative brainstorming and visual content creation.

microsoft-365

Motherboard

Main circuit board connecting and enabling communication between crucial components.

Hardware

MPO/MTP Connector

High-density fiber optic connector supporting multiple fiber strands, used in data center applications.

network-cabling

Multi-Cloud Strategy

Using multiple cloud computing services from different providers to optimize resources and reduce dependency on a single vendor.

Cloud Computing

Multi-Factor Authentication (MFA)

A security system that requires multiple forms of verification before granting access, such as a password combined with a fingerprint scan or a one-time code.

authentication

Multi-mode Fiber

Fiber optic cable using multiple light paths, suitable for shorter distances up to 400m, commonly used in data centers.

network-cabling

Natural Language Processing (NLP)

AI technology enabling computers to understand and process human language.

emerging-tech

Network Access Control (NAC)

Security solution enforcing policy on devices before they're granted network access.

cybersecurity

Network Attached Storage (NAS)

Storage device connected to a network providing file-level data access.

Hardware

Network Bridge

Hardware connecting multiple network segments at data link layer.

Hardware

Network Cable Tester

Device verifying proper installation and functionality of network cables.

Hardware

Network Card

Hardware component enabling network connectivity in computers.

Hardware

Network Gateway

Hardware device serving as entrance to another network.

Hardware

Network Interface Card (NIC)

Hardware component enabling computer connection to a network.

Hardware

Network Latency

The time delay between the sending and receiving of data packets across a network.

networking

Network Monitoring

The continuous observation and analysis of network performance and security.

networking

Network Redundancy

The process of providing alternative paths for network traffic in case of component failure.

networking

Network Segmentation

Division of a network into smaller, isolated segments for improved security and performance.

networking

Network Switch

Hardware connecting devices in a computer network.

Hardware

Neural Networks

Computing systems inspired by biological neural networks for machine learning.

emerging-tech

NIST Framework

Guidelines for managing and reducing cybersecurity risk.

compliance

OM4 Fiber

Laser-optimized multi-mode fiber supporting 100 Gbps over 150m, ideal for high-speed data center applications.

network-cabling

OneDrive for Business

Cloud storage service providing secure file sharing and synchronization capabilities.

microsoft-365

Patch Management

Process of distributing and applying updates to software applications.

Software

Patch Panel

Hardware assembly mounting connecting hardware for network cables.

Hardware

Patch Panel

Hardware unit that organizes and manages network cable connections, typically mounted in a rack.

network-cabling

PCI DSS

Payment Card Industry Data Security Standard for organizations handling credit card information.

compliance

Penetration Testing

Authorized simulated cyberattack to evaluate the security of a computer system.

cybersecurity

Phishing

Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.

cybersecurity

Platform as a Service (PaaS)

Cloud services offering hardware and software tools over the internet, typically for application development.

Cloud Computing

Plenum-Rated Cable

Cable designed for use in plenum spaces, featuring fire-resistant properties and low smoke emission.

network-cabling

Power Automate

Cloud-based service for creating automated workflows between applications and services.

Software

Power Automate

Workflow automation service for creating automated processes between applications.

microsoft-365

Power BI

Microsoft's business analytics service for interactive visualizations and business intelligence.

Data Management

Power Distribution Unit (PDU)

Device fitting multiple power outlets providing power to electronic equipment.

Hardware

Power over Ethernet (PoE)

Technology enabling network cables to carry electrical power to network devices.

networking

Power Supply Unit (PSU)

Hardware component converting power for computer system components.

Hardware

Predictive Analytics

Technology using data, statistical algorithms, and machine learning to identify future outcomes.

emerging-tech

Presence Information

Real-time indication of a user's availability status in communication systems.

communication

Privacy Impact Assessment

Analysis of how personally identifiable information is collected and protected.

compliance

Problem Management

Process of identifying and managing the causes of incidents in IT services.

it-services

Project Management

Planning, organizing, and managing resources to achieve specific IT project goals.

it-services

Protocol

Set of rules governing data communication between devices.

misc

Proxy Server

Server acting as an intermediary for requests between clients and other servers.

misc

QoS (Quality of Service)

Control mechanism for ensuring performance levels for critical applications.

misc

Quality of Service (QoS)

The ability to prioritize different types of network traffic to ensure performance for critical applications.

networking

Quality of Service (QoS)

Network settings that prioritize critical business applications and traffic over less important data.

isp

Quantum Computing

Computing using quantum-mechanical phenomena for processing power beyond classical computers.

emerging-tech

RAID (Redundant Array of Independent Disks)

Data storage technology combining multiple disk drives.

misc

RAID Array

Data storage virtualization technology combining multiple disk drives.

Hardware

RAID Controller

Hardware managing multiple disk drives for redundancy or performance.

Hardware

Random Access Memory (RAM)

High-speed volatile memory providing quick data access for active programs.

Hardware

Ransomware

A type of malicious software that encrypts files and demands payment for decryption keys.

cybersecurity

Records Retention

Policy defining how long organizations must keep records and documents.

compliance

Regulatory Compliance

Adherence to laws, regulations, guidelines, and specifications relevant to business processes.

compliance

Release Management

Process of managing, planning, and controlling software builds through different stages.

it-services

Risk Assessment

Process of identifying and evaluating potential risks to information systems.

compliance

RJ45 Connector

Standard connector for twisted pair Ethernet cables, featuring eight pins for data transmission.

network-cabling

Robotic Process Automation (RPA)

Technology automating repetitive tasks through software robots or artificial intelligence workers.

emerging-tech

Router

Networking device forwarding data packets between computer networks.

Hardware

SaaS (Software as a Service)

Software delivery model where applications are hosted and licensed on a subscription basis.

Software

Scalability

Ability of a system to handle growing amounts of work.

misc

Screen Sharing

Feature allowing users to broadcast their screen content to other meeting participants.

communication

SD-WAN

Software-defined networking technology applied to WAN connections for improved performance and management.

networking

Security Information and Event Management (SIEM)

System providing real-time analysis of security alerts generated by applications and network hardware.

cybersecurity

Security Operations Center (SOC)

Facility housing security analysts who monitor, analyze, and respond to cybersecurity incidents.

cybersecurity

Security Orchestration and Response (SOAR)

Solutions that combine security orchestration, automation and incident response functionality.

cybersecurity

Security Token

Physical device used to prove identity electronically, often as part of two-factor authentication.

cybersecurity

Server

Computer hardware designed to process requests and deliver data to other computers.

Hardware

Server Rack

Framework for mounting multiple hardware devices in an organized manner.

Hardware

Service Catalog

Organized list of all IT services available to customers or employees.

it-services

Service Desk

Single point of contact between service providers and users for IT-related issues.

it-services

Service Level Agreement (SLA)

Contract between service providers and clients defining expected service levels and performance metrics.

it-services

Service Level Agreement (SLA)

A contract defining the expected level of service, including uptime guarantees, response times, and performance metrics.

isp

Service Portfolio Management

Method for managing all IT services throughout their lifecycle.

it-services

SharePoint Online

Cloud-based platform for creating websites, storing documents, and sharing information securely.

microsoft-365

Shielded Cable (STP)

Twisted pair cable with additional metallic shielding to protect against electromagnetic interference.

network-cabling

Single-mode Fiber

Fiber optic cable using a single light path, ideal for long-distance transmission up to 100km.

network-cabling

Smart Contracts

Self-executing contracts with terms directly written into code.

emerging-tech

SOC 2

Auditing procedure ensuring service providers securely manage customer data.

compliance

Software as a Service (SaaS)

Software distribution model where applications are hosted by a service provider and made available to customers over the internet.

Cloud Computing

Software License Management

Process of controlling and documenting software licensing in an organization.

Software

Software-Defined Networking (SDN)

An approach to networking that uses software-based controllers to direct traffic.

networking

SQL (Structured Query Language)

Standard language for managing and manipulating relational databases.

Data Management

SSD (Solid State Drive)

Storage device using integrated circuit assemblies to store data persistently.

Hardware

SSL/TLS

Protocols providing secure communication over a computer network.

misc

Static IP Address

A fixed IP address that doesn't change, essential for hosting servers or remote access solutions.

isp

Storage Area Network (SAN)

Dedicated high-speed network providing block-level network access to storage.

Hardware

Structured Cabling

Standardized approach to building network infrastructure using organized cabling and associated hardware.

network-cabling

Symmetric Internet

Internet connection providing equal upload and download speeds, ideal for business applications.

isp

Tape Drive

Data storage device reading and writing data on magnetic tape.

Hardware

TCP/IP

Core protocols of the Internet Protocol suite.

misc

Test Automation

Use of software to execute tests and compare actual outcomes with predicted outcomes.

Software

Throughput

Actual amount of data successfully transferred through a network.

misc

Together Mode in Teams

AI-powered feature placing meeting participants in shared virtual spaces.

communication

Twisted Pair Cable

Cabling where pairs of wires are twisted together to reduce electromagnetic interference, commonly used in Ethernet networks.

network-cabling

Two-Factor Authentication (2FA)

An extra layer of security requiring two different forms of verification before granting access.

cybersecurity

UniFi Access

A secure access control system with touch-screen readers, integrated video for entry/exit events, multi-tenant intercom systems, and flexible mobile credentials.

unifi-solutions

UniFi Building-to-Building Bridge

Point-to-point wireless bridge solution for connecting separate network locations.

unifi-solutions

UniFi Cloud Gateways

All-in-one solutions combining advanced routing, security features, and the capability to manage UniFi applications, ideal for large-scale deployments.

unifi-solutions

UniFi Connect

An enterprise platform for managing digital signage, EV charging stations, building-wide lighting, and display content with centralized control.

unifi-solutions

UniFi Design Center

A visualization and planning tool that allows users to simulate a complete UniFi system for network optimization.

unifi-solutions

UniFi Door Access Hub

Central controller for UniFi Access door control system managing multiple access points.

unifi-solutions

UniFi Dream Machine Pro (UDM Pro)

Enterprise-grade network appliance with integrated security gateway, network controller, and NVR capabilities.

unifi-solutions

UniFi Dream Router (UDR)

All-in-one networking device combining a router, switch, access point, and network controller.

unifi-solutions

UniFi Dream Wall

Wall-mounted network appliance combining security gateway, PoE switch, and network controller functionality.

unifi-solutions

UniFi Enterprise XG Gateway

High-performance security gateway supporting 10G WAN connectivity and advanced routing features.

unifi-solutions

UniFi Network

A networking solution integrating internet gateways with scalable Wi-Fi and switching capabilities, providing real-time traffic dashboards and optimization tips.

unifi-solutions

UniFi Network Controller

Software interface for managing and monitoring UniFi network devices and configurations.

unifi-solutions

UniFi Protect

An AI-driven camera platform for local video storage, featuring smart detection, customizable recording schedules, and flexible notification settings.

unifi-solutions

UniFi SmartPower PDU

Intelligent power distribution unit with remote monitoring and control capabilities.

unifi-solutions

UniFi Talk

A plug-and-play VoIP system for small and medium businesses, including advanced call routing and administrative features with touchscreen phones.

unifi-solutions

Unified Communications

Integration of enterprise communication services like instant messaging, voice, video, and presence information.

communication

Unified Communications as a Service (UCaaS)

Cloud-delivered unified communications model that supports six main functions: enterprise telephony, meetings, unified messaging, instant messaging, mobility, and communications-enabled business processes.

communication

Unified Threat Management (UTM)

An integrated security solution combining multiple security features like firewall, antivirus, and intrusion detection.

cybersecurity

Uninterruptible Power Supply (UPS)

Battery backup providing temporary power during outages.

Hardware

Unshielded Cable (UTP)

Twisted pair cable without additional shielding, commonly used in office environments.

network-cabling

URL (Uniform Resource Locator)

Reference to a web resource specifying its location on a network.

misc

Vendor Management

Process of managing third-party service providers and suppliers.

it-services

Version Control

System for tracking and managing changes to software code.

Software

Video Conferencing

Real-time video communication between two or more participants.

communication

Virtual Breakout Rooms

Feature allowing meeting hosts to split participants into smaller groups for focused discussions.

communication

Virtual Private Network (VPN)

A secure, encrypted connection over a less secure network, typically the internet.

networking

Virtual Reality (VR)

Computer-generated simulation of a three-dimensional environment for interactive user experience.

emerging-tech

VLAN (Virtual Local Area Network)

A logical grouping of network devices that allows them to communicate as if they were on the same physical network.

networking

VoIP (Voice over Internet Protocol)

Technology enabling voice calls using Internet Protocol networks.

communication

Vulnerability Scanner

Tool that assesses computers, networks or applications for known vulnerabilities.

cybersecurity

WAN (Wide Area Network)

Network extending over a large geographical area.

misc

Web Conferencing

Online service for hosting virtual meetings, presentations, and collaborations in real-time.

communication

Wi-Fi 6

The latest generation of Wi-Fi technology (802.11ax) offering improved speed and efficiency.

networking

Wi-Fi 7

Next-generation Wi-Fi standard (802.11be) promising significantly higher speeds and lower latency.

networking

Wireless Access Point

Networking hardware device enabling Wi-Fi connection to a wired network.

Hardware

Workstation

Computer designed for technical or scientific applications.

misc

Zero Trust Architecture

Security concept requiring verification from everyone trying to access network resources.

emerging-tech

Zero Trust Architecture

A security model that operates on the principle of 'never trust, always verify,' requiring strict identity verification for every person and device attempting to access resources, regardless of their location within or outside the network.

authentication

Zero Trust Security Model

Security concept requiring strict identity verification for every person and device attempting to access resources.

cybersecurity

Zero-Day Vulnerability

A software security flaw unknown to the vendor that can be exploited before a patch is available.

cybersecurity