Glossary

Where It All Makes Sense

The industry’s most cutting-edge terms, explained. 

Starts with:
A

Active Directory 

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks. It’s essential in managing the identities and relationships that make up a network environment. It provides the foundation for a secure and efficient IT infrastructure for businesses, making it easier to manage users, computers, and other resources. 

Air Gap Backup

Air gap backup refers to a backup system that is physically isolated from the main computer or network, creating a “gap” between the two systems. This separation ensures that the backup data is not accessible to hackers or malware that may have infected the primary system. 

B

Backup as a Service (BaaS)

Backup as a service (BaaS) solutions offer cloud-based data backup and recovery capabilities without the presence of physical, on-premises hardware or appliances to host and run the backup infrastructure.

Backup Policy Enterprise Strategy

A backup policy is a set of rules and procedures that describe the enterprise’s strategy when making backup copies of data for safekeeping.

Business Continuity Disaster Recovery (BCDR)

“Business Continuity Disaster Recovery”, or “BCDR” for short, is used throughout the IT industry as a benchmark for organization resiliency in the face of unplanned disruptions. ‘Business Continuity’ refers to an organization’s level of readiness to continue mission-critical operations throughout and after an emergency or disruption.

C

Cleanroom Recovery

Cleanroom Recovery is a specialized data recovery process that ensures the secure and reliable retrieval of critical information from damaged storage devices in environments where data contamination poses a significant risk.

Cloud Storage

Cloud storage describes an IT infrastructure deployment model where storage resources reside in the cloud instead of being housed in data centers on-premises.

Containerization

Containerization is a method of software application deployment that involves packaging an application and its dependencies into a single lightweight container. The container provides a consistent and isolated runtime environment, which allows the application to run reliably and consistently across different computing environments, such as local machines, data centers, or cloud platforms. 

Cyber Deception

Cyber deception is a proactive security and defense tactic which hinges on deceiving bad actors and malicious attacks.

Cyber Kill Chain

The Cyber Kill Chain is a seven-stage model that describes the sequence of events in a typical cyber-attack. It provides a comprehensive framework for understanding the different stages of an attack and developing strategies to detect and prevent them.

D

Data Center Consolidation

Data center consolidation is an important strategy for many modern organizations. By combining multiple physical data centers into one or more larger data centers, organizations can save money, improve efficiency, and increase scalability.

Data Center Migration

Data center migration is the process of moving data and applications from one physical or virtual environment to another. This process can be complex but is necessary to keep up with changing technology and customer demands.

Data Deduplication

Data deduplication, also called “dedup”, eliminates duplicate or redundant information in a dataset. In short, dedup is a process that ensures only one copy of data exists in a particular dataset or block.

Data Encryption

Data encryption is a type of security process that converts data from a readable format called plaintext into an encoded, unreadable form called ciphertext.

Data Loss Prevention

Data protection is everyone’s job, not just an IT function. Data loss prevention (DLP) is part of a company’s security policy to prevent the loss, leakage, misuse, or access of data by unauthorized parties.

Data Management as a Service (DMaaS)

DMaaS stands for Data Management as a Service. It is a cloud-based service model that allows organizations to outsource their data management tasks and responsibilities to a third-party service provider.

Data Protection

Data protection refers to the practices, technologies, and policies that are used to safeguard data against unauthorized access, loss, corruption, and other threats. This includes protecting data at rest (stored data), in transit (data being transferred between systems), and in use (data being accessed by authorized users).

Data Retention Policy

An organization’s data retention policy is a set of rules that describe the types of data that will be retained by the entity and for how long.

Database Backup

Database backup is the process of creating a copy (backing up) of an organization’s structured data utilized by popular databases such as SAP HANA and Microsoft SQL Server.

Digital Transformation

Digital transformation is the process of using digital technologies to fundamentally change how a business operates and delivers value to its customers. It involves using digital technologies to automate processes, improve efficiency, and create new business models, products, and services. 

Disaster Recovery

Disaster recovery (DR) is the process of restoring an organization’s IT infrastructure and operations after a major disruption or disaster. The goal of disaster recovery is to minimize the impact of a disruptive event and restore normal operations as quickly as possible to minimize the impact on the organization’s business processes and reputation.

Distributed File System

The world of IT and computing has become increasingly complex and distributed, with data stored on multiple servers or devices. To manage this complexity, organizations are turning to Distributed File Systems (DFS) to store, organize, and share data in a secure and efficient manner.

Dynamics 365 Backup

Dynamic 365 Backup is simple. It is data backup for Microsoft Dynamics 365, which offers comprehensive coverage for CRM data stored within the platform, such as files, customer records, transactions, behaviors and preferences, as well as order information, inventory and shipping.

E

eDiscovery

Electronic discovery (eDiscovery) is the process of finding and collecting ESI – typically for lawsuits, investigation, or legal purposes.

Endpoint Backup

Endpoint backup solutions offer data protection for employee user devices, including desktops and laptops for today’s remote workforce.

F

File and Object Backup

File and object backup solutions offer data protection for two different unstructured data types: object storage and file systems. First, object storage is a computer data storage architecture that manages data as objects, unlike file systems that contain data in a file hierarchy.

H

Hybrid Cloud

Hybrid cloud is IT architecture that combines at least one private cloud, also known as an on-premises data center, with one or more public cloud services.

Hyper-Converged Infrastructure

Hyper-converged infrastructure (HCI) is a type of software-defined infrastructure that integrates computing, storage, and networking components into a single system. HCI aims to simplify data center management and reduce the complexity of traditional IT infrastructure.

I

IaaS, PaaS, and SaaS

IaaS PaaS and SaaS in the ever-evolving world of technology, cloud computing is revolutionizing how businesses operate and innovate.

K

Kubernetes Backup

Kubernetes backup is the process of backing up the components running in a Kubernetes orchestration platform, that is an abstraction layer for containerized applications and services.

M

Microsoft 365 Backup

Microsoft 365 (sometimes referred to as O365) is a popular SaaS (solution-as-a-service) offering for today’s businesses. With Microsoft 365, end users and organizations get a robust suite of productivity tools, which include Exchange Online, OneDrive for Business, SharePoint Online, and Microsoft Teams among others

O

On-Premises, Cloud, and Hybrid

When it comes to choosing the right technology solution for your business, understanding the key differences between on-premises, cloud, and hybrid solutions is essential.

R

Ransomware Protection

Ransomware protection is the process of preventing the occurrence of a ransomware event, and/or mitigating the risk of a successful attack.

RTO (Recovery Time Objective) and RPO (Recovery Point Objective)

RTO (Recovery Time Objective) and RPO (Recovery Point Objective) are two important metrics used in disaster recovery and business continuity planning.

S

SaaS Data Protection

SaaS data protection offers organizations tools to manage and safeguard critical SaaS apps, endpoints, and hybrid cloud environments from data loss threats such as corruption, accidental deletion, and malicious attack.

Salesforce Backup

Salesforce backup and recovery offers automated data protection for content, files, objects, metadata relationships, and more living in Salesforce production organizations and sandbox environments.

V

Virtual Machine Backup

Virtual machine backup (VM backup) is the process of backing up the virtual machines (VMs) running in an enterprise environment.

VMware Data Recovery

VMware Data Recovery is designed specifically for VMware virtualized environments and enables organizations to protect and recover their virtual machines (VMs) and data efficiently and reliably.

Vulnerability Network Scanning  

Vulnerability network scanning is an invaluable tool for keeping networks safe from malicious actors. It is a process that involves the scanning of a network for security weaknesses or vulnerabilities, and it can be done either manually or with automated software.

Z

Zero Trust Security

Zero Trust Security is a security approach that assumes that all user activity on a network or system is untrusted, even from users who have already been authenticated. 

FREE SAAS TRIAL


Get Started with Cloud-Delivered Data Protection Today!

Try enterprise-grade SaaS data protection with the simplicity of the cloud free for 30-days.

Quick Links
All Resources
Case Studies
Supported Tech
Webinars & Events
Training & Education