Services
Strategy
Sourcing
Contract Review
Optimization
Solutions
Backup and Recovery
Cloud
Customer Engagement
Datacenter
Managed Services
Network & Voice
Security
Software
Wireless & IoT
About
Get Started
Glossary
#
IP transit
IP transit is a carrier service that provides routed connectivity from your network to the global internet.
#
IP transport
IP transport moves IP packets across carrier networks with engineered paths, QoS, and SLAs.
#
IPS
Intrusion Prevention Systems (IPS) monitors network traffic in real time to detect and automatically block malicious activity.
#
IPsec
IP Security (IPsec) secures IP traffic with encryption, integrity, and authentication—most often for VPNs.
#
IPv4/IPv6 Addresses
IPv4/IPv6 addresses are unique numeric labels that identify devices and enable routing across networks.
#
IT Management
IT Management is the discipline of planning, delivering, securing, and improving technology to meet business goals.
#
ITO
Information Technology Outsourcing (ITO) is the practice of contracting IT services to third-party providers.
#
IVA
An Intelligent Virtual Agent (IVA) automates customer support with AI-driven responses.
#
IVR
IVR (Interactive Voice Response) is an automated phone system that interacts with callers using menus and voice commands.
#
IXP
An Internet Exchange Point (IXP) is where networks interconnect to exchange traffic locally.
#
Incident Response (IR)
Incident Response (IR) is a structured process to detect, contain, and recover from cyber attacks.
#
Indoor Location Services
Indoor Location Services track people and assets inside buildings using Wi-Fi, BLE, UWB, sensors, and software.
#
International Private Backbone
International Private Backbone is a dedicated global network that links sites with predictable latency, security, and uptime.
#
Internet of Things (IoT)
IoT connects physical devices that sense, share data, and trigger actions over networks.
#
IoB
Internet of Behaviors (IoB) analyzes user data to influence decisions and improve services.
#
Iot Security
IoT Security is the practice of protecting connected devices, networks, and data across the device lifecycle—from onboarding to retirement.
#
LTE
LTE (Long-Term Evolution) is a 4G wireless standard delivering fast mobile data.
#
MDM
Mobile Device Management (MDM) secures and controls mobile devices across an enterprise.
#
MFA
Multi-Factor Authentication (MFA) adds layers of security by requiring multiple verifications.
#
MITM
A Man-in-the-Middle Attack (MITM) intercepts and alters data between two parties.
#
MMS
MMS (Multimedia Messaging Service) enables sending images, video, and audio over mobile networks.
#
MPLS
Multiprotocol Label Switching (MPLS) is a data-carrying technique for high-performance telecommunications networks.
#
MPOE
Minimum Point of Entry (MPOE) is the demarcation where a provider’s network enters a building.
#
MRS
Managed Response Service (MRS) is 24/7 expert-led containment and recovery that stops active threats and restores operations fast.
#
MSS
Managed Security Services (MSS) provide outsourced 24/7 monitoring, threat response, and compliance reporting.
#
Managed Dark Web Monitoring Service
Managed Dark Web Monitoring Service continuously finds exposed credentials and data tied to your company.
#
Managed Detection and Response (MDR)
MDR is a 24/7 managed security service that detects, investigates, and stops threats across your environment.
#
Managed Network Services
Managed Network Services outsource monitoring, management, and support of networks to a specialist provider.
#
Managed Wifi
Managed WiFi is a service where providers deploy, monitor, and support wireless networks for businesses.
#
Metro Ethernet Transport
Metro Ethernet Transport is a Carrier Ethernet service that links metro-area sites at Layer 2 with SLAs for speed, latency, and uptime.
#
Microsoft Teams Direct Routing
Direct Routing connects Microsoft Teams to the PSTN using certified SBCs and SIP trunks for enterprise calling.
#
Multi-Cloud
Multi-Cloud uses two or more cloud providers to optimize cost, performance, and resilience.
#
Multi-channel
Multi-channel is serving customers across multiple communication channels like voice, email, chat, SMS, and social.
#
NFV
Network Function Virtualization (NFV) replaces hardware with software to deliver flexible, virtualized network services.
#
NLG
Natural Language Generation (NLG) uses AI to turn structured data into human language.
#
NOC
A Network Operations Center (NOC) is a 24/7 team that monitors, troubleshoots, and maintains networks to keep users and sites online.
#
Network Firewalls
Network firewalls inspect and control traffic to block threats and enforce security policies at network boundaries.
#
Network Monitoring
Network Monitoring tracks performance, availability, and faults to maintain reliable connectivity.
#
OTN
Optical Transport Network (OTN) transmits large volumes of data over fiber optics.
#
Omni-channel
Omni-channel unifies channels, data, and routing so customer context follows every interaction.
#
PKI
Public Key Infrastructure (PKI) is a system of technologies, policies, and processes used to manage digital certificates and encryption keys.
#
POTS Replacement
POTS Replacement moves analog copper lines to IP/LTE solutions that keep dial tone for alarms, elevators, and fax.
#
PPP
Point-to-Point Protocol (PPP) is a data link protocol for direct connections over serial links.
#
PRI
PRI is a digital ISDN trunk that delivers many 64-kbps voice channels between a PBX and the phone network.
#
PSTN
Public Switched Telephone Network (PSTN) is the global circuit-switched telephone network that carries traditional voice calls.
#
Penetration Testing
Penetration testing is a simulated attack that exposes exploitable weaknesses so teams can fix real risks first.
#
Physical Security
Physical Security is protecting people, facilities, and assets with layered controls that deter, detect, delay, and respond to threats.
#
Platform as a Service (PaaS)
Platform as a Service (PaaS) provides managed runtimes and tools to build and run apps without managing servers.
#
PoE
Power over Ethernet (PoE) delivers electric power and data through a single Ethernet cable.
#
Predictive Dialers
Predictive dialers automate outbound calling by using algorithms to maximize agent talk time.
#
Public, Private & Hybrid Cloud
Public, Private & Hybrid Cloud are deployment models for where and how you run workloads.
#
QoE
Quality of Experience (QoE) is a measure of end-user satisfaction when interacting with a digital service, application, or network.
#
QoS
Quality of Service (QoS) prioritizes network traffic to ensure performance for key applications.
#
Quality Score
Quality Score is a measure of ad relevance and user experience.
#
Quantum Computing as a Service (QCaaS)
Quantum Computing as a Service (QCaaS) delivers access to quantum computing power via the cloud.
#
RBI
Remote Browser Inspection (RBI) isolates web browsing in a remote container so content is inspected and threats never reach endpoints.
#
RBOC
A Regional Bell Operating Company (RBOC) is a post-AT&T-breakup local telephone carrier that operates incumbent access networks.
#
RDA
Robotic Desktop Automation (RDA) automates repetitive user tasks on desktop systems.
#
RPA
Robotic Process Automation (RPA) is a technology that uses software “robots” or “bots” to replicate human actions within digital systems.
#
Remote Home Working
Remote Home Working is employees doing work from home with reliable access, collaboration, and security.
#
Risk Assessments
Risk Assessment is the process of identifying, analyzing, and prioritizing risks to inform decisions.
#
SASE
SASE converges SD-WAN networking with cloud security to protect users, apps, and data—everywhere.
#
SAT
Security Awareness Training teaches employees to recognize, avoid, and report cyber threats.
#
SD-WAN
SD-WAN uses software to steer traffic across links for better performance, security, and cost.
#
SDP
A Software-Defined Perimeter (SDP) secures access by dynamically creating network boundaries.
#
SEG
A Secure Email Gateway filters inbound/outbound email to block phishing, malware, spam, and enforce policy.
#
SIEM
SIEM centralizes and analyzes logs to detect, investigate, and report security threats in real time.
#
SIP
Session Initiation Protocol (SIP) is a signaling protocol that sets up, manages, and ends real-time voice/video sessions over IP.
#
SIP Trunking
SIP Trunking connects a PBX to the PSTN over IP, delivering scalable, cost-efficient calling with control and redundancy.
#
SLA
A Service Level Agreement (SLA) is a contract that defines performance targets, measurement, reporting, and remedies.
#
SMS
Short Message Service (SMS) is the standard text messaging protocol for mobile communication.
#
SOAR
Security Orchestration Automation and Response (SOAR) integrates tools to automate and coordinate security responses.
#
SOC
A Security Operations Center (SOC) is a 24/7 team that monitors, detects, and responds to threats.
#
SPF
Sender Policy Framework (SPF) is a DNS rule that declares which servers may send email for a domain.
#
SSE
Secure Service Edge (SSE) delivers cloud security—SWG, CASB, ZTNA, and DLP—to enforce zero-trust access for users anywhere.
#
SSL
Secure Sockets Layer (SSL) is a now-deprecated protocol for encrypting data in transit; modern sites use TLS for HTTPS.
#
SSO
Single sign-on (SSO) lets users access many apps with one login, reducing passwords, friction, and support tickets.
#
SWG
A Secure Web Gateway inspects and filters web traffic to block threats, enforce policy, and keep users safe.
#
SaaS Management Platforms
SaaS management platforms centralize discovery, spend, security, and usage across all your cloud applications.
#
Security-as-a-Service (SaaS)
Security as a Service (SECaaS) is a delivery model where security functions are provided over the internet by a third-party vendor.
#
Self Service BI
Self-Service Business Intelligence allows users to analyze and visualize business data without IT support.
#
Speech Analytics
Speech analytics analyzes customer calls to extract insights, improve service, and ensure compliance.
#
Storage as a Service (STaaS)
Storage as a Service (STaaS) provides scalable, cloud-based data storage on demand.
#
Strategic Cloud Platform Services
Strategic Cloud Platform Services is a unified cloud foundation to build, run, secure, and scale apps.
#
TCPA
The Telephone Consumer Protection Act (TCPA) restricts telemarketing and robocalls.
#
TEM
Telecom Expense Management (TEM) is the practice and tools to audit, manage, and optimize telecom and mobility spend and inventory.
#
TIP
A Threat Intelligence Platform (TIP) aggregates and analyzes threat data for action.
#
Threat Intelligence (TI)
Threat Intelligence (TI) is data on cyber threats used to strengthen security defenses.
#
UMS
A Unified Messaging System (UMS) consolidates email, voicemail, fax, and SMS into one platform.
#
UTM
Unified Threat Management (UTM) is a security solution that consolidates multiple protective technologies into a single platform.
#
Unified Communications as a Service (UCaaS)
Unified Communications as a Service (UCaaS) delivers cloud calling, messaging, and meetings as one managed platform across devices and locations.
#
Unified Endpoint Management Tools
Unified Endpoint Management tools manage, secure, and configure devices and apps from a single platform.
#
VDI
Virtual Desktop Infrastructure (VDI) hosts desktop environments on a central server.
#
VLAN
A Virtual Local Area Network (VLAN) segments a physical network into isolated groups.
#
VPLS
Virtual Private LAN Service (VPLS) connects multiple sites with a shared Ethernet LAN.
#
VPN
Virtual Private Network (VPN) creates an encrypted tunnel so users or sites connect securely over untrusted networks.
#
Virtual CISO (vCISO)
A Virtual CISO (vCISO) provides outsourced security leadership and strategy for organizations.
#
Virtual Hold
Virtual hold technology lets callers keep their place in line without waiting on hold.
#
Vulnerability Management
Vulnerability Management finds, prioritizes, and fixes weaknesses across systems, apps, and cloud.
#
WAAP
Web Application and API Protection (WAAP) is a cloud security stack that protects web apps and APIs from attacks, abuse, and data leakage.
Previous
Next