Plain English explanations of common IT terms
This glossary translates the technical terminology used in our IT assessments and reports into everyday language, helping you understand exactly what we're talking about.
Phone service delivered over the internet instead of traditional phone lines. Usually more flexible and cost-effective, allowing calls from computers, mobile devices, or desk phones.
A private telephone network used within a company. Legacy PBX systems are physical hardware boxes, while modern cloud PBX systems operate entirely online.
Virtual phone lines that deliver voice and other communications over the internet, replacing traditional analog phone lines at a lower cost.
Old or outdated equipment (like switches, routers, servers). This gear is expensive to run and maintain, frequently breaks down, and may no longer receive security updates from the manufacturer.
Technology that allows devices (like phones, cameras, or access points) to receive both power and data from a single Ethernet cable, eliminating the need for separate power supplies and reducing installation costs.
Creating secure, separate "lanes" on your network. This is crucial for security, as it isolates different types of traffic (like guest Wi-Fi from sensitive business systems), protecting your data from unauthorized access.
Equipment that can be configured, monitored, and maintained remotely via the internet, reducing the need for on-site technician visits and allowing faster problem resolution.
Software that automatically handles repetitive tasks and moves information between systems, reducing manual work and human error.
Reducing the number of different suppliers you work with to gain better pricing through volume discounts and simplify management.
A contract defining the level of service you can expect from a supplier, including response times, uptime guarantees, and what happens if they fail to meet these standards.
The ability for IT support to monitor, configure, and fix systems without physically visiting your location, reducing downtime and support costs.
Database security that controls which users can see specific rows of data, ensuring people only access information relevant to their role.
Systems that manage who can enter physical spaces (like offices or server rooms), often using keycards, mobile credentials, or biometric scans.
Video surveillance systems that record activity for security purposes. Modern systems are typically digital and can be accessed remotely.
Digital system for logging and tracking visitors to your premises, often replacing paper sign-in sheets with automated check-in kiosks and host notifications.
Software applications accessed via the internet on a subscription basis rather than installed locally. Examples include Microsoft 365, Salesforce, or Zoom.
The process of reviewing and reducing the number of different software subscriptions your team pays for to eliminate unnecessary and overlapping costs.
Ensuring each user has the appropriate level of software license for their needs—not paying for premium features they never use, and removing licenses when employees leave.
Highly cost-effective cloud storage specifically for old documents or data that you must legally keep for compliance but rarely need to access. Much cheaper than regular storage.
The process of moving data from one system or location to another, such as from local servers to cloud storage or from one software platform to another.
Can't find a term you're looking for? Contact us and we'll be happy to explain it.