Solutions
Resources
Blog
Podcast
Research Reports
Whitepapers
(855) 844-3551
Contact Us
Glossary
#
ANI
Automatic Number Identification; displays caller’s number.
#
ASA
Average Speed of Answer; how fast calls are answered.
#
Access Management / Single Sign On
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Aggregator
Service that combines multiple sources into one platform.
#
Analytics and Business Intelligence (ABI)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Application Performanice Monitoring and Observability (APM)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Application Security Testing
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Artificial Intelligence (AI)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Audio & Video Conferencing
A general technology or concept used in modern IT and business environments.
#
Bare Metal
A facility or component used to house servers and support enterprise infrastructure.
#
Bot Mitigation
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Broadband
A networking or communication technology used to connect systems or transmit data.
#
Broadband Aggregation
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Burst
Temporary increase in bandwidth usage above the committed rate.
#
Business Applications
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
CCaaS
Contact Center as a Service; cloud-based customer support system.
#
CDR
Call Detail Record, which logs information about phone calls made.
#
CES
Customer Effort Score; measures how easy it was for customers to get help.
#
CIR
Committed Information Rate, the guaranteed minimum bandwidth.
#
CRM
A digital platform or application used to improve operations, productivity, or communication.
#
CSAT
Customer Satisfaction Score; measures happiness with service.
#
CTI
Computer Telephony Integration; links phone systems with computers.
#
Cloud Access Security Broker (CASB)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Cloud Connectivity
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Cloud Migration
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Coax
Coaxial cable used for broadband and cable internet.
#
Cold spare
Backup hardware kept in storage, not powered on.
#
Collaboration Tools
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Colocation
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Communications Platform as a Service (CPaaS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Compliance-as-a-Service
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Contact Center as a Service (CCaaS)
A cloud-based solution or service used to store, manage, or process data online.
#
Container Management
A general technology or concept used in modern IT and business environments.
#
Content Delivery Network (CDN)
A networking or communication technology used to connect systems or transmit data.
#
Conversations as a Service (CaaS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
DID
Direct Inward Dialing; allows calling directly to an internal phone extension.
#
DKIM
DomainKeys Identified Mail; prevents email spoofing.
#
DMARC
An email security protocol that helps prevent spoofing and phishing.
#
DNIS
Dialed Number Identification Service; shows which number was dialed.
#
DNS
Domain Name System; translates website names into IP addresses.
#
DNS filtering
Blocks access to malicious websites.
#
DOCSIS
A protocol for delivering high-speed internet over cable TV lines.
#
DPaaS (Data Protection as a Service)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
DSL (Digital Subscriber Line)
A networking or communication technology used to connect systems or transmit data.
#
Dark Fiber
A networking or communication technology used to connect systems or transmit data.
#
Data Dump
Exporting a large volume of raw data.
#
Data Security Compliance - GRC
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Database-as-a-Service
A cloud-based solution or service used to store, manage, or process data online.
#
Dedicated Internet Access
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Desktop as a Service (DaaS)
A cloud-based solution or service used to store, manage, or process data online.
#
Device Lifecycle Management (DLM)
A general technology or concept used in modern IT and business environments.
#
Dim Fiber
A networking or communication technology used to connect systems or transmit data.
#
Disaster Recovery as a Service
A cloud-based solution or service used to store, manage, or process data online.
#
Distributed Antenna System (DAS)
A facility or component used to house servers and support enterprise infrastructure.
#
E 911
A general technology or concept used in modern IT and business environments.
#
E-Line
A type of Ethernet virtual connection between two locations.
#
EPL
Ethernet Private Line; provides a dedicated, secure point-to-point connection.
#
ERP
A digital platform or application used to improve operations, productivity, or communication.
#
Edge Computing
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Efficiency
Output compared to input; a measure of productivity.
#
Endpoint Detection and Response (EDR)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Endpoint Protection Platforms (EPP)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Endpoints
Devices like laptops and phones that connect to a network.
#
Event Stamps
Time-based tracking of actions or triggers.
#
Extended Detection and Response (XDR)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Fiber
A networking or communication technology used to connect systems or transmit data.
#
Field Support
An outsourced service offering continuous support and management of IT systems.
#
File Systems and Object Storage
A cloud-based solution or service used to store, manage, or process data online.
#
Firewall As A Service (FWaaS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Fixed Wireless
A general technology or concept used in modern IT and business environments.
#
Fleet Management
A wireless technology or IoT service that connects devices and enables data flow.
#
Function as a Service (FaaS)/ Cloud Infrastructure and Platform Services (CIPS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
GPON (Gigabit Passive Optical Network)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
GRE Tunneling
A method to tunnel data between networks securely.
#
Global WAN Services
A networking or communication technology used to connect systems or transmit data.
#
HIPPA
HIPAA, which stands for the Health Insurance Portability and Accountability Act, is a federal law enacted in 1996.
#
HSIA
High-Speed Internet Access, commonly used in hotels or enterprises.
#
Help Desk
An outsourced service offering continuous support and management of IT systems.
#
High Availability (HA)
System design that ensures uptime even during failures.
#
Hosted PBX
A general technology or concept used in modern IT and business environments.
#
IAM (Identity Access Management)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
ICI
Inter-Carrier Interconnect, the point where networks exchange data.
#
IP
A general technology or concept used in modern IT and business environments.
#
IP Sec
A protocol for encrypting IP traffic.
#
IP transit
Internet service that allows traffic to reach the global internet.
#
IP transport
The transmission of IP data across networks.
#
IPv4/IPv6 Addresses
A general technology or concept used in modern IT and business environments.
#
IT Management
A general technology or concept used in modern IT and business environments.
#
IVR
Interactive Voice Response; automated phone menu system.
#
Incident Response (IR)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Indoor Location Services
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Information technology outsourcing (ITO)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
International Private Backbone
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Internet of Things (IoT)
A wireless technology or IoT service that connects devices and enables data flow.
#
Intrusion Detection (IDS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Intrusion Prevention (IPS)
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
Iot Security
A cybersecurity feature or service that protects systems, data, and users from digital threats.
#
LTE
High-speed wireless communication for mobile and data devices.
#
MMS
Multimedia Messaging Service; allows sending images/videos via text.
#
MPLS
A private networking method that directs data using labels instead of IP addresses.
Transform your business without wasting money.
We help you identify, audit and implement technology changes within your business to create leverage points to scale your company faster.
Get in Touch
Explore Solutions