Abbreviations/Acronyms Guide

As part of our tech blog, our aim is to unravel the intricacies of the ever-evolving world of technology. In this digital landscape, where acronyms reign supreme, understanding the language of tech is essential. From AI to IoT, from NAC to ZTNA, our blog serves as your guide through the alphabet soup of tech acronyms. Whether you're a seasoned pre-sales technical engineer, an aspiring entrepreneur, or simply a tech enthusiast, you can use the below reference guide to decode and help you explore the latest trends, innovations, and buzzwords shaping the future of technology.

 

Abbreviations/Acronyms

Meaning

RBI

Remote Browser Isolation

SWG

Secure Web Gateway

SDWAN

Software Defined WAN

WAN

Wide-Area Network

MDM

Mobile Device Management

EMM

Enterprise Mobility Management

NAC

Network Access Control

AP

Access Point

DLP

Data Loss Prevention

OT

Operational Technology

IIoT

Industrial Internet of Things

SCADA

Supervisory Control and Data Acquisition

ICS

Industrial Control Systems

MIoT

Medical Internet of Things

NGFW

Next-Generation Firewall

EPP

Endpoint Protection Platform

EDR

Endpoint Detection and Response

AI

Artificial Intelligence

ML

Machine Learning

MFA

Multi-Factor Authentication

ZTNA

Zero Trust Network Access

PAM

Privileged Access Management

WAF

Web Application Firewall

DDoS

Distributed Denial of Service

DevSec

Development Security

CSPM

Cloud Security Posture Management

CWPP

Cloud Workload Protection Platform

CASB

Cloud Access Security Broker

SASE

Secure Access Service Edge

SSE

Server-Sent Events

ZTE

Zero Trust Edge

SECaaS

Security as a Service

CDFW

Cloud Delivered Firewall

CNF

Cloud Native Functions

AIOps

Artificial Intelligence for IT Operations

SOAR

Security Orchestration, Automation, and Response

NDR

Network Detection and Response

MDR

Managed Detection and Response

SOCaaS

Security Operations Center as a Service

XDR

Extended Detection and Response

SIEM

Security Information and Event Management

SIM

Security Information Management

SEM

Security Event Management

VM

Virtual Machine

AES

Advanced Encryption Standard

BIOS

Basic Input/Output system

MSP

Managed Service Provider

VPN

Virtual Private Network

AV

Anti-Virus

SOC

Security Operations Center

CVE

Common Vulnerabilities and Exposure

IAM

Identity and Access Management

CTI

Cyber Threat Intelligence

IR

Incident Response

MSSP

Managed Security Service Provider

RTO

Recovery Time Objective

RPO

Recovery Point Objective

SSO

Single Sign-On

DNS 

Domain Name Server

HTTPS

Secure Hypertext Transfer Protocol

IBE

Identity-Based Encryption

IDS

Intrusion Detection System

IDP

Intrusion Detection and Prevention

OPSEC

Operational Security

 

Author: Adam Freeman, Presales Security Engineer at Exertis Ireland