Adaptive access control is the process of using IT policies that allow administrators to control user access to applications, files, and network features based on multiple real-time factors.
Adaptive authentication is a method for verifying user identity and authorization levels based on factors such as location, device status, and end user behavior.
Application virtualization or app virtualization is technology that allows users to access and use an application from a separate computer than the one on which the application is installed.
Bring your own device (BYOD) is the evolving trend of employees using their personal devices like laptops, smartphones, tablets, or any consumer piece of information technology.
Business continuity is an organization's capability to maintain mission-critical functionality during and after a disaster, such as service outages, security breaches or other threats.
BYOD security is the set of tools used to reduce risks from bring your own device (BYOD)—the practice of using a personal device, instead of a company-issued one, for work purposes.
Cloud access security brokers (CASBs) are security solutions placed between cloud service consumers and providers, enforcing security policies when users or entities want to access cloud-based resources.
Cloud computing refers to the delivery of computing resources—things like applications, servers, storage, software, and networking—over the internet. Rather than host your own resources, you can use them as services from various cloud providers.
Cloud native is the name for an approach to building and running applications across private, public and hybrid clouds. When an app is "cloud native," it’s designed specifically to be developed and managed within a cloud environment.
The term "cloud services" refers to a wide range of services delivered on demand to companies and customers over the internet. These services are designed to provide easy, affordable access to applications and resources, without the need for internal infrastructure or hardware.
A collaborative workspace enables people to work together, regardless of their physical location. This means workers can to easily access the tools they need to seamlessly collaborate anywhere, from any device.
Cybersecurity is the collection of security tools, technologies, processes, and practices used to protect networks, users, devices, software, applications, and data from malicious digital actions known as cyberattacks.
Desktop as a Service (DaaS) is a cloud computing offering that enables businesses to deliver cloud-hosted virtual desktops to any device, from anywhere.
Device security is the defense of IT assets against harm and unauthorized use. Although the term “device security” is not as widely used as “cybersecurity,” it is a relevant concept that denotes the full range of practices for securing desktop PCs, laptops, smartphones, tablets, or Internet of Things (IoT) devices.
Digital transformation is the strategic adoption of digital technologies, such as a digital workspace, to improve processes and productivity, manage business risk and improve customer service.
Digital wellness (also known as digital wellbeing or digital health) is the pursuit of an intentional and healthy relationship with technology in the workplace and in personal life.
A digital workplace is a business strategy that brings together the tools, places, workstyles, culture, and skills employees need to do their best work and better serve their customers.
Disaster recovery is a set of prearranged plans and procedures that allow a company to recover its IT infrastructure in the event of an unanticipated event such as power outages, pandemics or weather emergencies.
Endpoint security refers to a methodology of network protection that requires devices on a corporate network to meet certain standards of compliance before access is granted.
Enterprise mobility management (EMM) is a set of technology, processes, and policies to secure and manage the use of corporate- and employee-owned mobile devices within an organization.
Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.
Hybrid IT is an enterprise computing approach that runs existing in-house IT infrastructure alongside public cloud services for various enterprise workload and data needs. Unlike hybrid cloud, the in-house and cloud resources in a hybrid IT environment are not integrated to work together as one.
A hybrid work model is the blending of in-office and remote work. An employee in this model may divide their time between commuting to the office and working from other locations.
Identity and access management (IAM) is used by organizations to manage digital identities and prevent unauthorized users from accessing sensitive data.
IT transformation is the process of aligning IT with the broader organizational goals. It is just one element of digital transformation and refers to the ways IT can deliver next-generation solutions.
Malware, short for malicious software, is an umbrella term for many types of computer programs created to disrupt or exploit a network, device, or service.
Managed desktops allow an organization to deliver virtual apps and desktops from the cloud to any end user device or location without worrying about virtual desktop infrastructure (VDI) deployment or management.
Mobile device management refers to any tool or software designed to help IT administrators control and secure mobile devices like smartphones and tablets across an organization.
Network access control (NAC), is a group of tools and methodologies aimed at improving the security, visibility, and access management of a network. NAC tools monitor and control the access to network resources according to a defined security policy.
Remote access is the act of connecting to IT services, applications or data from a location other than headquarters or other than that which is closest to the data center.
Remote working is a mode of work that allows employees of an organization to perform all their essential job responsibilities from outside traditional office space. By telecommuting from home offices, these out-of-office employees make up a remote workforce for that organization.
Role-based access control is an approach to identity and access management where the user is given access to a resource according to their role at the organization.
Controlling access is a major component of SaaS security, and Citrix solutions for secure internet access, single sign-on can help protect SaaS access.
The Secure Access Service Edge (SASE) model unifies modern networking and security functionality into one integrated architecture, so it’s easy to manage, but also uses the cloud to deliver the functionality closer to the user, so they can stay productive.
Secure remote access is the process of enabling secure connections to a network, application, or data, even when users are logging in from remote locations.
Software as a service (SaaS) is a software delivery model where applications are hosted in the cloud, delivered to customers via the internet, and licensed as subscriptions.
User behavior analytics is a process of baselining user activity and behavior combined with peer group analysis, to detect potential intrusions, and malicious activity.
A virtual desktop is a software emulation of a hardware device that runs on a physical or virtual machine at a remote location, hosted either on premises or in the cloud. Virtual desktops—such as Azure Virtual Desktop—enable end users to access their unique desktop environments remotely over a network.
Virtual desktop infrastructure (VDI) refers to the part of the IT environment dedicated to hosting desktop operating systems within virtual machines (VM). These virtual machines can run on a hosted, centralized or remote server or servers.
Virtualization is computing technology that simulates physical hardware functionality to create software-based IT services like applications, servers, storage, and networks.
Web application security is the group of technologies, processes, and methods used to protect web applications, servers, and web services from a cyber attack. Web application security products and services use tools and practices such as multi-factor authentication (MFA), web application firewalls (WAFs), security policies, and identity validation to maintain user privacy and prevent intrusions.
A workspace is a technology framework that brings together all the applications, tools and resources to get work done and collaborate securely, personalized for every individual in a digital world.
Workspace security refers to the application of tools and solutions to protect sensitive data, networks, and access in digital workspaces without disrupting the user experience.
A zero trust security model, or architecture, means that no user or device should have default access to an organization’s network, workspace, or other resources—even if they’re employed by the organization.