IT Glossary
Definitions of common IT and business technology terms. A quick reference for South African businesses. Terms with official sources include links for further reading.
Whether you are evaluating managed IT, preparing for compliance, or navigating security and cloud decisions, understanding the terminology helps. This glossary covers managed IT (MSP, SLA, RMM), security (SOC, SIEM, EDR, MFA, WAF, DLP), cloud (SaaS, IaaS, Kubernetes, FinOps), and compliance (POPIA, ISO 27001, King IV, PCI DSS). Where applicable, we link to official sources such as the Information Regulator and ISO so you can validate definitions and go deeper.
Managed IT
- MSP
- Managed Service Provider. A company that delivers ongoing IT management and support – monitoring, helpdesk, security, backup – typically on a per-user monthly fee. MSPs act as an outsourced IT department.
- SLA
- Service Level Agreement. A contract that defines expected performance, such as uptime percentage (e.g. 99.9%) and response times for support tickets. SLAs set clear expectations and often include remediation if targets are missed.
- RMM
- Remote Monitoring and Management. Software that MSPs use to monitor client systems, deploy patches, and manage endpoints remotely. Core tool for managed IT delivery.
- PSA
- Professional Services Automation. Software for MSPs to manage ticketing, billing, projects, and client documentation. Often paired with RMM for full MSP operations.
- vCIO
- Virtual Chief Information Officer. An outsourced or advisory role that provides strategic IT planning, budgeting, and technology roadmap guidance without a full-time executive hire.
- Patch management
- The process of deploying software updates and security patches to systems. Critical for closing vulnerabilities; often automated by MSPs.
- Uptime
- The percentage of time a system or service is available. SLA uptime (e.g. 99.9%) defines allowed downtime. 99.9% = ~8.76 hours downtime per year.
- MTTR
- Mean Time to Repair. Average time to restore a failed system or service. Used in SLAs and incident management metrics.
- Co-managed IT
- Hybrid model where an internal IT team works alongside an MSP. Internal handles day-to-day; MSP provides monitoring, security, backup, or overflow support.
- Break-fix
- Reactive IT support model: pay per incident when something breaks. No proactive monitoring. Contrast with managed IT (MSP).
- Helpdesk
- Central support team or system that handles user requests, incidents, and service tickets. MSPs typically provide helpdesk as part of managed IT services.
- NOC
- Network Operations Center. A team or facility that monitors IT infrastructure 24/7, handles alerts, and coordinates incident response. Often paired with SOC for full coverage.
- Ticketing
- System for logging, tracking, and resolving support requests. Tickets ensure nothing falls through the cracks and provide an audit trail for SLA compliance.
- Asset management
- Tracking and managing IT assets (hardware, software, licenses) across their lifecycle. Helps with budgeting, compliance, and security visibility.
- MDM
- Mobile Device Management. Software that manages, secures, and monitors smartphones and tablets. Enforces policies, remote wipe, and app deployment. Part of UEM.
- UEM
- Unified Endpoint Management. Single platform to manage desktops, laptops, mobile devices, and IoT. Extends MDM to all endpoints for consistent policy and visibility.
- Incident response
- The process of identifying, containing, and recovering from security or operational incidents. MSPs and SOCs follow defined playbooks for consistent response.
- Proactive monitoring
- Continuously watching systems for issues before users notice. Contrast with break-fix; enables faster resolution and prevents outages.
Security
- SOC
- Security Operations Center. A team or facility that monitors, detects, and responds to security threats 24/7. SOC-as-a-Service is an outsourced model where a provider delivers this capability without you building an in-house team.
- SIEM
- Security Information and Event Management. A platform that collects and analyses security logs from across your environment to detect threats and anomalies. SIEM is a core component of a SOC.
- EDR
- Endpoint Detection and Response. Software that monitors endpoints (laptops, servers) for suspicious activity, records behaviour, and enables rapid investigation and response to threats.
- Penetration testing
- Authorised simulated hacking to find security vulnerabilities before attackers do. Pen tests can cover external, internal, web applications, and network infrastructure.
- IAM
- Identity and Access Management. The practices and systems that control who can access what. Includes user provisioning, single sign-on (SSO), multi-factor authentication (MFA), and role-based access control.
- MFA
- Multi-Factor Authentication. Security that requires two or more factors to log in (e.g. password + SMS or token). MFA significantly reduces the risk of account compromise.
- Zero Trust
- A security model that assumes no trust by default. Every access request is verified regardless of where it comes from. "Never trust, always verify."
- XDR
- Extended Detection and Response. A unified security platform that correlates data from endpoints, email, cloud, and networks to detect and respond to threats across the entire environment.
- SSO
- Single Sign-On. Authentication that lets users log in once to access multiple applications. Reduces password fatigue and improves security when combined with MFA.
- VPN
- Virtual Private Network. Encrypted tunnel for remote access to corporate networks or to secure internet traffic. Essential for remote work and public Wi‑Fi security.
- Phishing
- Social engineering attack that uses emails or messages to trick users into revealing credentials or clicking malicious links. Often the first step in cyber attacks.
- Ransomware
- Malware that encrypts files and demands payment to restore access. Can cripple operations. Prevention requires backups, patching, and user awareness.
- OWASP
- Open Web Application Security Project. Non-profit that publishes the OWASP Top 10 (critical web vulnerabilities) and security guidance. Widely used for application security. Source: OWASP →
- NIST
- National Institute of Standards and Technology. US agency that publishes the Cybersecurity Framework and other security standards. Widely adopted by organisations globally. Source: NIST →
- Vulnerability
- A weakness in software or hardware that can be exploited by attackers. Patch management and vulnerability scanning help identify and fix them.
- Encryption
- Converting data into a format that only authorised parties can read. Protects data at rest (storage) and in transit (network). Essential for POPIA and security.
- Two-factor authentication
- Same as MFA. Requires two or more authentication factors (e.g. password + SMS or authenticator app) to reduce account compromise risk.
- Firewall
- Network security device that filters traffic based on rules. Blocks unauthorised access while allowing legitimate traffic. Can be hardware, software, or cloud-based.
- Malware
- Malicious software including viruses, trojans, spyware, and ransomware. Designed to damage, disrupt, or gain unauthorised access to systems.
- DDoS
- Distributed Denial of Service. Attack that floods a target with traffic from many sources to overwhelm and take it offline. Requires mitigation services to defend.
- Social engineering
- Manipulating people into divulging credentials or performing actions that compromise security. Phishing, pretexting, and baiting are common techniques.
- CVE
- Common Vulnerabilities and Exposures. A catalogue of known security vulnerabilities with unique identifiers. Used to track and prioritise patching. Source: CVE.org →
- Zero-day
- A vulnerability unknown to the vendor, with no patch available. Exploited before a fix exists. Zero-day attacks are among the most dangerous threats.
- DLP
- Data Loss Prevention. Tools and policies that prevent sensitive data from leaving the organisation. Monitors email, USB, cloud uploads, and network traffic.
- IDS
- Intrusion Detection System. Monitors network or host activity for malicious behaviour. Alerts on suspicious patterns; may work alongside IPS for automated blocking.
- IPS
- Intrusion Prevention System. Like IDS but can automatically block or mitigate threats. Sits inline in the network to stop attacks in real time.
- WAF
- Web Application Firewall. Protects web apps from attacks like SQL injection, XSS, and OWASP Top 10. Filters HTTP traffic before it reaches the application.
- RBAC
- Role-Based Access Control. Access permissions assigned by role (e.g. Admin, User, Viewer) rather than per user. Simplifies management and enforces least privilege.
- Least privilege
- Security principle: users and systems get only the minimum access needed. Reduces blast radius of compromise and limits accidental damage.
- Threat intelligence
- Information about current and emerging threats used to improve defences. Includes indicators of compromise (IOCs), attacker tactics, and vulnerability trends.
- APT
- Advanced Persistent Threat. Sophisticated, long-running attack by skilled adversaries (often nation-state or organised crime). Requires dedicated detection and response.
- PKI
- Public Key Infrastructure. Framework for managing digital certificates and public-key encryption. Used for SSL/TLS, code signing, and secure email.
- SQL injection
- Attack that injects malicious SQL into input fields to manipulate databases. In OWASP Top 10. Prevented by parameterised queries and input validation.
- XSS
- Cross-Site Scripting. Attack that injects malicious scripts into web pages viewed by others. In OWASP Top 10. Mitigated by output encoding and CSP.
- Business email compromise
- Scam targeting employees who handle payments. Impersonates executives or vendors to trick victims into wiring money. Training and verification reduce risk.
Cloud
- FinOps
- Financial Operations for cloud. The discipline of managing and optimising cloud spend through governance, visibility, and cost-conscious architecture decisions.
- SaaS
- Software as a Service. Cloud-delivered applications (e.g. Microsoft 365, Salesforce) accessed via the internet. You pay per user or subscription; the provider manages infrastructure.
- IaaS
- Infrastructure as a Service. Cloud-provided compute, storage, and networking (e.g. AWS, Azure). You manage the OS and applications; the provider manages the hardware.
- PaaS
- Platform as a Service. Cloud-delivered platform for developing and running applications (e.g. Azure App Service). The provider manages runtime and infrastructure.
- Hybrid cloud
- Combination of on-premises infrastructure and public/private cloud. Enables workload portability and gradual migration while keeping sensitive data on-prem.
- Multi-cloud
- Using multiple cloud providers (e.g. AWS, Azure, GCP) for different workloads. Avoids vendor lock-in but increases complexity. Requires strong governance.
- Cloud migration
- Moving workloads from on-premises to cloud. Can be lift-and-shift (rehost), refactor, or rebuild. Requires planning for cost, security, and performance.
- Lift and shift
- Migrating applications to cloud with minimal changes. Fast but may not optimise cost or performance. Good first step; refine later.
- Container
- Lightweight, portable unit for running applications. Packages code and dependencies. Docker and Kubernetes are common container technologies.
- Kubernetes
- Open-source platform for orchestrating containers. Manages deployment, scaling, and operations. The de facto standard for container orchestration.
- Serverless
- Cloud model where you run code without managing servers. Pay per execution. Examples: AWS Lambda, Azure Functions. Good for event-driven workloads.
- CDN
- Content Delivery Network. Distributed servers that cache content close to users for faster delivery. Reduces latency and offloads origin servers.
- Availability zone
- Isolated data centre within a cloud region. Deploying across zones improves resilience. Part of high-availability and DR design.
- Region
- Geographic area where a cloud provider operates data centres. Choosing a region affects latency, data residency (POPIA), and cost.
Compliance
- POPIA
- Protection of Personal Information Act. South Africa's data protection law. POPIA regulates how organisations collect, store, process, and share personal information and requires safeguards for data security. Source: Information Regulator →
- ISO 27001
- International standard for information security management systems (ISMS). Specifies requirements for establishing, implementing, and maintaining an ISMS. Widely used for certification. Source: ISO →
- GDPR
- General Data Protection Regulation. EU data protection law. South African businesses processing EU residents' data may need to comply; overlaps with POPIA concepts. Source: GDPR.eu →
- King IV
- South African corporate governance code. Covers IT governance, risk, and transparency. "Apply and explain" approach for listed companies and other organisations. Source: IoDSA →
- Cybercrimes Act
- South African legislation (Act 19 of 2020) that criminalises cybercrime and requires reporting of certain offences. Complements POPIA for data-related crimes. Source: Gov.za →
- SOC 2
- Service Organization Control 2. A framework for managing and reporting on security, availability, and confidentiality. Common for SaaS and cloud providers. Source: AICPA →
- PCI DSS
- Payment Card Industry Data Security Standard. Requirements for organisations that handle cardholder data. Mandatory for merchants and payment processors. Source: PCI SSC →
- HIPAA
- Health Insurance Portability and Accountability Act. US law governing protection of health information. Relevant for healthcare providers and their IT vendors.
- Data retention
- Policies defining how long data is kept before deletion or archival. Required for POPIA, GDPR, and industry regulations. Reduces risk and storage costs.
- Audit trail
- Log of who did what and when. Essential for compliance, forensics, and accountability. Systems should log access, changes, and security events.
- Information Officer
- Person responsible for POPIA compliance within an organisation. Must be registered with the Information Regulator. Ensures data protection practices. Source: Information Regulator →
- PAIA
- Promotion of Access to Information Act. South African law giving the right to access information held by public and private bodies. Complements POPIA. Source: Information Regulator →
General
- RTO
- Recovery Time Objective. The maximum acceptable time to restore a system or service after an outage. Used in business continuity and disaster recovery planning.
- RPO
- Recovery Point Objective. The maximum acceptable amount of data loss measured in time. For example, an RPO of 4 hours means you can tolerate losing up to 4 hours of data.
- BCP
- Business Continuity Planning. The process of preparing for and recovering from disruptions. BCP covers people, processes, and technology so critical operations can continue.
- DR
- Disaster Recovery. The technical side of recovering IT systems after a disaster. DR includes backup, replication, failover, and recovery procedures.
- Backup
- Copy of data stored separately for recovery. The 3-2-1 rule: 3 copies, 2 different media, 1 offsite. Essential for ransomware recovery and disaster recovery.
- MTBF
- Mean Time Between Failures. Average time between system failures. Used in reliability and availability planning.
- API
- Application Programming Interface. Allows applications to communicate. REST and GraphQL are common. Essential for integrations and modern architectures.
- Endpoint
- Device or node that connects to a network: laptops, desktops, servers, phones. Endpoint security (EDR, antivirus) protects these entry points.
- Bandwidth
- Maximum data transfer rate of a connection. Measured in Mbps or Gbps. Insufficient bandwidth causes slow applications and poor user experience.
- Latency
- Delay between request and response. Low latency is critical for real-time apps. Affected by distance, network quality, and server load.
- Redundancy
- Duplicate components (servers, links, power) so failure of one does not cause outage. N+1 or 2N are common redundancy designs.
- Failover
- Automatic switching to a backup system when the primary fails. Essential for high availability. Requires redundant systems and monitoring.
- Load balancing
- Distributing traffic across multiple servers to improve performance and availability. Hardware or software; often built into cloud services.
- Virtualisation
- Running multiple virtual machines (VMs) on one physical server. Improves utilisation, enables consolidation, and simplifies disaster recovery.
- Hypervisor
- Software that creates and runs VMs. Type 1 (bare metal) examples: VMware ESXi, Hyper-V. Type 2 runs on an OS: VirtualBox, VMware Workstation.
- VM
- Virtual Machine. Software emulation of a computer. Runs its own OS on shared hardware. Foundation of cloud IaaS and on-prem virtualisation.
- ERP
- Enterprise Resource Planning. Integrated software for finance, HR, supply chain, and operations. Examples: SAP, Microsoft Dynamics, Sage.
- CRM
- Customer Relationship Management. Software for managing sales, marketing, and customer service. Examples: Salesforce, HubSpot, Microsoft Dynamics 365.
- Active Directory
- Microsoft directory service for managing users, computers, and permissions. Central to Windows environments. Azure AD extends identity to the cloud.
- DNS
- Domain Name System. Translates domain names (e.g. example.com) to IP addresses. Critical internet infrastructure; DNS issues break connectivity.
- DHCP
- Dynamic Host Configuration Protocol. Automatically assigns IP addresses to devices on a network. Eliminates manual configuration and reduces errors.
- SSD
- Solid State Drive. Storage with no moving parts. Faster than HDDs for read/write. Standard for servers and high-performance workstations.
- RAID
- Redundant Array of Independent Disks. Combines disks for redundancy and/or performance. RAID 1 mirrors; RAID 5/6 provide parity. Protects against disk failure.
Official sources & frameworks
For authoritative definitions and guidance, refer to these regulators and standards bodies: