Glossary

A

Access Control – Ensures only authorised staff or devices can reach critical systems or data.

Active Directory (Entra ID) – Microsoft’s identity service used for secure sign-ins and permissions across Microsoft 365 and Azure.

Antivirus – Endpoint protection against common malware and viruses, often paired with advanced detection tools.

Azure – Microsoft’s cloud platform we deploy and manage for hosting, migration, and enterprise services.

AWS – Amazon’s cloud platform providing scalable infrastructure, analytics, and security services.

B

Backup – Copies of data stored securely (cloud or on-premises) for recovery after loss or attack.

BCDR (Business Continuity & Disaster Recovery) – Plans and solutions that keep your business online during outages.

Blob Storage – Azure’s object storage for large datasets and data lakes.

C

Cloud Migration – Moving applications and data to AWS or Azure for scalability and cost savings.

Cortex XDR – Palo Alto’s platform for advanced endpoint, network, and cloud threat detection.

Cyber Essentials Plus – UK government-backed certification showing strong cyber hygiene, with external validation.

Cybersecurity – Measures and solutions that protect IT systems from cyber-attacks and breaches.

D

Data Analytics – Analysing raw data using platforms like Splunk and Power BI to uncover insights.

Data Lake – Central storage for raw data, structured or unstructured, enabling modern BI and AI.

Disaster Recovery – IT processes and tools to restore operations quickly after an incident.

E

EDR (Endpoint Detection & Response) – Detects suspicious behaviour on devices, enabling quick action.

Encryption – Technology that protects data by making it unreadable without a key.

Enterprise Networking – Routers, switches, and firewalls (Juniper, Palo Alto) that underpin secure IT infrastructure.

F

Firewall – A security system that monitors and controls network traffic, acting as a first line of defence.

Failover – Automatic switch to backup systems when the primary system fails.

G

GDPR – UK/EU regulation on how personal data must be collected, stored, and protected.

Governance – Policies and standards (ISO 27001, CIS benchmarks) for secure IT operations.

H

High Availability – IT design that minimises downtime through redundancy.

Hardening – Reducing risks by securely configuring systems and devices.

I

Identity & Access Management (IAM) – Framework for controlling who can access IT resources.

ISO 27001 – International security standard for managing and protecting information assets.

Incident Response – Steps taken to detect, contain, and recover from security incidents.

J

Juniper – Network equipment vendor; our experts design and support Juniper-based infrastructures.

K

Key Vault – Microsoft Azure service for managing encryption keys and secrets securely.

Kubernetes – Container orchestration platform for running applications in hybrid cloud environments.

L

Least Privilege – Principle of granting users only the access they absolutely need.

Load Balancer – Technology that spreads workloads across multiple servers for reliability.

M

MFA (Multi-Factor Authentication) – Adds an extra layer of security beyond passwords.

Microsoft 365 – Productivity suite we secure and manage with policies, backups, and training.

Monitoring (24/7) – Continuous observation of networks and systems for uptime and threats.

N

Network Segmentation – Splitting networks into secure zones to limit breaches.

NIST Framework – Global framework for cybersecurity risk management.

O

Object Storage – Cloud storage for large unstructured datasets like logs or video.

Operational Technology (OT) – Hardware/software controlling industrial systems that must be secured.

P

Penetration Testing – Ethical hacking to identify weaknesses before criminals do.

Power BI – Microsoft’s BI platform for interactive dashboards and decision-making.

Palo Alto Networks – A global cybersecurity vendor, partner for firewalls and Cortex security solutions.

Q

QoS (Quality of Service) – Network feature that prioritises critical traffic like voice and video.

R

Ransomware – Malware that encrypts data and demands payment to unlock it.

Risk Assessment – Evaluating threats, vulnerabilities, and impact to plan controls.

S

Service Desk – 3Roc’s UK-based support team, available for day-to-day IT issues.

SIEM (Security Information & Event Management) – Centralised system for analysing logs (Splunk, Sentinel).

Splunk – Data analytics tool for logs, monitoring, and threat detection.

SOC (Security Operations Centre) – Dedicated team that monitors, detects, and responds to cyber incidents.

T

Threat Intelligence – Data and insights used to detect and prevent cyber-attacks.

TLS – Encryption protocol securing internet traffic.

U

Uptime – Measure of system availability, often a key SLA commitment.

Unified Communications – Integrated messaging, calling, and conferencing solutions.

V

VPN – Secure tunnel allowing staff to access corporate resources remotely.

Vulnerability Management – Ongoing scanning and patching to close weaknesses.

W

WAF (Web Application Firewall) – Protects websites and apps from common online attacks.

Workload – An application, service, or database running in cloud or on-premises infrastructure.

X

XDR (Extended Detection & Response) – Cross-layer security solution linking endpoints, network, and cloud.

Y

Yubikey – A hardware security key providing strong MFA for critical accounts.

Z

Zero Trust – Security model: never trust, always verify, applied to all users and devices.

ZTNA – Zero Trust Network Access, modern alternative to traditional VPN.