ResourcesGlossary
Reference

IT Glossary

30 terms covering cybersecurity, cloud, networking, operations, compliance, and automation.

automation(3)
security(10)
operations(6)
cloud(2)
compliance(5)
networking(4)
A

AIOps

automation

Artificial Intelligence for IT Operations — using machine learning and big data analytics to automate and enhance IT operations, including anomaly detection, event correlation, and root cause analysis.

Related:ITSMNOCSIEM
B

BCP

operations

Business Continuity Plan — a documented strategy outlining how an organization will continue operating during and after a disaster or disruption, covering IT systems, communications, personnel, and facilities.

Related:DRPRPORTO
C

CASB

security

Cloud Access Security Broker — a security policy enforcement point between cloud service consumers and providers that enforces security policies for cloud-hosted resources.

Related:SASEZero TrustDLP

CMDB

operations

Configuration Management Database — a repository that stores information about IT assets (configuration items) and their relationships, used for change management and impact analysis.

Related:ITSMITAMChange Management
D

DLP

security

Data Loss Prevention — a set of tools and processes that detect and prevent data breaches, exfiltration, and unauthorized destruction of sensitive data across endpoints, networks, and cloud.

Related:CASBEncryptionCompliance

DPDP Act

compliance

Digital Personal Data Protection Act — India's comprehensive data protection legislation governing the processing of digital personal data, establishing consent frameworks, data fiduciary obligations, and penalties for non-compliance.

Related:GDPRPrivacyData Processing
E

EDR

security

Endpoint Detection and Response — security solutions that continuously monitor endpoints to detect, investigate, and respond to cyber threats in real time.

Related:XDRMDRSIEM
F

FinOps

cloud

Financial Operations — a cloud financial management discipline and cultural practice that brings financial accountability to variable cloud spending, enabling teams to make business trade-offs between speed, cost, and quality.

Related:Cloud GovernanceReserved InstancesRight-Sizing
H

HIPAA

compliance

Health Insurance Portability and Accountability Act — US federal law requiring safeguards to protect the privacy of personal health information (PHI) and setting conditions on its use and disclosure.

Related:PHIBAASOC 2
I

IaC

cloud

Infrastructure as Code — managing and provisioning computing infrastructure through machine-readable configuration files rather than physical hardware configuration or interactive configuration tools.

Related:TerraformCloudFormationGitOps

ITSM

operations

IT Service Management — the activities performed by an organization to design, plan, deliver, operate, and control IT services offered to customers, typically following ITIL frameworks.

Related:ITILSLAChange Management

ITAM

operations

IT Asset Management — the set of business practices that join financial, contractual, and inventory functions to support lifecycle management and strategic decision-making for IT assets.

Related:CMDBLicense ManagementLifecycle Management

IAM

security

Identity and Access Management — a framework of policies, processes, and technologies that manages digital identities and controls user access to critical resources through authentication and authorization mechanisms.

Related:SSOMFAZero Trust

IDP

automation

Intelligent Document Processing — AI-powered technology that extracts, classifies, and validates data from unstructured documents like invoices, contracts, and forms using OCR, NLP, and machine learning.

Related:RPAOCRProcess Mining
M

MDR

security

Managed Detection and Response — an outsourced cybersecurity service that provides threat monitoring, detection, and response capabilities with a dedicated team of security analysts.

Related:SOCEDRXDR

MTTR

operations

Mean Time to Resolve — the average time taken to fully resolve an incident from the moment it is detected, a key SLA metric for measuring operational efficiency.

Related:MTTDSLAIncident Management
N

NOC

networking

Network Operations Center — a centralized location from which IT support technicians monitor, manage, and maintain client networks, servers, and infrastructure 24/7.

Related:SOCSNMPMonitoring

NERC CIP

compliance

North American Electric Reliability Corporation Critical Infrastructure Protection — a set of mandatory cybersecurity standards for bulk electric system operators covering physical and cyber security of critical assets.

Related:OT SecuritySCADAIEC 62443
P

PCI DSS

compliance

Payment Card Industry Data Security Standard — an information security standard for organizations handling branded credit cards, requiring specific security controls for cardholder data environments.

Related:TokenizationEncryptionAudit
Q

QoS

networking

Quality of Service — the set of network technologies and techniques used to manage bandwidth, delay, jitter, and packet loss to ensure consistent and predictable network performance for critical applications.

Related:SD-WANTraffic ShapingMPLS
R

RPA

automation

Robotic Process Automation — technology that uses software robots to automate repetitive, rule-based tasks typically performed by human workers across applications and systems.

Related:IDPProcess MiningHyperautomation
S

SASE

networking

Secure Access Service Edge — a cloud-delivered architecture combining SD-WAN capabilities with cloud-native security functions like SWG, CASB, FWaaS, and ZTNA into a single service.

Related:SD-WANZero TrustCASB

SD-WAN

networking

Software-Defined Wide Area Network — a virtual WAN architecture that uses software to manage connectivity, circuit management, and traffic steering across geographically distributed sites.

Related:MPLSSASEWAN Optimization

SIEM

security

Security Information and Event Management — technology that aggregates and analyzes log data from across the IT environment to detect threats, support incident response, and meet compliance requirements.

Related:SOCSOARLog Management

SLA

operations

Service Level Agreement — a commitment between a service provider and client that defines the expected level of service, including uptime guarantees, response times, and resolution timeframes.

Related:SLOSLIMTTR

SOC

security

Security Operations Center — a centralized unit that deals with security issues on an organizational and technical level, staffed by security analysts who monitor, detect, and respond to cybersecurity incidents.

Related:SIEMSOARMDR

SOC 2

compliance

Service Organization Control 2 — an auditing procedure that ensures service providers securely manage data to protect the interests of the organization and the privacy of its clients, based on Trust Service Criteria.

Related:ISO 27001AuditTrust Services

SOAR

security

Security Orchestration, Automation, and Response — technology that enables organizations to collect threat data, automate repetitive security tasks, and orchestrate incident response workflows.

Related:SIEMPlaybookIncident Response
X

XDR

security

Extended Detection and Response — a unified security platform that integrates data from multiple security products (endpoints, network, cloud, email) to provide holistic threat detection, investigation, and response.

Related:EDRSIEMMDR
Z

Zero Trust

security

A security framework requiring all users, inside or outside the network, to be authenticated, authorized, and continuously validated before being granted access to applications and data. Based on the principle of "never trust, always verify."

Related:ZTNAMicrosegmentationIAM