Glossary of terms and definitions for IT (Information Technology), the Internet and cyber security.
This glossary provides more than 480 clear and concise definitions of commonly used terms in the fields of information technology, the internet, and cyber security. It is designed to support users of all levels in understanding key concepts, technical jargon, and acronyms frequently encountered across digital platforms and security-related discussions. Whether you are a business owner, student, professional, or simply interested in the digital landscape, this resource aims to enhance your knowledge and confidence in navigating the ever-evolving world of technology.
Any device that connects to a network and serves as a potential entry point for cyber threats, such as computers, servers, smartphones, tablets, IoT devices, and workstations.
Example: A company implements endpoint security measures on all employee laptops and mobile devices to prevent malware infections and unauthorised access.
Protective measures and tools designed to secure endpoint devices such as desktops, laptops, tablets, and smartphones from cyber threats. It typically includes antivirus software, firewalls, encryption, and advanced threat detection to prevent unauthorised access and data breaches.
Example: Installing antivirus software and encrypting data on company laptops.
See also: Endpoint
A security solution that continuously monitors endpoint devices (such as computers, servers, and mobile devices) for suspicious activity, detects threats, and responds to security incidents in real time.
Example: EDR software detects and stops malware on an employee's laptop before it can spread to the network.
Security software that provides comprehensive protection for endpoint devices, combining antivirus, anti-malware, and firewall features.
Example: An organisation installs an EPP on all employee laptops to protect against malware and unauthorised access.
See also: Endpoint
A solution that manages and secures all types of endpoint devices, such as laptops, mobiles, and tablets, from a single platform.
Example: An IT team uses UEM software to enforce security policies and push updates to all employee devices.
See also: Endpoint
A specialised type of MSP that focuses on cybersecurity, offering services such as threat monitoring, incident response, vulnerability assessments, and endpoint protection.
Example: A business hires an MSSP to monitor its network for cyber threats, protect its servers and workstations from malware, and provide rapid response to security incidents, reducing the risk of financial and operational disruptions.
See also: MSP
An advanced security solution that integrates multiple security layers (such as endpoint, network, cloud, and email security) into a unified platform to provide enhanced threat detection and response capabilities.
Example: An XDR platform detects a phishing email sent to an employee, tracks the related network activity, and automatically blocks any malicious connections to prevent data exfiltration.