Demystifying Managed IT: Terminology Guide

Demystifying Managed IT: Terminology Guide

When it comes to IT support and managed security services, understanding your business’s requirements can sometimes be hindered by unfamiliar terminology. Read more about some of the most commonly used terms, phrases, and abbreviations relating to managed IT services.


Rather than just protecting against computer viruses, antivirus software seeks to prevent a various kinds of malware, such as Trojan Horses, worms, adware and spyware. For this reason, it is often referred to as Antimalware.


Bring Your Own Device, or the practice of employees using their own laptops and mobile devices to access company files and systems, such as email.


Rather than running on your computer, Cloud-based Services run via the internet, which allows for low maintenance and ease of scalability. Google Docs, GMAIL and Dropbox are three examples of Cloud-based Services.


This stands for Endpoint Detection and Response. These solutions offer continuous monitoring, and will respond to security threats from hackers and cybercriminals


When data has been converted into a code, it has been encrypted. This prevents untrusted third parties from understanding the data they have acquired.


An endpoint is any device represents an ‘end’ to the network. Computers, mobile phones, servers, printers and Point of Sale devices are all endpoints, and they pose a significant security risk without the right IT security solutions.


A vital element of IT security. A firewall is a piece of software or hardware that places restrictions on the traffic coming into your network, and what data can be transferred to other networks.


Introduced in May of 2018, General Data Protection Regulation, or GDPR, comprises seven principles for the processing of personal data, which includes names, email and physical addresses, numbers, and IP addresses. An expert GDPR consultant can ensure that you are operating in accordance with regulations.


The Internet of Things describes the interconnection of devices that communicate via the internet. Smartphones, virtual home and office assistants, wearable technology, security systems and ‘smart’ lighting fixtures are all examples of devices connected to the IoT.


An Internet Service Provider is a company providing access to the internet, such as BT, Virgin, and Plusnet.


Information Security Management is the practice of implementing measures to protect the assets contained within a business’s network.


An office network is a LAN, or Local Area Network, made up of various computers, programmes and devices that share a line of communication.


A general term referring to malicious software including, but not limited to, viruses, spyware, and Trojan horses, which cause harm to a computer or computer network.


Mobile Device Management is an integral part of endpoint protection. It is the process of optimising mobile devices such as smartphones, tablets and laptops, in terms of functionality and security.

Managed Security Services

The services offered by a dedicated IT support provider focussed upon implementing the right security measures for a business’s network. Managed IT services include implementing firewalls and intrusion detection systems, security audits, and GDPR assessment.

Multi-Factor Authentication

Access to a computer, or certain files, is granted only after multiple factors (or pieces of evidence) are provided by the user. For instance, a password combined with a one-time passcode, which may be sent to the user’s smartphone, and/or a fingerprint.

This practice makes it significantly more difficult for hackers to access secured files or data.


An update or improvement for a programme or computer, which will enhance performance or strengthen any vulnerabilities to security threats.

Remote Access

The practice of gaining access to a computer or network from another location. This allows your managed security services provider to work very efficiently if they are not on-site.


Also referred to as a ‘test server’. In this virtual environment, software can be tested without being affected by other programmes. When it comes to managed security services, the sandbox can be used to test as-yet untrusted programmes, software or code without risking harm to the entire system.

Two-Factor Authentication

A subset of multi-factor authentication, requiring two pieces of evidence before allowing access.


One example of malware. They can be easily transferred between computers within a network, causing data corruption and theft, keystroke logging, file deletion, and various other inconvenient or devastating effects. Managed security services seek to implement various measures, from next generation antivirus to employee education, in order to avoid computers becoming “infected”.


A Virtual Private Network allows users to work and share within a private network, via a public network, which enables employees to continue working from their own, or while travelling.


Wi-Fi Protected Access is one of many managed security services used to keep a private network safe. It prevents unwanted traffic from entering your wireless network, and encrypts private data in order to prevent devastating breaches.

We hope you found this terminology guide useful and that is has helped to demystify some of the processes and methodologies involved with managed IT. I you’re looking for IT support, get in touch with Omircon Solutions today.

Get in touch