Glossary

Defining the key technology terms you need to know to navigate the modern world of all things IT.

Terms & Definitions

A

Application Programming Interface (API)

A set of rules and tools for building software applications. APIs are used to exchange data, features, and functionality between systems/applications.

Anything-as-a-Service (AaaS)

Anything-as-a-Service describes a general category of services related to cloud computing and remote access. It recognizes the vast number of products, tools, and technologies that are now delivered to users as a service over the internet.

B

Backup

A backup is a copy of data that’s stored in a separate location. Backups are important for protecting data from loss due to accidents, hardware failure, or cyber attacks. 

Backup-as-a-Service (BaaS)

BaaS is a service that is cloud-based, where service providers will manage the storage and protection of your business data.

Break/Fix

In the IT world, this is a simple approach where if something breaks, you get it fixed, and you pay for just that service. This approach does not typically look further into the WHY behind the issue that caused the break, rather just the immediate action to fix the issue.

Business Email Compromise (BEC)

Business Email Compromise (BEC) is a phishing tactic where criminals impersonate a trusted vendor or organization leader, using the position of authority or familiarity, to convince the targeted employee to release sensitive information or transfer funds. 

C

Cloud Computing

Cloud computing is a model for managing computing resources (such as storage, servers, and software) over the internet. It allows users to access these resources on-demand, from anywhere, as long as there is access to the internet.

Cloud Service

A company that offers cloud computing services to businesses. CSPs provide services and support for things like data storage and infrastructure management.

Cloud Computing

A cyber attack is any attempt – successful or otherwise — by cybercriminals to access a cloud or computer network and system in order to steal or expose data, cause disruption, or for financial gain.

Cybersecurity Maturity Model Certification (CMMC)

CMMC is a Department of Defense (DoD) program that assesses a company’s cybersecurity practices. This program is designed to protect sensitive information shared between the governments and contractors/subcontractors.

Client Success Manager (CSM)

The Client Success Manager advises clients and collaborates with them on building strategic IT goals, budget planning, business process analyses, and facilitating technology changes.

Copilot

Copilot is Microsoft’s AI assistant that helps users with tasks on their devices to improve productivity and efficiency with suggestions and automating repetitive tasks.

Certified Information Systems Security Professional (CISSP)

A CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.

D

Dark Web

The dark web is a part of the internet that’s only accessible with special software and browsers. The dark web is part of the deep web, which is content that’s not indexed by search engines.

Distributed Denial-of-Service (DDoS)

A distributed denial-of-service (DDoS) attack is a cyberattack that makes a website, server, or network unavailable to users.

E

Endpoint

Endpoints are physical devices that connect to, and exchange information with, a computer network.

Examples: mobile devices, desktop computers, virtual machines, embedded devices, servers

Endpoint Detection and Response (EDR)

A cybersecurity technology that focuses on detecting and investigating security incidents on endpoints, such as desktops, laptops, servers, and mobile devices.

H

Hardware-as-a-Service (HaaS)

Hardware-as-a-service is an IT service offering that enables customers to access to critical hardware on a subscription or usage-based (“pay per use”) payment model. 

Health Insurance Portability and Accountability Act (HIPAA)

A federal law that protects the security and privacy of health information; HIPAA also gives patients rights over their health information.

Help Desk

May also be referred to as a Service Desk. This team is your quickest way to get assistance with an IT issue, either via phone call, email, or chat assistance. The NetGain Help Desk strives to answer most phone calls within 3 rings.

Human Firewall 

A human firewall represents the collective force of individuals in an organization trained to guard against cyber threats as a fundamental layer of defense.

I

Infrastructure-as-a-Service (IaaS)

Infrastructure as a Service (IaaS) is a cloud computing service that provides IT resources, like storage, networking, and processing power. IaaS is typically offered on demand, and users pay for what they use.

Internet of Things (IoT)

The Internet of Things (IoT) is a network of devices that can connect and share data over the internet. IoT devices can include sensors, wearable devices, appliances, and other hardware.

Information Technology (IT)

IT is a broad field that encompasses the usage computers, software, and networks to store, process, and communicate information.

Immutable Backup

An immutable backup is a copy of data that cannot be changed, deleted, or tampered with. Immutable backups help in the event of ransomware, as your protected backups cannot be encrypted by ransomware. They are also good protection against human error, mitigating accidental deletions and tampering.

Incident Response Plan (IRP)

An Incident Response Plan is a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.

Internet Service Provider (ISP)

An Internet service provider (ISP) is an entity that provides broadband (internet) service to subscribers.

L

Large Language Model (LLM)

A large language model (LLM) is a type of artificial intelligence program that can recognize and generate text, trained on huge sets of data.

M

Machine Learning (ML)

Machine learning is a form of artificial intelligence that allows software to review and identify/learn patterns based on sample data.

Malware

Malware is short for “malicious software” and it’s software designed to damage, steal, or gain access to a device, network, or data.

Managed Detection and Response (MDR)

Managed detection and response (MDR) is a cybersecurity service to proactively protect organizations from cyberthreats using advanced detection and incident response. MDR services include a combination of technology and human expertise to perform cyberthreat hunting, monitoring, and response.

Managed Endpoint Detection and Response (MEDR)

Managed endpoint detection and response (MEDR) is a cybersecurity service that monitors and responds to threats on an organization’s endpoints. It’s a managed service, which means the security vendor or partner deploys, operates, and supports the solution.

Managed Security Service Provider (MSSP)

A managed security service provider (MSSP) is a third-party company that monitors and manages a client’s security systems and devices. MSSPs have a security operation center (SOC) to provide 24/7 cybersecurity services for clients. Common services can include managed firewall, intrusion detection, virtual private network, vulnerability scanning, and anti-virus services.

Managed Service Provider (MSP)

A managed service provider (MSP) is a company that manages a customer’s IT infrastructure, applications, or business processes. MSPs are third party teams that can work remotely or onsite to support their clients.

Mobile Device Management (MDM)

A type of security software that enables you to secure, monitor, manage, and enforce policies on employee mobile devices.

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a security process that requires more than one step to log in to an account; it’s also known as two-step verification.

N

Network Operations Center (NOC)

A centralized location where IT teams can continuously monitor the performance and health of client networks. The NOC serves as a line of defense against network disruptions and failures.

P

Patch Management

Patch management is the process of updating software, drivers, and firmware to fix vulnerabilities and improve performance. Patch management can help protect systems from cyber attacks and data breaches.

Penetration Testing

Penetration Testing, also known as a “pen test”, is a methodology to identify gaps or weak points in the security features of a system. 

Phishing

A cyber attack technique in which the cyber criminal poses as a legitimate business or reputable person. They will try to steal sensitive data, such as bank account numbers, through a fraudulent email or on a web site.

Pod

This is an organizational structure method for remote and field groups of support engineers. At NetGain, they are the first point of contact for all incident tickets, including escalations and dispatch (aka Help Desk and Service Desk).

Pod Tiers

The members of NetGain’s incident response team are grouped into tiers of support. Tier 1, 2, and 3 engineers will resolve different tickets based on the level of complexity of the IT challenge and their level of expertise to remediate.

Principles of Least Privilege (PoLP)

An organization may limit access to specific systems and data only to users who have a demonstrable need. PoLP is an effective measure that restricts access to sensitive networks and data, and gives organization’s greater control and insights into who is accessing what, when, and why within their organization.

Professional Services Engineer (PSE)

These engineers are typically focused on IT projects with a series of tasks that need to be completed to reach a specific outcome. Projects typically fall outside of the managed services support agreement.

Proactive Maintenance

A series of scheduled tasks to proactively maintain your technology. Proactive maintenance is a measure of protecting your technology investments and mitigating unwanted downtime or breaks that could otherwise be avoided if properly and proactively maintained. May also be referred to as Scheduled Maintenance.

R

Ransomware

Ransomware is a type of malware which prevents you from accessing your device and the data stored on it (usually by encrypting your files). A cyber criminal will demand a ransom in exchange for decryption. The computer itself may become locked, or the data on it might be encrypted, stolen or deleted.

Ransomware as a Service (RaaS)

Ransomware as a service (RaaS) is a cybercrime business model in which ransomware developers sell ransomware code or malware to other hackers ( called “affiliates”) who use the code for ransomware attacks.

Recovery Point Objective (RPO)

RPO is the maximum amount of data loss a company is willing to tolerate in the event of a system failure or disaster.

Recovery Time Objective (RTO)

RTO is the maximum amount of time that’s acceptable to restore a network, application, or system after a disruption.

S

Scope of Work (SOW)

During a project proposal, an engineer will create a scope of work that includes step by step insights on what will take place during the proposed project. The scope helps to determine the hours needed to complete the project.

Security Awareness Training (SAT)

Security Awareness Training is an ongoing educational process to inform people on how to identify and avoid cyber threats to safeguard sensitive information.

Security Information Event Management (SIEM)

SIEM is a cybersecurity solution that helps organizations detect, analyze, and respond to security threat events before they disrupt business operations.

Security Operations Center (SOC)

A security operations center (SOC, pronounced “sock”) is a team of security experts that proactively monitor an organization’s ability to operate securely.

Service Delivery Manager (SDM)

Oversees the NetGain POD teams and serves as an escalation point for ticket assistance.

Service Level Agreement (SLA)

A service level agreement (SLA) is a service provider contract with a customer that outlines a level of service the provider promises to deliver to the customer.

Security Operations Center-as-a-Service (SOCaaS)

Security Operations Center as a Service (SOCaaS) is a subscription service offering of managed security service providers. They will deliver 24/7/365 threat monitoring, detection and incident response, threat intelligence, and cybersecurity investigations to customers.

SOC 2 Type II

This refers to a specific type of audit report that assesses a service organization’s security controls over a period of time evaluating not only the design of those controls but also their operational effectiveness in safeguarding customer data, providing a more comprehensive view of a company’s security posture compared to a SOC 2 Type I report which only looks at a single point in time.

Social Engineering

Social engineering is the art of manipulating, influencing, or deceiving you in order to gain control over your computer system. The hacker might use the phone, email, snail mail or direct contact to gain illegal access. Phishing, spear phishing, and CEO fraud are all examples.

Software-as-a-Service (SaaS)

A software distribution/subscription model where applications are hosted by a service provider and they provide access to customers over the internet.

Spear Phishing

Spear phishing is a specific kind of phishing attack where a cyber criminal targets a specific person/organization with email messages that seem to come from someone who knows them or is part of the organization.

Spoofing

Spoofing is when a caller deliberately falsifies the information transmitted to your caller ID, to disguise their identity.

T

Tabletop Planning

Tabletop planning is an exercise to test an organization’s response to a simulated emergency. This is an informal, discussion session where a team discusses their roles and responses during an emergency, walking through one or more example scenarios.

Threat Hunting

Threat hunting in cybersecurity refers to actively searching through an organization’s network and systems to identify potential cyber threats that may have evaded traditional security measures.

Technical Assessment

A technical assessment is an in-depth review of your IT infrastructure. This is a snapshot in time of your IT posture.

Technical Review

A technical review is a business discussion that delves into what was found in a technical assessment. This may also be referred to as a Business Review, Executive Business Review (EBR), or Quarterly Business Review (QBR), depending on the audience and the frequency of the reviews set throughout the year.

Technology OneSource (TOS)

This is NetGain’s in-house offering for managed services support. This is the support coverage used to describe your support team members and their action items (such as TOS Agreement, TOS Engineer, TOS Business Review, etc.).

V

Value-Added Reseller (VAR)

A value-added reseller (VAR) is an organization that is usually part of a sales channel for an original equipment manufacturer (OEM).

Virtual Chief Information Security Officer (vCISO)

A Virtual Chief Information Security Officer provides executive-level security leadership on a fractional or as-needed basis, focusing on securing an organization’s information systems and data.

Virtual Chief Security Officer (vCSO)

A Virtual Chief Security Officer provides executive-level security leadership on a fractional or as-needed basis. This role often oversees all aspects of security within an organization, including physical security, information security, and human safety.

Virtual Private Network (VPN)

A VPN is a service that encrypts your data and hides your IP address while you’re online, which makes your browsing activity and location private

Voice over Internet Protocol (VoIP)

VoIP refers to a technology that allows users to make phone calls over the internet instead of using traditional phone lines.

Vulnerability Assessment

A scan of your virtual network to assess physical assets for a personalized report showing your organization’s potential vulnerabilities and remediation guidance.

Z

Zero Trust

Zero Trust is a security strategy approach that follows a set of security principles to verify explicitly, least privilege access, and assume breach.

Zero Trust Architecture (ZTA)

Zero Trust Architecture (ZTA) is a cybersecurity framework based on the principle of “Never Trust, Always Verify”. It’s about ensuring every access request is authenticated and authorized, and assumes threats can be inside or outside the network.  

Latest News About NetGain

it services chattanooga
Webinar (On-Demand)

The Latest on AI at Work

Artificial Intelligence is transforming how businesses operate. But how do you cut through the hype and apply AI meaningfully to your organization?

Read More »

Our Partners

Search