Search and explore common IT and cybersecurity terms
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Programs designed to detect, prevent, and remove malicious software (malware) from computers and networks.
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communication.
A type of malicious software that encrypts files and demands payment for decryption keys.
An extra layer of security requiring two different forms of verification before granting access.
A software security flaw unknown to the vendor that can be exploited before a patch is available.
A category of security solutions that defend against sophisticated malware and cyber attacks.
Data encryption that occurs on the user's device before transmission to servers.
Security framework that adapts access controls based on the context of access requests.
Security concept requiring strict identity verification for every person and device attempting to access resources.
Services designed to detect and filter out DDoS attack traffic while allowing legitimate traffic through.
An integrated security solution combining multiple security features like firewall, antivirus, and intrusion detection.
System providing real-time analysis of security alerts generated by applications and network hardware.
Authorized simulated cyberattack to evaluate the security of a computer system.
Security solution monitoring end-user devices to detect and respond to cyber threats.
Solutions that combine security orchestration, automation and incident response functionality.
Security solution enforcing policy on devices before they're granted network access.
Physical device used to prove identity electronically, often as part of two-factor authentication.
Tool that assesses computers, networks or applications for known vulnerabilities.
Facility housing security analysts who monitor, analyze, and respond to cybersecurity incidents.
A secure, encrypted connection over a less secure network, typically the internet.
The maximum rate of data transfer across a network path.
The delivery of computing services over the internet, including servers, storage, databases, and software.
Network of physical objects embedded with sensors, software, and connectivity to exchange data.
The latest generation of Wi-Fi technology (802.11ax) offering improved speed and efficiency.
Next-generation Wi-Fi standard (802.11be) promising significantly higher speeds and lower latency.
A network topology where devices connect directly and cooperate to route data efficiently.
An approach to networking that uses software-based controllers to direct traffic.
Processing data near the edge of the network where it's generated instead of in a centralized location.
The incorporation of fifth-generation cellular network technology into existing network infrastructure.
The time delay between the sending and receiving of data packets across a network.
The ability to prioritize different types of network traffic to ensure performance for critical applications.
The process of providing alternative paths for network traffic in case of component failure.
Distribution of network traffic across multiple servers to optimize resource utilization.
A logical grouping of network devices that allows them to communicate as if they were on the same physical network.
Software-defined networking technology applied to WAN connections for improved performance and management.
The continuous observation and analysis of network performance and security.
Division of a network into smaller, isolated segments for improved security and performance.
Technology enabling network cables to carry electrical power to network devices.
Network switching that operates at the network layer, combining routing and switching functions.
The process of creating copies of data to protect against loss.
A documented process to recover and protect business IT infrastructure in case of a disaster.
Extremely large data sets that can be analyzed to reveal patterns and trends.
A large storage system optimized for analysis and reporting of business data.
Standard language for managing and manipulating relational databases.
Process of discovering patterns and relationships in large data sets.
Online storage service that allows data to be stored and accessed over the internet.
Framework for managing the availability, usability, integrity, and security of data.
Technologies and practices for collecting, integrating, analyzing, and presenting business information.
Microsoft's business analytics service for interactive visualizations and business intelligence.
Storage repository that holds a vast amount of raw data in its native format.
Process of combining data from multiple sources into a large, centralized data store.
Process of storing data in multiple locations to improve availability and accessibility.
Moving data that is no longer actively used to a separate storage device for long-term retention.
Method of enabling an organization to link all critical data to a common point of reference.
Policy-based approach to managing the flow of data throughout its lifecycle.
Method of splitting and storing a single logical dataset in multiple databases.
Graphical representation of information and data using visual elements.
Practice of maintaining high-quality information that is reliable, accurate, and accessible.
Process of combining data from different sources into a unified view.
Software delivery model where applications are hosted and licensed on a subscription basis.
Customer Relationship Management software for managing customer interactions and data.
Software that manages day-to-day business activities like accounting and project management.
Process of distributing and applying updates to software applications.
Set of protocols and tools for building software applications and enabling their interaction.
System for tracking and managing changes to software code.
Iterative approach to software development emphasizing flexibility and customer satisfaction.
Set of practices combining software development and IT operations.
OS-level virtualization method for deploying and running distributed applications.
Collaboration platform combining chat, video meetings, file storage, and application integration.
Enhanced version of Teams with advanced meeting features and security options.
Employee experience platform integrating communications, knowledge, learning, and insights.
Cloud-based service for creating automated workflows between applications and services.
Collaborative application helping teams think, plan, and create together.
Software development approach structuring applications as collections of loosely coupled services.
Combined practices of continuous integration and continuous delivery in software development.
Use of software to execute tests and compare actual outcomes with predicted outcomes.
Storage location for managing source code and version history.
Process of controlling and documenting software licensing in an organization.
Tools and practices for tracking application performance and user experience.
Outsourced IT services where a provider manages and assumes responsibility for providing IT functions.
Contract between service providers and clients defining expected service levels and performance metrics.
Technical support service providing assistance to users experiencing computer or IT-related problems.
Framework of best practices for delivering IT services and aligning them with business needs.
Policy allowing employees to use personal devices for work purposes.
Process of responding to and resolving IT service disruptions to restore normal operations.
Structured approach to transitioning individuals, teams, and organizations to a desired future state.
Planning, organizing, and managing resources to achieve specific IT project goals.
Process of managing third-party service providers and suppliers.
Systematic approach to governing and maintaining IT assets throughout their lifecycle.
Process of determining IT resources needed to meet future demands.
Organized list of all IT services available to customers or employees.
Process of identifying and managing the causes of incidents in IT services.
Process of creating, sharing, using, and managing IT knowledge and information.
Process of maintaining IT systems, products, and assets in a desired state.
Process of managing, planning, and controlling software builds through different stages.
Single point of contact between service providers and users for IT-related issues.
Framework ensuring IT investments support business objectives.
Creating systems of prevention and recovery from potential IT threats.
Method for managing all IT services throughout their lifecycle.
Computer systems capable of performing tasks that typically require human intelligence.
AI subset enabling systems to learn and improve from experience without explicit programming.
Distributed ledger technology providing secure, decentralized record-keeping of transactions.
Technology overlaying digital information onto the real world environment.
Computer-generated simulation of a three-dimensional environment for interactive user experience.
Fifth generation of cellular network technology offering higher speeds and lower latency.
Computing using quantum-mechanical phenomena for processing power beyond classical computers.
Technology automating repetitive tasks through software robots or artificial intelligence workers.
Computing infrastructure enabling data processing closer to the source of data generation.
Network of physical objects embedded with sensors and connectivity for data exchange.
Virtual representation of physical objects or processes for simulation and analysis.
AI technology enabling computers to understand and process human language.
AI field enabling computers to understand and process visual information from images or videos.
Umbrella term for AR, VR, and mixed reality technologies.
Computing systems inspired by biological neural networks for machine learning.
Self-governing systems capable of operating without human intervention.
Technology measuring and analyzing human physical and behavioral characteristics.
Self-executing contracts with terms directly written into code.
Technology using data, statistical algorithms, and machine learning to identify future outcomes.
Security concept requiring verification from everyone trying to access network resources.
EU regulation on data protection and privacy for all individuals within the EU and EEA.
US legislation providing data privacy and security provisions for safeguarding medical information.
Payment Card Industry Data Security Standard for organizations handling credit card information.
International standard for information security management systems.
Auditing procedure ensuring service providers securely manage customer data.
Law enhancing privacy rights and consumer protection for California residents.
Guidelines for managing and reducing cybersecurity risk.
Process to identify and minimize data protection risks in projects.
Electronic discovery process of identifying and collecting electronic information for legal proceedings.
Policy defining how long organizations must keep records and documents.
Analysis of how personally identifiable information is collected and protected.
Contract regulating the processing of personal data between parties.
Adherence to laws, regulations, guidelines, and specifications relevant to business processes.
Chronological record providing documentary evidence of system activities.
Document defining rules and procedures for maintaining information security.
Process of organizing data by sensitivity level and business impact.
Rules and procedures governing access to information systems.
Documented approach to addressing and managing security incidents.
Process of identifying and evaluating potential risks to information systems.
Educational programs ensuring staff understand compliance requirements and procedures.
Technology enabling voice calls using Internet Protocol networks.
Integration of enterprise communication services like instant messaging, voice, video, and presence information.
Online service for hosting virtual meetings, presentations, and collaborations in real-time.
Feature allowing users to join meetings using multiple devices for enhanced participation.
Collaborative workspace for team messaging, file sharing, and project coordination.
Enhanced Teams platform offering advanced meeting features, security, and personalization options.
AI-powered feature placing meeting participants in shared virtual spaces.
Cloud-delivered unified communications model that supports six main functions: enterprise telephony, meetings, unified messaging, instant messaging, mobility, and communications-enabled business processes.
Services connecting enterprise phone systems to the public telephone network via IP-based connections.
Personal scheduling service allowing others to book time with you based on your availability.
Real-time video communication between two or more participants.
Real-time text transmission over the Internet for immediate communication.
Feature allowing users to broadcast their screen content to other meeting participants.
Real-time indication of a user's availability status in communication systems.
Feature allowing meeting hosts to split participants into smaller groups for focused discussions.
Real-time conversion of spoken words into written text during meetings.
Capability to capture and store audio, video, and shared content from virtual meetings.
Ability to share documents and files with other users through communication platforms.
Searchable archive of past instant messages and conversations.
Tools providing insights into meeting participation, engagement, and effectiveness.
Storage device using integrated circuit assemblies to store data persistently.
Hardware component enabling computer connection to a network.
Data storage virtualization technology combining multiple disk drives.
Framework for mounting multiple hardware devices in an organized manner.
Dedicated hardware device providing network security protection.
Hardware device distributing network traffic across multiple servers.
Hardware connecting devices in a computer network.
Networking device forwarding data packets between computer networks.
Networking hardware device enabling Wi-Fi connection to a wired network.
Hardware device serving as entrance to another network.
Computer hardware designed to process requests and deliver data to other computers.
Dedicated high-speed network providing block-level network access to storage.
Data storage device reading and writing data on magnetic tape.
Storage device connected to a network providing file-level data access.
Device fitting multiple power outlets providing power to electronic equipment.
Hardware allowing control of multiple computers from single keyboard, video, and mouse.
Device verifying proper installation and functionality of network cables.
Hardware assembly mounting connecting hardware for network cables.
Physical device providing network security by filtering traffic.
Hardware connecting multiple network segments at data link layer.
Data storage device using magnetic storage to store and retrieve digital data.
Specialized processor designed to accelerate graphics rendering.
Primary processor executing instructions of a computer program.
High-speed volatile memory providing quick data access for active programs.
Main circuit board connecting and enabling communication between crucial components.
Hardware component converting power for computer system components.
Hardware component enabling network connectivity in computers.
Hardware managing multiple disk drives for redundancy or performance.
Battery backup providing temporary power during outages.
Hardware converting optical signals to electrical signals and vice versa.
All-in-one solutions combining advanced routing, security features, and the capability to manage UniFi applications, ideal for large-scale deployments.
A networking solution integrating internet gateways with scalable Wi-Fi and switching capabilities, providing real-time traffic dashboards and optimization tips.
An AI-driven camera platform for local video storage, featuring smart detection, customizable recording schedules, and flexible notification settings.
A secure access control system with touch-screen readers, integrated video for entry/exit events, multi-tenant intercom systems, and flexible mobile credentials.
A plug-and-play VoIP system for small and medium businesses, including advanced call routing and administrative features with touchscreen phones.
An enterprise platform for managing digital signage, EV charging stations, building-wide lighting, and display content with centralized control.
A visualization and planning tool that allows users to simulate a complete UniFi system for network optimization.
All-in-one networking device combining a router, switch, access point, and network controller.
Enterprise-grade network appliance with integrated security gateway, network controller, and NVR capabilities.
Wall-mounted network appliance combining security gateway, PoE switch, and network controller functionality.
High-performance security gateway supporting 10G WAN connectivity and advanced routing features.
Point-to-point wireless bridge solution for connecting separate network locations.
Intelligent power distribution unit with remote monitoring and control capabilities.
Central controller for UniFi Access door control system managing multiple access points.
Software interface for managing and monitoring UniFi network devices and configurations.
The maximum rate of data transfer across a network connection.
Temporary storage area that provides fast access to frequently used data.
System that translates domain names into IP addresses.
Protocol for transmitting data over the World Wide Web.
Unique numerical identifier assigned to each device on a network.
Company that provides Internet access to subscribers.
Network connecting computers within a limited area.
Time delay between the initiation and execution of a process.
Distribution of workloads across multiple computing resources.
Set of rules governing data communication between devices.
Server acting as an intermediary for requests between clients and other servers.
Control mechanism for ensuring performance levels for critical applications.
Data storage technology combining multiple disk drives.
Ability of a system to handle growing amounts of work.
Protocols providing secure communication over a computer network.
Core protocols of the Internet Protocol suite.
Actual amount of data successfully transferred through a network.
Reference to a web resource specifying its location on a network.
Network extending over a large geographical area.
Computer designed for technical or scientific applications.
Cloud-based productivity and collaboration suite including Gmail, Docs, Drive, Meet, and more.
Professional email service with custom domain support, enhanced security, and business features.
Cloud storage and file sharing platform with advanced security and administration features.
Video conferencing solution supporting secure, high-quality virtual meetings and webinars.
Scheduling and time-management application with resource booking and team calendar features.
Cloud-based document creation and editing tool with real-time collaboration capabilities.
Online spreadsheet application with advanced data analysis and collaboration features.
Presentation software enabling collaborative creation and sharing of professional presentations.
Survey and data collection tool with automatic response gathering and analysis.
Website creation tool for building internal and external websites without coding.
Team messaging platform with direct messages, group conversations, and bot integrations.
Information governance and eDiscovery tool for managing, retaining, and searching data.
Enterprise search tool providing unified search across Google Workspace and third-party services.
Central management interface for Google Workspace settings, users, and security policies.
Tool for migrating content from legacy systems to Google Workspace applications.
Note-taking service integrated with Google Workspace for capturing and sharing ideas.
Collaborative inbox and discussion forum tool for team communication and project management.
Directory of third-party applications and integrations for Google Workspace.
Entry-level plan focusing on collaboration tools without email services.
Premium plan offering advanced security, management, and compliance features.
Cloud-based subscription service combining Office applications, cloud storage, and enterprise-grade security.
Collaboration platform integrating chat, video meetings, file storage, and application integration.
Cloud-based platform for creating websites, storing documents, and sharing information securely.
Cloud-hosted enterprise email, calendar, and contact management service.
Cloud storage service providing secure file sharing and synchronization capabilities.
Task management tool for organizing teamwork and tracking project progress.
Survey and quiz creation tool for gathering feedback and data collection.
Workflow automation service for creating automated processes between applications.
Information tracking application for organizing work and managing data.
Enterprise video service for uploading, sharing, and managing video content.
Scheduling and appointment management tool for service-based businesses.
Task management application for personal and professional task organization.
Digital canvas for collaborative brainstorming and visual content creation.
Digital storytelling application for creating and sharing interactive reports and presentations.
Low-code development platform for building custom business applications.
Advanced threat protection service safeguarding against sophisticated attacks.
Suite of tools for discovering, classifying, and protecting sensitive information.
Tool for managing and tracking compliance requirements and controls.
Meeting room solution integrating hardware and software for hybrid meetings.
Employee experience platform combining communications, knowledge, learning, and insights.
The process of verifying the identity of a user, device, or system, typically through passwords, biometrics, or security tokens.
Determining the access rights or privileges of a user or system, specifying what resources they can access and what actions they can perform.
A security system that requires multiple forms of verification before granting access, such as a password combined with a fingerprint scan or a one-time code.
A security model that operates on the principle of 'never trust, always verify,' requiring strict identity verification for every person and device attempting to access resources, regardless of their location within or outside the network.
Cloud-based services that provide virtualized computing resources over the internet.
Cloud services offering hardware and software tools over the internet, typically for application development.
Software distribution model where applications are hosted by a service provider and made available to customers over the internet.
A computing environment combining on-premises infrastructure with public cloud services, allowing data and applications to be shared between them.
The process of moving data, applications, or other business elements to a cloud computing environment.
Policies, technologies, and controls deployed to protect data, applications, and infrastructure in cloud computing environments.
Using multiple cloud computing services from different providers to optimize resources and reduce dependency on a single vendor.
Service that makes copies of data and stores them on remote servers for disaster recovery purposes.
Online storage service allowing data to be stored, accessed, and managed in the cloud.
Automated arrangement, coordination, and management of complex cloud systems and services.
Cabling where pairs of wires are twisted together to reduce electromagnetic interference, commonly used in Ethernet networks.
Enhanced Category 5 cabling supporting data rates up to 1 Gbps over 100 meters, commonly used in Ethernet networks.
Category 6 cabling supporting up to 10 Gbps over short distances (up to 55m) and 1 Gbps over 100m, with improved specifications over Cat5e.
Augmented Category 6 cabling supporting 10 Gbps speeds over the full 100m distance, with improved alien crosstalk specifications.
Category 7 cabling supporting up to 40 Gbps over 50m and 100 Gbps over 15m, featuring fully shielded cable design.
Category 8 cabling supporting up to 40 Gbps over 30m, designed for high-speed data center applications.
Fiber optic cable using a single light path, ideal for long-distance transmission up to 100km.
Fiber optic cable using multiple light paths, suitable for shorter distances up to 400m, commonly used in data centers.
Laser-optimized multi-mode fiber supporting 100 Gbps over 150m, ideal for high-speed data center applications.
Cable designed for use in plenum spaces, featuring fire-resistant properties and low smoke emission.
Twisted pair cable with additional metallic shielding to protect against electromagnetic interference.
Twisted pair cable without additional shielding, commonly used in office environments.
Cable specifically designed to be installed underground without additional conduit protection.
Hardware unit that organizes and manages network cable connections, typically mounted in a rack.
System for organizing and protecting network cables to maintain proper airflow and accessibility.
Standard connector for twisted pair Ethernet cables, featuring eight pins for data transmission.
Small form-factor fiber optic connector commonly used in high-density applications.
High-density fiber optic connector supporting multiple fiber strands, used in data center applications.
Process of testing and verifying that installed cabling meets industry standards and specifications.
Standardized approach to building network infrastructure using organized cabling and associated hardware.
The maximum rate at which data can be transferred over an internet connection, typically measured in Mbps or Gbps.
The time it takes for data to travel from the source to the destination, measured in milliseconds (ms). Lower latency is essential for real-time applications.
A contract defining the expected level of service, including uptime guarantees, response times, and performance metrics.
A high-speed internet connection using fiber-optic cables to transmit data as light signals, offering higher bandwidth and lower latency.
A dedicated line for internet access ensuring consistent bandwidth and performance.
Specialized internet service packages designed for commercial use with enhanced reliability and support.
Internet connection providing equal upload and download speeds, ideal for business applications.
Multiple internet connections from different providers to ensure continuous service if one connection fails.
A fixed IP address that doesn't change, essential for hosting servers or remote access solutions.
Network settings that prioritize critical business applications and traffic over less important data.