top of page
Tech Lights

Glossary

Acronyms and jargon - just adding to the confusion! Too many to keep track.

Here is our list to help demystify the world of cybersecurity services.

Cybersecurity

The practice of protecting systems, networks, and data from digital attacks.

Managed Service Provider

Specialized third-party organizations managing IT infrastructure and environments for businesses. They do not possess any specialized knowledge in cybersecurity.

Managed Security Service Provider

Specialized third-party organization that offers outsourced monitoring and management of security devices and systems for businesses and organizations. These services can range from the management of firewalls and intrusion detection systems to advanced services like vulnerability scanning, threat intelligence, and incident response. MSSPs often operate Security Operations Centers (SOCs) that provide 24/7 services designed to reduce the number of operational security personnel an enterprise needs to hire, train, and retain. They offer a cost-effective way for businesses to manage the complexities of maintaining a robust cybersecurity posture

Cybersecurity Services

specialized offerings that protect digital assets, networks, and data from unauthorized access, attacks, and damage. They include monitoring, threat detection, and incident response

SOC (Security Operations Center)

A centralized unit that deals with security issues on an organizational and technical level. Teams are monitoring 24/7 with the use of AI to help effectiveness.

Threat Intelligence

The analysis and collection of information about potential security threats to help organizations prepare for, respond to, and mitigate risks.

Managed Firewall

A service where the MSSP is responsible for configuring, monitoring, and maintaining an organization's firewall.

Endpoint Protection

Security solutions specifically designed to protect endpoints like computers and mobile devices from cyber threats

Vulnerability Assessment

A process to identify, quantify, and prioritize vulnerabilities in a system.

SIEM (Security Information and Event Management)

A comprehensive solution that provides real-time analysis of security alerts generated by hardware and software infrastructure

Incident Management

The process of identifying and responding to security incidents.

Compliance Management

Ensuring that an organization adheres to external laws and internal policies related to cybersecurity.

Data Loss Prevention (DLP)

Technologies and tools to prevent unauthorized access and sharing of sensitive data.

Managed IDS/IPS (Intrusion Detection/Prevention Systems)

Services that monitor network and/or system activities for malicious exploits or vulnerabilities.

Identity and Access Management (IAM)

A framework for managing digital identities and permissions in an organization.

Managed VPN

A service where the MSSP sets up and maintains a Virtual Private Network for an organization

Security Auditing

A systematic evaluation of an organization's adherence to cybersecurity guidelines.

Log Management

The process of aggregating, storing, and analyzing log files for security monitoring.

Managed Encryption

A service where the MSSP manages the encryption and decryption keys and processes for an organization

Email Security

Email Protection helps secure and control your inbound and outbound email. It uses machine learning and multilayered detection techniques to identify and block malicious email. It also dynamically classifies today's threats and common nuisances. And it gives you granular control over a wide range of email.

Email Encryption

The process of encrypting email in transit as a defense against email hacking.

External Risk

A group of risks that occur when a company has IT assets that are public facing and can be compromised by individuals without any authorized access to an environment.

Secure Browsing

refers to a set of security measures that safeguard users while they navigate the internet, blocking malicious websites, phishing attempts, and harmful downloads.

Cloud Applications

software program where cloud-based and local components work together, allowing users to access and interact with it over the internet, usually via a web browser.

Cloud Application Security

refers to a suite of measures and technologies designed to protect cloud-based applications from unauthorized access, data breaches, and other cyber threats. It includes encryption, identity management, and vulnerability scanning.

bottom of page