Our Terminology
Clarity comes from understanding
Let's make sure we are all speaking the same language!
What Means ?
-
Asset Management
involves identifying and categorizing all digital assets that an organization possesses or utilizes. This encompasses everything from hardware and software to data, cloud services, applications, user accounts, and Internet domains. Adopting a holistic strategy for cybersecurity minimizes potential attack vectors and ensures robust protection.
-
Managed Network Services
Monitoring, patch management, maintenance, and technical support services and 24/7 NOC for managed assets
-
Co-Managed Network Services
The name for our managed network services that are designed for our mid-size and larger clients, to blends our tools and team with your existing IT staff.
-
Network Operations Center (NOC)
is our global hub that is staffed with skilled engineers around the clock, overseeing and administering on-premises and cloud network assets. It is the initial safeguard against network interruptions and malfunctions, effectively enhancing our internal team's capabilities and reach.
-
Managed Application
A line of business software application that is maintained and supported under our Managed Network Services program
-
Managed Secure Desktop - Azure
Fully managed Azure Virtual Desktop + cybersecurity protection + NOC/SOC + image maintenance.
-
Managed Secure Desktop - Physical/Virtual/Cloud
Fully managed on-premise physical or virtual Windows desktop, laptop, tablet or Win365 Cloud PC + cybersecurity protection + NOC/SOC
-
Managed Secure Server - Physical/Virtual/Cloud
Fully managed on-premise physical or virtual or Azure virtual Windows servers + cybersecurity protection + NOC/SOC
-
Managed Cybersecurity & Resiliency Services
The name for our attack surface management, resiliency, and cybersecurity services + SOC
-
Security Operations Center (SOC)
improves an organization's threat detection, response and prevention capabilities by unifying and coordinating all cybersecurity technologies and operations. Our SOC collaborates with our in-house team to take complete control of security platforms and threat management, thus enhancing our efficiency and minimizing the possibility of cyber-attacks.
-
Resiliency Operations Center (ROC)
is tasked with ensuring resiliency, reinforcement, and drift control within a company. This initiative involves a collaborative approach that encompasses various departments like sales, client onboarding, account management, and the technical operations team
-
Cyber Resiliency
integrates business continuity, information systems security, and organizational resilience. It outlines an organization's capacity to maintain essential functions during cyber challenges like attacks, natural catastrophes, or economic downturns. As resiliency rises, any organization's ability to sustain operations with minimal disruption will increase.
-
Security Information and Event Management (SIEM)
Different from XDR, SIEM is a set of tools and services that combine security events management (SEM) and security information management (SIM) capabilities to enable analysts to review log and event data that is generated by managed assets. SIEM operates via an agent and by uploading event logs (e.g. log shipping) for threat detection and analysis. SIEM feeds data into an XDR platform.
-
Endpoint Detection and Response (EDR)
is the evolution of AV. It is centered on identifying and reacting to security threats on endpoint devices through continuous monitoring and analysis. In contrast to traditional antivirus solutions, EDR employs behavior-based detection, artificial intelligence, and proactive threat hunting strategies to uncover potential security issues.
-
Managed Detection and Response (MDR)
combines EDR with managed security services, offering around-the-clock monitoring, detection, and response based on intelligence and our SOC. MDR blends technical methods, human knowledge, and proactive threat hunting to identify, analyze, and address security incidents.
-
Extended Detection and Response (XDR)
combines threat data that was once isolated within different security tools throughout a company's technology infrastructure. This holistic approach leads to more rapid and efficient exploration, cyber threat hunting, and remediation. An XDR system can gather security telemetry from various sources including endpoints, cloud operations, networks, email, among others. XDR is the next evolution of endpoint detection and response (EDR).
Ready to begin?
Connect with us here.
- Discover how the right technology will transform your business from the ground up
- Get a technology plan, purpose, and process to get real results
- Learn to amplify your business instincts and smoothly navigate any IT challenges ahead
- Learn how Azure Spend and Resource Optimization can save you up to 40%