Technology Terms

With technology always changing, it can be hard to keep up. Here’s a glossary of technical terms that we’ll update on a regular basis so bookmark it and come back whenever you need a reference.


A/D – Active Directory

A Microsoft service that does things like store information about devices and users, verifies credentials, defines access rights, allows the management and storage of information, and provides a framework for deploying other related services (such as software updates).


ATP – Advanced Threat Protection

A cloud-based service focused on filtering e-mails to protect your business from unknown and unwanted online threats, such as malware and viruses. It is an IT guard against any “contaminated” links that may affect your company.


BDR – Backup & Disaster Recovery 

Ensures uptime, minimizes data loss, and maximizes productivity in the midst of an attack, natural disaster, or other compromising situation.


Blended IT

Blending of your own IT department with an outsourced IT company that helps you acquire a perfect blend of IT professionals needed for your company’s success.


CIE – Customer Immersion Experience 

Experience where customers are able to explore and discover hands-on with an interactive, virtual “sandbox” environment populated with data, files, personas, and Microsoft solutions at their own pace. This allows customers to experience how Office 365 and Windows 10 are directly relevant to their daily work.


CSP – Cloud Service Provider 

A company that provider some component of cloud computing — typically infrastructure as a service (IaaS), software as a service (SaaS), or platform as a service (PaaS) – to other businesses or individuals. 


EMS – Enterprise Mobility Suite

Microsoft EMS describes their service as a security tool that stands for “digital transformation with freedom and peace of mind.” The service helps guard your company data from attacks at multiple levels through complex processes meant to safeguard your IT activities.


Identity Management

Identity management determines whether a user has access to systems, but also sets the level of access and permissions a user has on a particular system. For instance, a user may be authorized to access a system but be restricted from some of its components.


MSP – Managed Service Provider

ISP – Internet Service Provider

A company that provides access to the internet to subscribers


IT – Information Technology

IT refers to anything related to computing technology, such as networking, hardware, software, the Internet, or the people that work with these technologies.


IT/Technology Roadmap

A visual document that presents and communicates an organization’s plan for technology initiatives.


LAN – Local Access Network

A group of computers and associated devices that share a common communications line or wireless link to a server.


M&A – Mergers & Acquisitions

Transactions in which the ownership of companies, other business organizations, or their operating units are transferred or consolidated with other entities.


MDM – Mobile Device Management 

Software that allows IT administrators to control, secure, and enforce policies on smartphones, tablets, or other endpoints.


Modern Workplace

A workplace that implements things such as wide open spaces as opposed to cubicles, flexible work schedules as opposed to the traditional 9-to-5, as well as expanded leveraging of technological solutions.


MSP – Managed Service Provider

IT services provider that manages and assumes responsibility for providing a defined set of services to clients.


NAS – Network Attached Storage (device)

A file-level computer data storage server connected to computer network providing data access to a group of clients.


Network Assessment

A review of your organization’s existing IT infrastructure, management, security, processes, and performance to identify opportunities for improvement and get a comprehensive view of the state of your IT. This helps you make more informed and strategic business decisions.


PKI – Public Key Infrastructure  

A set of roles, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.


PPQ – Pre Project Questionnaire

Questionnaire used to gage what is important for the following project.


QBR – Quarterly Business Review 

A typically once-per-quarter meeting with a customer to discuss business and how we can support them.


ROM – Rough Order of Magnitude

Rough estimation of a project’s level of effort and cost to complete taking place very early in the project’s life cycle.


RPO – Recovery Point Objective

The age of files that must be recovered from backup storage for normal operations to resume if a computer, system, or network goes down for a given reason.


RTO – Recovery Time Objective

The maximum tolerable length of time that a computer, system, network, or application can be down after a failure or disaster occurs. 


SLA – Service Level Agreement 

A contract between a service provider and the end user that defines the level of service expected from the provider. 


TAM – Technical Account Manager 

The TAM provides account management and high-level technical support to project teams and customers.


WAN – Wide Area Network

A wide area network is a private telecommunications network that interconnects multiple local area networks (LANs).


WAP – Wireless Access Point 

A hardware device or configured node on a local area network (LAN) that allows wireless capable devices.