Abbreviations/Acronyms Guide
As part of our tech blog, our aim is to unravel the intricacies of the ever-evolving world of technology. In this digital landscape, where acronyms reign supreme, understanding the language of tech is essential. From AI to IoT, from NAC to ZTNA, our blog serves as your guide through the alphabet soup of tech acronyms. Whether you're a seasoned pre-sales technical engineer, an aspiring entrepreneur, or simply a tech enthusiast, you can use the below reference guide to decode and help you explore the latest trends, innovations, and buzzwords shaping the future of technology.
Abbreviations/Acronyms |
Meaning |
RBI |
Remote Browser Isolation |
SWG |
Secure Web Gateway |
SDWAN |
Software Defined WAN |
WAN |
Wide-Area Network |
MDM |
Mobile Device Management |
EMM |
Enterprise Mobility Management |
NAC |
Network Access Control |
AP |
Access Point |
DLP |
Data Loss Prevention |
OT |
Operational Technology |
IIoT |
Industrial Internet of Things |
SCADA |
Supervisory Control and Data Acquisition |
ICS |
Industrial Control Systems |
MIoT |
Medical Internet of Things |
NGFW |
Next-Generation Firewall |
EPP |
Endpoint Protection Platform |
EDR |
Endpoint Detection and Response |
AI |
Artificial Intelligence |
ML |
Machine Learning |
MFA |
Multi-Factor Authentication |
ZTNA |
Zero Trust Network Access |
PAM |
Privileged Access Management |
WAF |
Web Application Firewall |
DDoS |
Distributed Denial of Service |
DevSec |
Development Security |
CSPM |
Cloud Security Posture Management |
CWPP |
Cloud Workload Protection Platform |
CASB |
Cloud Access Security Broker |
SASE |
Secure Access Service Edge |
SSE |
Server-Sent Events |
ZTE |
Zero Trust Edge |
SECaaS |
Security as a Service |
CDFW |
Cloud Delivered Firewall |
CNF |
Cloud Native Functions |
AIOps |
Artificial Intelligence for IT Operations |
SOAR |
Security Orchestration, Automation, and Response |
NDR |
Network Detection and Response |
MDR |
Managed Detection and Response |
SOCaaS |
Security Operations Center as a Service |
XDR |
Extended Detection and Response |
SIEM |
Security Information and Event Management |
SIM |
Security Information Management |
SEM |
Security Event Management |
VM |
Virtual Machine |
AES |
Advanced Encryption Standard |
BIOS |
Basic Input/Output system |
MSP |
Managed Service Provider |
VPN |
Virtual Private Network |
AV |
Anti-Virus |
SOC |
Security Operations Center |
CVE |
Common Vulnerabilities and Exposure |
IAM |
Identity and Access Management |
CTI |
Cyber Threat Intelligence |
IR |
Incident Response |
MSSP |
Managed Security Service Provider |
RTO |
Recovery Time Objective |
RPO |
Recovery Point Objective |
SSO |
Single Sign-On |
DNS |
Domain Name Server |
HTTPS |
Secure Hypertext Transfer Protocol |
IBE |
Identity-Based Encryption |
IDS |
Intrusion Detection System |
IDP |
Intrusion Detection and Prevention |
OPSEC |
Operational Security |
Author: Adam Freeman, Presales Security Engineer at Exertis Ireland