IT Glossary
30 terms covering cybersecurity, cloud, networking, operations, compliance, and automation.
AIOps
automationArtificial Intelligence for IT Operations — using machine learning and big data analytics to automate and enhance IT operations, including anomaly detection, event correlation, and root cause analysis.
BCP
operationsBusiness Continuity Plan — a documented strategy outlining how an organization will continue operating during and after a disaster or disruption, covering IT systems, communications, personnel, and facilities.
CASB
securityCloud Access Security Broker — a security policy enforcement point between cloud service consumers and providers that enforces security policies for cloud-hosted resources.
CMDB
operationsConfiguration Management Database — a repository that stores information about IT assets (configuration items) and their relationships, used for change management and impact analysis.
DLP
securityData Loss Prevention — a set of tools and processes that detect and prevent data breaches, exfiltration, and unauthorized destruction of sensitive data across endpoints, networks, and cloud.
DPDP Act
complianceDigital Personal Data Protection Act — India's comprehensive data protection legislation governing the processing of digital personal data, establishing consent frameworks, data fiduciary obligations, and penalties for non-compliance.
EDR
securityEndpoint Detection and Response — security solutions that continuously monitor endpoints to detect, investigate, and respond to cyber threats in real time.
FinOps
cloudFinancial Operations — a cloud financial management discipline and cultural practice that brings financial accountability to variable cloud spending, enabling teams to make business trade-offs between speed, cost, and quality.
HIPAA
complianceHealth Insurance Portability and Accountability Act — US federal law requiring safeguards to protect the privacy of personal health information (PHI) and setting conditions on its use and disclosure.
IaC
cloudInfrastructure as Code — managing and provisioning computing infrastructure through machine-readable configuration files rather than physical hardware configuration or interactive configuration tools.
ITSM
operationsIT Service Management — the activities performed by an organization to design, plan, deliver, operate, and control IT services offered to customers, typically following ITIL frameworks.
ITAM
operationsIT Asset Management — the set of business practices that join financial, contractual, and inventory functions to support lifecycle management and strategic decision-making for IT assets.
IAM
securityIdentity and Access Management — a framework of policies, processes, and technologies that manages digital identities and controls user access to critical resources through authentication and authorization mechanisms.
IDP
automationIntelligent Document Processing — AI-powered technology that extracts, classifies, and validates data from unstructured documents like invoices, contracts, and forms using OCR, NLP, and machine learning.
MDR
securityManaged Detection and Response — an outsourced cybersecurity service that provides threat monitoring, detection, and response capabilities with a dedicated team of security analysts.
MTTR
operationsMean Time to Resolve — the average time taken to fully resolve an incident from the moment it is detected, a key SLA metric for measuring operational efficiency.
NOC
networkingNetwork Operations Center — a centralized location from which IT support technicians monitor, manage, and maintain client networks, servers, and infrastructure 24/7.
NERC CIP
complianceNorth American Electric Reliability Corporation Critical Infrastructure Protection — a set of mandatory cybersecurity standards for bulk electric system operators covering physical and cyber security of critical assets.
PCI DSS
compliancePayment Card Industry Data Security Standard — an information security standard for organizations handling branded credit cards, requiring specific security controls for cardholder data environments.
QoS
networkingQuality of Service — the set of network technologies and techniques used to manage bandwidth, delay, jitter, and packet loss to ensure consistent and predictable network performance for critical applications.
RPA
automationRobotic Process Automation — technology that uses software robots to automate repetitive, rule-based tasks typically performed by human workers across applications and systems.
SASE
networkingSecure Access Service Edge — a cloud-delivered architecture combining SD-WAN capabilities with cloud-native security functions like SWG, CASB, FWaaS, and ZTNA into a single service.
SD-WAN
networkingSoftware-Defined Wide Area Network — a virtual WAN architecture that uses software to manage connectivity, circuit management, and traffic steering across geographically distributed sites.
SIEM
securitySecurity Information and Event Management — technology that aggregates and analyzes log data from across the IT environment to detect threats, support incident response, and meet compliance requirements.
SLA
operationsService Level Agreement — a commitment between a service provider and client that defines the expected level of service, including uptime guarantees, response times, and resolution timeframes.
SOC
securitySecurity Operations Center — a centralized unit that deals with security issues on an organizational and technical level, staffed by security analysts who monitor, detect, and respond to cybersecurity incidents.
SOC 2
complianceService Organization Control 2 — an auditing procedure that ensures service providers securely manage data to protect the interests of the organization and the privacy of its clients, based on Trust Service Criteria.
SOAR
securitySecurity Orchestration, Automation, and Response — technology that enables organizations to collect threat data, automate repetitive security tasks, and orchestrate incident response workflows.
XDR
securityExtended Detection and Response — a unified security platform that integrates data from multiple security products (endpoints, network, cloud, email) to provide holistic threat detection, investigation, and response.
Zero Trust
securityA security framework requiring all users, inside or outside the network, to be authenticated, authorized, and continuously validated before being granted access to applications and data. Based on the principle of "never trust, always verify."