AaaS Access Control List ACTIVE THREAT (active security threat) Actual availability Adware AFF A300 AFF A700s AFF A800 AFF C190 Agreed time for processing requests All-Flash Allocated Amazon Web Services Antivirus software Apache API Application Migration Application Rentals Application Armored virus ARP Artificial Intelligence (AI) ASV scanner Audit of the IT service Authentication Availability Azure
Backdoor Backup as a Service Backup Bandwidth Bare metal BGP Big Data Billing (SORM) Bitbucket Blockchain Botnet BRI Broadcast Business Intelligence Tools (BI) Bypass
CaaS (Containers-as-a-Service) Caching CDMA CG-NAT CI / CD CIFS CIPHER Cisco ASA Cisco Blade Server Cisco Catalyst Cisco HyperFlex Cisco Integrated Management Controller (CIMC) Cisco Intersight Cisco ISR Cisco packet tracer Cisco SD-WAN Cisco UCS B200 M5 Cisco UCS B480 M5 Cisco UCS C-Series Cisco UCS C220 M5 Cisco UCS C240 M5 Cisco UCS C480 M5 Cisco UCS Director Cisco UCS Manager Cisco CLI ClickStream Cloud Application Management for Platforms Cloud Provider Cloud server leasing Cloud Server Cloud Services Cloud Storage Cloud Subscriber or Subscriber Cloud technologies Cloud Cluster COA Container security Container Content Delivery Network CORS (Сross-Origin Resource Sharing) Cryptographic Analysis Cryptographic Gateway Cryptographic Key Cryptoprovider CUDA CWOM Cisco Workload Optimization Manager Cyber attack Cybersecurity
DaaS Data Analytics Data center Data Center Data Compression Data deduplication Data Fabric Data Lake Data Science Data Security Officer (DSO) Data Showcase (Data Mart) Database security DBMS (Database Management System) DDoS attack Dedicated server Deep learning Desktop as a Service Developer DevOps Disk shelves and media Docker Domain Name System (DNS) Double Downtime DSS Dual Factor Authentication
Electronic signature Encryption Enterprise Mobility Management Enterprise Portal Ethernet
FaaS FAS2700 FAS8200 Fault tolerance FC Firewall FlexClone FlexPod FlexVol FTDS FTP
Gatekeeper GDPR General Data Protection Regulation (GDPR) GitLab Graphics Accelerator Graphics Processing Unit (GPU) Guest Operating System GUI
Hacker Hadoop HAProxy Hardware as a Service Hardware Virtualization Help Desk Hosting HPC HTTP Hybrid computing system Hybrid infrastructure Hyperscaler (Hyperscaler) Hypervisor
IaaS ICMP Identity and Access Management (IAM) IIS IMAP Information protection Information security audit Information Security Management Information security Integration Integrity Internet of Things (IoT) IP address IP telephony IPoE IPv4 and IPv6 iSCSI ISDN ISO IT as a Service IT Cloud IT infrastructure IT support services ITIL ITSM
Keylogger Kubernetes
Latency LDAP LTE
MAC address Machine learning algorithms Man Managed cloud as a service Master Data Management (MDM) MAX Data MetroCluster Microsoft SQL Migration to the cloud Mobility as a Service MongoDB Monitoring object MQTT server Multi-block Multi-tenancy Multi-tenant Multi-vendor support Multivendor MySQL
NAS NAT (Network Address Translation) NetApp HCI NetApp Storage NetApp StorageGRID Netflow Network equipment Network Security/Network Security Neural network NFS NGINX No-IP NoSQL NSX NVIDIA A800 NVIDIA Tesla V100 NVMe
On-demand self-service ONTAP Open Source Open Virtualization Format OpenStack Outsourcing Outstaffing
PAP Pay as you go Payment Gateway PCI DSS Certified Provider PCI DSS Compliant hosting PCI DSS Penetration testing Platform as a Service Platform services Point-to-Point Polymorphic virus PostgreSQL PPPoE PPTP Private Cloud Provider Proxy-server PSTN Public Cloud
QoE QSA audit Quantum computing
Radius RAID-TEC RAIDn Ransomware-as-a-Service (RaaS) Ransomware RDP Reaction time Redis Relational database Remote Desktop Remote workplace Risks of information security Rootkit RPO (Recovery point objective) RTO (Recovery time objective) RTSP
S3 SaaS (Software as a Service) Sak SAN SAP Cloud Platform SAP SATA Scareware Secure web gateway (SWG) Security as a service Security Information and Event Management (SIEM) Security Operations Center Security testing Serverless computing Service Desk SFO Simple Storage Service (S3) SLA SnapShot Spear Phishing SPOC Spring's Law Spyware SSH Protocol Storage (Data storage system) SyncMirror System security
Tensor kernels The agreed working hours The Logic Bomb The server Thin client Thin provisioning Trojan
UDR Unauthorized Access (NSD)
VDI Virtual data center (vDC) Virtual Machine (VM) Virtual Private Network (VPN) Virtualization Virus VLAN VMware ESXi VMware vCenter VMware vCloud Director VMware VPS vSphere vStack Vulnerability analysis Vulnerability Scanner
XaaS (Anything as a Service) XSS (Cross-SiteScripting)
We use cookies to optimise website functionality and improve our services. To find out more, please read our Privacy Policy.
Cookies settings
Strictly necessary cookies
Analytics cookies