top of page
Workers at Warehouse Computer

Resources

Navigating IT Jargon? Let us guide you!

Terminology

IT
IT stands for Information Technology. It's all about using computers, software, and networks to manage and process information. So, whenever you use a computer, smartphone, or the internet to do things like send emails, watch videos, or play games, you're interacting with IT!
MSP
An MSP (Managed Service Provider) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. MSPs provide a range of services, including monitoring, maintenance, support, and often cybersecurity, to help businesses optimize their IT operations and minimize downtime. They offer a cost-effective alternative to hiring and managing an in-house IT team, allowing organizations to focus on their core business activities while the MSP handles their IT needs.
MSSP
An MSSP (Managed Security Service Provider) is a company that offers outsourced monitoring and management of security devices and systems. They typically provide services such as threat detection, incident response, and vulnerability management to help organizations improve their cybersecurity posture.
What's the difference between an MSP and an MSSP?
The main difference between an MSSP (Managed Security Service Provider) and an MSP (Managed Service Provider) lies in their areas of focus and expertise:
 
MSP
  • An MSP typically manages a broad range of IT services, including infrastructure management, network monitoring, software updates, helpdesk support, and cloud computing.
  • MSPs focus on ensuring the overall functionality and performance of a client's IT environment, with an emphasis on maximizing uptime, efficiency, and productivity.
  • While some MSPs may offer basic security services as part of their offerings, security is not their primary focus.
​
MSSP
  • An MSSP specializes specifically in managing and enhancing the security of a client's IT infrastructure and systems.
  • MSSPs offer a range of security services, such as threat detection, incident response, vulnerability management, security monitoring, and compliance assistance.
  • The primary goal of an MSSP is to protect the client's digital assets, data, and sensitive information from cybersecurity threats and breaches.
  • MSSPs often utilize advanced security technologies, threat intelligence, and expertise to deliver comprehensive security solutions tailored to the client's needs.
EDR
EDR stands for Endpoint Detection and Response. It refers to a category of cybersecurity solutions designed to detect, investigate, and mitigate suspicious activities and threats on endpoints or individual devices within a network, such as laptops and mobile phones. EDR systems continuously monitor endpoint activities, such as file changes, process executions, and network connections, to identify potential security incidents. They provide real-time visibility into endpoint activities, enabling security teams to respond swiftly to threats, contain breaches, and prevent further damage. EDR solutions often include features such as threat intelligence integration, behavioral analysis, and automated response capabilities to enhance endpoint security posture.
MDR
MDR stands for Managed Detection and Response. It's a cybersecurity service where a third-party provider monitors and manages your organization's security operations. MDR services typically include continuous monitoring of networks and endpoints for threats, real-time threat detection and response, incident investigation, and remediation support. Essentially, MDR providers act as an extension of your internal security team, helping to bolster your defenses and respond effectively to cyber threats.
Backup and Disaster Recovery
Backup and Disaster Recovery (BDR) is a comprehensive strategy and set of processes aimed at protecting an organization's data and ensuring its continuity in the event of data loss or a disaster.

Backup involves making copies of data and storing them separately from the original source. These copies serve as a safeguard against data loss due to accidental deletion, hardware failure, or cyberattacks. Backups can be performed on various scales, from individual files to entire systems, and can be stored on-site or off-site, such as in the cloud.

Disaster Recovery refers to the plan and procedures put in place to restore data and IT infrastructure after a disruptive event, such as a natural disaster, cyberattack, or hardware failure. It involves the restoration of systems, applications, and data to ensure business continuity and minimize downtime. Disaster Recovery plans typically outline steps for data restoration, prioritization of critical systems, and communication protocols to coordinate recovery efforts.

Together, Backup and Disaster Recovery form a critical component of an organization's overall IT strategy, ensuring data integrity, availability, and resilience in the face of unforeseen events.
SaaS
SaaS stands for Software as a Service. It's a cloud computing model where software applications are hosted and provided to users over the internet, typically on a subscription basis. Instead of installing and maintaining software on individual computers or servers, users access the application via a web browser or API (Application Programming Interface). SaaS providers handle all aspects of software maintenance, including updates, security patches, and infrastructure management, allowing users to focus on using the software rather than managing it. Popular examples of SaaS applications include Google Workspace, Microsoft Office 365, and Salesforce.
Network Infrastructure
Network infrastructure is like the digital plumbing that connects all the devices in a company or across different places, allowing them to talk to each other and share information. It includes things like Wi-Fi routers, switches, and cables that physically link computers, printers, and smartphones together. Think of it as the internet's backbone! It also includes important rules and protections to keep data safe, like firewalls and encryption, and tools to keep everything running smoothly. So, whenever you send an email, watch a video, or share a file with someone else, you're using the network infrastructure!
Cloud Computing
The delivery of different services through the internet which includes tools and applications like data storage, servers, databases, networking and software.
Firewall
A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.​
Sentinel
One

SentinelOne is a cybersecurity company specializing in endpoint security. Their primary product is an endpoint protection platform (EPP) that uses artificial intelligence and machine learning algorithms to provide real-time protection against various types of cyber threats, including malware, ransomware, and other forms of malicious software.

 

The platform is designed to automatically detect and respond to cyber threats across a wide range of endpoints, including laptops, desktops, servers, and mobile devices. SentinelOne aims to provide comprehensive security for organizations of all sizes, helping them defend against increasingly sophisticated cyber attacks.

Network Topology
Network topology refers to the arrangement or layout of connected devices in a computer network. It outlines how devices such as computers, printers, servers, and routers are interconnected and how data flows between them.
Acronis
​Acronis is a software company known for its data protection solutions, including backup, disaster recovery, and secure file sync and share services. Their products are designed to help individuals and businesses safeguard their data and ensure business continuity in the event of data loss or system failures. Acronis offers a range of solutions for different platforms, including personal computers, servers, virtual machines, and cloud environments.
Microsoft 365

A suite of productivity and collaboration tools offered by Microsoft. Microsoft 365 includes various applications and services such as:

  1. Microsoft Office apps (Word, Excel, PowerPoint, Outlook, etc.)

  2. OneDrive for cloud storage

  3. Exchange Online for email hosting

  4. SharePoint for team collaboration and document management

  5. Teams for communication and collaboration

  6. Microsoft Intune for device management

  7. Azure Active Directory for identity and access management

Microsoft 365 is available in different subscription plans tailored for individuals, businesses, and enterprises, offering various features and functionalities to help users work efficiently and collaborate effectively.

    © 2024 by IT Success, LLC. 

    bottom of page