Hyper Converged Infrastructure Hyper Converged Infrastructure (HCI) is a type of IT infrastructure that combines compute, storage, and networking into a single system. It is designed to simplify the deployment…
Amanda Girard
Microsegmentation
Microsegmentation Microsegmentation is a security strategy that divides a network into smaller segments, or microsegments, in order to reduce the attack surface and improve security. It is a form of…
NAC
NAC Network Access Control (NAC) is a security technology that enables organizations to control and monitor the access of users, devices, and applications to their networks. NAC is used to…
ZeroTrust
ZeroTrust ZeroTrust is a security concept that assumes that all users, devices, and networks are untrusted by default. It is based on the idea that organizations should not trust any…
Containerisation
Containerisation Containerisation is a technology that enables the packaging of an application and its dependencies into a single, self-contained unit. This unit, known as a container, can then be deployed…
Concept of Operations (ConOps)
Concept of Operations (ConOps) ConOps, short for Concept of Operations, is a document that outlines the operational concept for a system or project. It is used to define the system’s…
Systems Operations (SysOps)
Systems Operations (SysOps) Systems Operations (SysOps) is a term used to describe the activities and processes involved in the management, maintenance, and operation of computer systems. It is a broad…
Acceptable Use Policy (AUP)
Acceptable Use Policy (AUP) An Acceptable Use Policy (AUP) is a set of rules and guidelines that define the acceptable use of an organization’s information technology (IT) resources. It is…
Internet Protocol Security (IPsec)
Internet Protocol Security (IPsec) IPsec (Internet Protocol Security) is a suite of protocols used to secure communications over the Internet. It is a set of security protocols that provide authentication,…
Virtual Private Network (VPN)
Virtual Private Network (VPN) A Virtual Private Network (VPN) is a technology that allows users to securely connect to a private network over the internet. It provides a secure connection…
Network Load Balancing
Network Load Balancing (NLB) Network Load Balancing (NLB) is a technology that enables multiple computers to work together as a single system to provide high availability and scalability for network…
Transport Layer Security
Transport Layer Security (TLS) Transport Layer Security (TLS) is a cryptographic protocol that provides secure communication over the Internet. It is the most widely used security protocol today and is…