Glossary
From A to Z, we have gathered some of the industry's most common IT and network terminology.
2FA - Two-Factor Authentication. Also known as Two-Step Verification, Two-Step Authentication, or Multi-Factor Authentication (MFA). An extra step added to the log-in process, such as a code sent to your phone, that helps verify your identity and prevent your private information from being accessed.
3G - is defined as the 3rd generation of mobile phone and data communication standards,
featuring higher bandwidth for web-based applications and video. An example of 3G is the cell network that is used for many iPhones in the US and abroad.
4G - is defined as the 4th generation of mobile phone and data communication standards with even greater data-transfer rates than 3G.
5G - A mobile communications standard intended to replace 4G, allowing wireless internet access at a much higher speed.
AEP - Advanced Endpoint Protection. An AEP product is one that provides automatic threat prevention and threat event reporting capabilities for every endpoint system it protects.
AI - Artificial Intelligence. A technology that mimics human intelligence to perform tasks and improve based on the information it collects.
AP - Access point. A networking hardware device that acts as a communication hub for users of a wireless device to connect to a wireless LAN
API - Application Programming Interface. An API is a set of programming code that enables data transmission between one software product and another.
APK - Android Application Package. A file format required to distribute Android apps.
APN - Access Point Network. An APN directly connects users to the Internet and adding a specific APN to your device's browser lets you connect to the external network with which it is associated.
Activesync - A proprietary protocol that syncs your mobile device with your Exchange mailbox, so you can access your email, calendar, contacts, tasks, etc.
App Builder - A tool for users to create apps without the need for programming.
App Wrapping Protecting - enterprise information on mobile devices with a security and management layer.
Architecture - A series of principles, guidelines or rules that describes the practice of organizing and integrating computer systems.
BYOD - Bring Your Own Device. An ownership model for organizations where employees can use their own personal mobile device for work tasks like accessing their work mail, apps, etc. without compromising security.
CAS - Central Authentication Service. CAS is a single sign-on protocol for the web. Its purpose is to permit a user to access multiple applications while providing their credentials (such as user ID and password) only once.
CASB - Cloud Access Security Broker. CASB is an on-premises or cloud-based software that will act as an intermediary between the endpoints (e.g., a mobile app/device) and SaaS applications (e.g., Office 365, Salesforce.com, etc.). The CASB monitors traffic and allows organizations to enforce data protection and access control policies.
CMS - Content Management System. Software that, in one central system, enables the publication, modification, and organisation of content.
COBO - Corporate-Owned Business Only. An ownership model for organizations where full control over devices and data is required with little-to-no room for private usage – typically for regulated environments like government.
COPE - Company-Owned Personally-Enabled. An ownership model where the device belongs to the company and work data is stored, but the device is also enterprise-managed/controlled and leaves the user with a wall-garden for their private apps and data.
CRM System - Customer Relationship Management System. Allowing for the management, improvement, and support of lead-generation, sales, support, and interactions.
CSS - Cascading Style Sheets. Used alongside HTML, it allows for the designing and styling of web pages and hybrid mobile apps.
​
CUI – Controlled Unclassified Information. CUI is information that government agencies have deemed worthy of protection.
CYOD - Choose Your Own Device. Allowing employees to choose the device they would like to use.
Carrier - A carrier is a company that provides mobile services.
Cloud - Refers to a vast network of remote servers around the globe which are hooked together and meant to operate as a single ecosystem.
Cloud Computing - A model for delivering information technology services where resources are retrieved from the internet through web-based tools.
Configuration - The arrangement or set-up of the hardware and software that make up a computer system.
Containerization - App wrapping creates containers. Containers manage and secure apps.
​
Cybersecurity - The practice of protecting critical systems and sensitive information from digital attacks.
​
DNS - Domain Name Server. The system that automatically translates internet addresses to the numeric machine addresses that computers use.
DR - Disaster Recovery. A disaster recovery plan is a set of policies, tools, and procedures to enable the recovery or continuation of vital technology infrastructure and systems following unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events.
EDR - Endpoint Detection and Response. Also known as endpoint threat detection and response (ETDR). An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.
EFSS - Enterprise File Sync and Share. EFSS refers to software services that enable organizations to securely synchronize and share documents, photos, videos and files from multiple devices with employees, and external customers and partners.
EMM - Enterprise Mobility Management. A set of services and technologies designed to secure corporate data on employees' mobile devices.
ERP - Enterprise Resource Planning. Software enabling the management and automation of business processes.
eSIM - Embedded SIM. eSIM is the evolution of the SIM card, but rather than a small, thin piece of plastic like previous evolutions were (e.g., mini-SIM, micro-SIM, nano-SIM), eSIM refers to an embedded hardware chipset that can store not only one but multiple operator profiles on a single device simultaneously.
EWP - Enhanced Work Profile. For COPE deployments where the device belongs to the company and is fully enterprise-managed/controlled but leaves the user with a wall-garden for their private apps and data, providing a good balance between BYOD and COBO without compromising corporate data security.
End User - A person who ultimately uses or is intended to ultimately use a product.
Endpoint - An endpoint refers to a device that exists at the end of a network connection (e.g. laptop, desktop, mobile phone)
Enterprise - Business
Enterprise Mobility - Using mobiles within the company to increase efficiency and productivity by allowing employees to work away from their desk.
FIM - Federated Identity Management. FIM is an arrangement that can be made between multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all the enterprises in the group.
FTP - File Transfer Protocol. A software protocol for exchanging information between computers over a network.
Firewall - A firewall is a network security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of security rules.
GSM - Global System for Mobile Communication. A digital mobile network that is widely used by mobile phone users in Europe and other parts of the world.
​
GUI - Graphical User Interface. A graphics-based operating system interface that uses icons, menus, and a mouse (to click on the icon or pull down the menus) to manage interaction with the system.
Gateway - A gateway is a piece of networking hardware or software used for telecommunications networks that allows data to flow from one discrete network to another.
HTML - Hypertext Markup Language. A coding language used to create websites, web pages, web apps, and hybrid mobile apps.
HTTP - Hypertext Transfer Protocol. HTTP is the set of rules for transferring files - such as text, images, sound, video and other multimedia files - over the web.
High-level - Describes those operations that are more abstract in nature; wherein the overall goals and systemic features are typically more concerned with the wider, macro system as a whole.
Hotspot - A hotspot is a physical location where people can access the Internet, typically using Wi-Fi, via a wireless local area network (WLAN) with a router connected to an Internet service provider.
IAM - Identity and Access Management. Also known as IAM, IdM, IdAM, and IDAM) is a security
effort to help manage digital identities and control access to corporate resources. It is not a product per se but rather a framework including various well-known security processes, policies, and technologies._
ICCID - Integrated Circuit Card Identifier. An ICCID is a unique number assigned to a SIM card used in a mobile phone or another cellular device. It provides a standard way to identify each mobile device connected to a cellular network.
IMEI - International Mobile Equipment Identity. Every mobile device that connects to a cellular network has a unique IMEI number. This includes cell phones, smartphones, cellular-enabled tablets and smartwatches, and other devices that support cellular data.
IPA - iOS App Store Package. The format used for distributing iOS apps.
​
ISEC7 CLASSIFY - ISEC7 CLASSIFY provides organizations with a user-friendly platform enabling the proper marking of emails, calendar appointments and documents on any device.
​
ISEC7 MAIL – ISEC7 MAIL is a secure mobile email client allowing classification, encryption, and signing enforcement.
​
ISEC7 SPHERE – ISEC7 SPHERE is a solution that enables organizations to manage and monitor their entire digital workplace infrastructure and network, and quickly identify and resolve issues — from one web-based, central console.
ISP - Internet Service Provider. A company that provides subscribers with access to the internet.
ISV - Independent Software Vendor. A business or an individual that builds, develops, and sells consumer or enterprise software that is consumed by end users.
IT - Information Technology. The use of computers to create, process, store, retrieve and exchange all kinds of electronic data and information.
ITLL - Information Technology Infrastructure Library. A set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business.
IdP - Identity Provider. A service that stores and verifies user identity.
Infrastructure - The basic, underlying framework or features of a system or organization.
Interface - A device or system that unrelated entities use to interact.
Interoperability - The ability of equipment, systems, apps or products from different vendors to operate together in a coordinated way, without an end user's involvement.
IoT - Internet of Things. The networking capability that allows information to be sent to and received from objects and devices using the Internet.
Java - Mostly used for Android mobile apps, a programming language and framework which enables the building of software.
JavaScript - Like Java, but generally used for creating interactive effects and features, like games, audio, and visual effects.
Knowledge Base - An online library of information regarding a service, product, specific topic, or department. A repository where information gets stored, organized, and then shared - either with employees or customers, depending on the type of knowledge base.
LAN - Local Area Network. A collection of devices connected together in one physical location, such as a building, office, or home. A LAN can be small or large, ranging from a home network with one user to an enterprise network with thousands of users and devices in an office or school.
​
LPWAN - Low Power Wide Area Network. A type of wide-area network wireless communication designed to allow long-range communications that can be used to connect low-power IoT devices onto either a private or commercial wireless network or a third-party cloud-based infrastructure.
​
LTE - A Long-Term Evolution. LTE is a 4G telecommunications standard used for transferring data over cellular networks.
LTE-M - Long Time Evolution for Machines. LTE-M is a LPWAN radio technology reusing existing 4G/LTE infrastructures, offering high transmission rates (up to 1Mbps) with a low latency as well as voice transmission capacity (using VoLTE).
LoRa/LoRaWAN - LoRa (Long Range) or LoRaWAN (Long Range Wide Area Network) is a non-cellular, unlicensed radio technology used to deploy private/public LPWAN networks. LoRa refers to the modulation technique (physical layer), while LoRaWAN is one of several protocols used to manage network communications (network layer). Devices require a LPWAN gateway to communicate.
Log - A log, in a computing context, is the automatically produced and time-stamped documentation of events relevant to a particular system.
MAM - Mobile Application Management. Software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
MCM - Mobile Content Management. Allowing employees to share and collaborate on content through mobile devices.
MDM - Mobile Device Management. The process of enhancing corporate data security by monitoring, managing, and securing the mobile devices such as laptops, smartphones and tablets that are used in enterprises.
MEID - Mobile Equipment Identifier. MEID is also commonly known as an Electric Serial Number (ESN). MEID is a unique 14-digit number that is a unique identifier of a specific cell phone. For easy remembering, a phone's MEID number is a phone's IMEI number minus the last digit if it has both.
MFA - Multi-Factor Authentication. An authentication method that requires the user to provide two or more verification factors to gain access to a resource such as an application, online account, or a VPN.
ML - Machine Learning. A subfield of artificial intelligence which is broadly defined as the capability of a machine
to imitate intelligent human behavior.
MTD - Mobile Threat Defense. Software is meant to protect organizations and users from security threats on mobile platforms.
MTP - Media Transfer Protocol. A standard for transferring media files between two connected devices.
MaaS - Mobility as a Service. The integration of various forms of transport services into a single mobility service accessible on demand.
Migration - The process of moving from the use of one operating environment to another operating environment that is, in most cases, thought to be a better one. Migration can involve upgrading to new hardware, new software or both.
NAP - Network Access Point. A major point where internet service providers (ISPs) can connect with one another in peering arrangements.
NB-IoT -Narrowband Internet of Things. NB-IOT is a LPWAN radio technology deployed over mobile networks, offering great indoor coverage for a high number of devices, using low-cost radio modules and ensuring long battery life.
NOC - Network Operations Center, or "network management center," is one or more locations from which network monitoring and control (or network management) is exercised over a computer, telecommunication or satellite network.
OS - Operating System. An operating system is system software that manages computer hardware, software resources, and provides common services for computer programs.
OS Agnostic - Software that runs under any operating system. It may also refer to development tools that support any operating system.
OTP - One-Time Password. An automatically generated numeric or alphanumeric string of characters that
authenticates a user for a single transaction or login session.
PGP - Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication.
PHI - Protected/Personal Health Information. Any medical information that can potentially identify an individual, that was created, used or disclosed in the course of providing healthcare service.
PII - Personally Identifiable Information. A general term that is used to describe any form of sensitive data that
could be used to identify or contact an individual.
​
POC - Proof of Concept. A POC is a demonstration to verify that certain concepts or theories have the potential for real-world application.
POS - Point of Sale. This term can refer to the physical space where users can make purchases, and also, this program helps to systematize the control of sales and inventories of the physical point of a business.
PS - Professional Services. Professional services are nonphysical products or services that individuals or companies provide to customers to help them manage or improve a specific area of their businesses. For example, IT specialists may troubleshoot technology issues, install or uninstall software, routine technology updates, and assist with coding or improve technology to benefit operations.
Point-to-Point - A form of communication that provides a direct path from one fixed point to another.
QA - Quality Assurance. A procedure to ensure the quality of software products or services provided to the customers by an organization.
​
QR codes - A QR (quick response) code is a type of barcode that can be scanned by certain smartphone applications to direct users to a website or display other useful information.
QoS - Quality of Service. Refers to a network's ability to achieve maximum bandwidth and deal
with other network performance elements like latency, error rate, and uptime.
RBAC - Role-Based Access Control, also known as role-based security). An access control method that assigns permissions to end-users based on their role within your organization.
RaaS - Ransomware as a Service. A software delivery model for malicious software that will encrypt data on the victim's computing devices.
Real-Time - Real-time or real time describes various operations in computing or other processes that must guarantee response times within a specified time (deadline), usually a relatively short time.
Regulatory Compliance - When a business follows state, federal, and international laws and regulations relevant to its operations.
Remote Access - The ability to access your computer from a remote location.
Risk Management - Consists of the policies, procedures, and technologies that a company uses to mitigate threats from malicious actors and reduce information technology vulnerabilities that negatively impact data confidentiality, integrity, and availability.
​
S/MIME - Secure/Multipurpose Internet Mail Extensions. A technology that allows you to encrypt your emails.
SASE - Secure Access Service Edge. A package of technologies with the ability to identity
sensitive data or malware and the ability to decrypt content at line speed, with continuous monitoring of sessions for risk and trust levels.
SCI - Serial Communications Interface. A device that enables the serial (one bit at a time) exchange of data between a microprocessor and peripherals such as printers, external drives, scanners, etc.
SCM - Software Configuration Management. The process of identifying and defining the SCIs in the system and coordinating the changes made to these items.
SEM - Security Event Management. The process of identifying, gathering, monitoring, and reporting security-related events in a software, system, or IT environment.
SIEM - Security Information and Event Management. Software that improves security awareness of an IT environment by combining security information management (SIM) and security event management (SEM).
SIM -Security Information Management. The practice of collecting, monitoring and analyzing security-related data from computer logs.
SIM Card - A Subscriber Identity Module (SIM) card is a smart card inside a mobile phone, carrying an identification number unique to the owner, storing personal data, and preventing operation if removed.
SLA - Service Level Agreement. A documented agreement between a service provider and a customer that identifies both the services required and the expected level of service.
SME - Small-to-Medium-Sized Enterprise. SMEs are businesses that maintain revenues, assetsor a number of employees below a certain threshold. SMS Short Message Service. SMS is used to send text messages to mobile phones.
SNMP - Simple Network Management Protocol. SNMP is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.
SOHO - Small Office/Home Office. Refers to a small business that is often run out of small office spaces, homes, or even virtually.
SSO - Single Sign-On. Provides the capability to authenticate once, and be subsequently and automatically
authenticated when accessing various target systems.
SaaS - Software as a Service. SaaS solutions are centrally hosted software services licensed through a subscription model and delivered remotely.
​
Secure Enterprise Workspace - A secure environment for users to access enterprise resources.
Systems Integrator - A person or company that specializes in bringing together component subsystems into a whole and ensuring that those subsystems function together, a practice known as system integration.
Systems Management - Generally for the management of enterprise-owned devices, rather than employees' devices, systems management refers to the management of systems beyond smartphones, tablets, and sometimes laptops, and focusses on devices such as desktops, printers, etc.
TCO - Total Cost of Ownership. A comprehensive assessment of IT or other costs across enterprise boundaries over time - includes hardware and software acquisition, management and support, communications, end-user expenses and the opportunity cost of downtime, training, and other productivity losses.
TLS - Transport Layer Security. TLS is acryptographic protocol that provides end-to-end security of data sent between applications over the Internet.
​
Two-Factor Authentication - Also known as Two-Step Verification, Two-Step Authentication, or Multi-Factor Authentication (MFA). An extra step added to the log-in process, such as a code sent to your phone, that helps verify your identity and prevent your private information from being accessed.
UEM - Unified Endpoint Management. An approach to securing and controlling desktop computers, laptops,
smartphones, and tablets in a connected, cohesive manner from a single console.
URL - Uniform Resource Locator. A unique identifier used to locate a resource on the Internet. Also referred to as a web address.
USB - Universal Serial Bus. A standardized technology for attaching peripheral devices to a computer.
USS - User Self-Service. USS provides your customers with the tools to manage their accounts.
Uptime Time during which a machine, especially a computer, is in operation. ISEC7's EMM suite gets confused with security information and event management (SIEM)
VDI - Virtual Desktop Infrastructure. VDI is an integrated desktop delivery solution that allows organizations to execute and store desktop workloads such as OS, applications, and data on Virtual Machines (VMs) in a data center.
VM - Virtual Machine. A computer system created using software on one physical computer in order to emulate the functionality of another separate physical computer.
VMI - Virtual Mobile Infrastructure. VMI is the mobile-centric technology that allows applications to run on mobile
operating systems (OS) or virtual machines, which are located on a remote server.
VPN - Virtual Private Network. A system or technology that uses a public network, usually the internet, to transmit
encrypted data between a private network and a remote authorized user.
VR - Virtual Reality. The term used to describe a three-dimensional, computer generated environmentwhich can be explored and interacted with by a person.
VoLTE - Voice Over Long-Term Evolution. An LTE high speed wireless communication standard for mobile phones and data terminals, including Internet of Things devices and wearables.
Web-based Applications - Applications that can only be accessed from a web browser.
Zero Touch - A switch feature that allows the devices to be provisioned and configured automatically, eliminating most of the manual labor involved with adding them to a network.
Zero Trust - A security framework requiring all users, whether in or outside the organization's network, to be
authenticated, authorized, and continuously validated for security configuration being granted or keeping access to applications and data.
Zero-Day Exploit - In IT, "zero-day" refers to the first day that something is known or anticipated. A zero-day exploit or attack happens when someone exploits a software vulnerability that's unknown to developers or the public at the time of the attack.
Zero-Day Vulnerability - A vulnerability in a system or device that has been disclosed but is not yet patched.
​
​