888-MENDERS
Client Portal
Service Areas
Menlo Park
Oakland
San Francisco
San Jose
San Mateo
IT Services
Managed IT Services
Strategy
Cybersecurity
IT Solutions
Industries
Legal
Architecture & Engineering
Financial & Investment
BioTech & Healthcare
Government
Non-Profit
Company
Why Us
The Team
Careers
Tech Insights
IT Glossary
Blog
Service Areas
Menlo Park
Oakland
San Francisco
San Jose
San Mateo
IT Services
Managed IT Services
Strategy
Cybersecurity
IT Solutions
Industries
Legal
Architecture & Engineering
Financial & Investment
BioTech & Healthcare
Government
Non-Profit
Company
Why Us
The Team
Careers
Tech Insights
IT Glossary
Blog
Glossary
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
a
Access Control
Active Directory (AD)
Advanced Persistent Threat (APT)
Artificial Intelligence (AI) in Cybersecurity
b
Backups
BCDR – Business Continuity and Disaster Recovery
Botnet
Break/Fix Model
c
Cloud Computing
Cloud Security
Compliance Audit and Reporting
Compliance Requirements
Conditional Access
Content Filtering
Cyber Liability Insurance
Cybersecurity
Cybersecurity Framework (CSF)
d
Dark Web Scanning
Dark Web Security Exposures
Data Hygiene
Data Loss Prevention (DLP)
Denial-of-Service (DoS) Attack
Distributed Denial of Service (DDoS) Attack
e
EDR/MDR – Endpoint/Managed Detection & Response
Email Protection
Employee Security Training
Encryption
Endpoint Security
f
Firewall
g
Governance, Risk, and Compliance (GRC)
i
Identity and Access Management (IAM)
Immutable Backup
Incident Response Plan (IRP)
Incident Response Team (IRT)
Intrusion Detection System (IDS)
l
Log Retention (SIEM)
m
Malware
Managed Services
Managed SOC (Security Operations Centers)
Mobile Device Management (MDM)
Multi-Factor Authentication (MFA)
p
Password Hygiene
Password Policy
Phishing
Privileged Access Management (PAM)
r
Ransomware
Remote Desktop Protocol (RDP) Security
Risk Assessment
s
Secure Access Service Edge (SASE)
Shadow IT
Single Sign-On (SSO)
Software as a Service (SaaS) Monitoring
Supply Chain Security
t
Targeted Threat Protection (TTP)
The Cloud
Threat Intelligence
Two-factor Authentication (2FA)
u
USB Security
User Awareness Training
v
Virtual Private Network (VPN)
Virus Protection
Vulnerability Scanning
w
Web Application Firewall (WAF)
Wireless Security
z
Zero Trust Architecture
Zero-Day Vulnerability
We collect cookies to analyze our website traffic and performance; we never collect any personal data.
Accept