• Bandwidth - The maximum amount of data transmitted over an internet connection, in a given amount of time.
  • Cyber Attack - An assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.
  • DNS - Domain Name System is the phonebook of the Internet.
  • Encryption - The method by which information is converted into secret code that hides the information’s true meaning.
  • Failback - The process of restoring a system, component or service previously in a state of failure, back to its original, working state, and having the standby system go from functioning back to standby.
  • Failover - Switching to a redundant or standby computer server, system, hardware component, or network upon failure or abnormal termination of the previously active application server, system, hardware component or network. It is automatic and usually operates without warning.
  • High Availability Pair - Two switches available in the network setup, so if one malfunctions, another is on-site and easily changed to. 
  • IDS/IPS - An Intrusion Detection System (IDS) is an application that monitors a network or systems for malicious activity or policy violations. An Intrusion Prevention System (IPS) is a network security/threat application that prevents attempts to exploit weaknesses in vulnerable systems or applications.
  • Migration - When a running virtual machine is moved from one physical host to another, with little or no disruption in service.
  • MPLS - Multi-protocol Label Switching. The labels provide a way to attach additional information to each packet, so routers don’t need to perform header analysis. Allows the network the ability to handle packets with a particular characteristic, in a consistent fashion.
  • Multi-Homing - Aggregating two or more broadband connections from different ISPs.
  • Next-Generation Firewall - It includes traditional stateful inspection of incoming and outgoing network traffic and also includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.
  • PoE - Power over Ethernet. POE devices combine power and data on one cable and eliminate the need for conventional power wiring.
  • QoS - Quality of Service. Any technology that manages data traffic to reduce packet loss, latency and jitter on the network. It controls and manages network resources by setting priorities for specific types of data on the network.
  • Resiliency - The ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.
  • SSL VPN - Enables devices with an internet connection to establish a secure remote-access VPN connection with a web browser. It protects data transmitted between the endpoint device client software and the SSL VPN server through which the client connects securely to the internet.
  • UCaaS - Unified Communications as a Service, typically includes email, messaging, chat, phone, and video conferencing
  • Virtual Desktops (VDI) - The hosting of desktop environments on a central server. It’s a form of desktop virtualization, as the desktop images run within virtual machines, and are delivered to end clients over a network. Endpoints may be PCs, tablets or thin client terminals.