GLOSSARY
Technology terms related to cosmikal and Its solutions
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
A.
AEM
Autonomous Endpoint Management (AEM) is a system designed to simplify the management of devices within an organization’s IT environment. By automating tasks such as patch management, software deployment, and security enforcement, AEM improves operational efficiency, enhances security, and reduces manual workloads. It’s especially useful for IT teams managing large numbers of endpoints remotely.
AES
Advanced Encryption Standard is a symmetric encryption algorithm used to secure data by converting it into unreadable ciphertext. Known for its strength and efficiency, AES is widely adopted by governments, businesses, and software providers for protecting sensitive information. It supports key lengths of 128, 192, or 256 bits, with AES-256 considered among the most secure encryption standards available today.
ATTENDED REMOTE ACCES
Allows IT professionals to connect to a user’s device with their consent, typically during a live session. This access type is commonly used in remote support scenarios where the user is present to authorize and oversee the troubleshooting or assistance being provided.
AUGMENTED REALITY (AR)
Integrates digital information, such as images, sounds, and interactive elements, into the real-world environment. AR enhances user experiences by allowing real-time overlay of virtual elements on physical objects. For IT teams, an AR-enabled remote support tool allows the IT technician to see what the end-user sees through their device camera to provide guidance and support
B.
BYOD
Bring Your Own Device refers to a policy that allows employees to use their personal devices, such as smartphones, tablets, and laptops, to access company systems and data. BYOD policies increase flexibility but also introduce security challenges.
C.
CONNECTION BROKER
A connection broker is a solution that facilitates secure communication between users and the systems they access, ensuring that connections are made securely and efficiently. In the case of Endurance, its connection broker ensures that connections to protected systems are made only through secure channels, offering real-time session management, validation, and encryption features.
CCPA
The California Consumer Privacy Act is a state-level data privacy law that grants California residents greater control over their personal information. CCPA gives individuals the right to know what data is being collected, request deletion, and opt out of data sharing. Organizations subject to CCPA must implement transparency and data protection practices or risk legal and financial penalties.
CYBERSECURITY
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. It involves a variety of technologies, processes, and practices designed to defend against unauthorized access, data breaches, and other cyber threats.
CLOUD COMPUTING
Cloud computing refers to the delivery of on-demand computing resources—such as servers, storage, databases, and applications—over the Internet. It enables organizations to scale their operations, reduce costs, and improve flexibility by eliminating the need for on-premises hardware.
D.
DLP (Data Loss Prevention)
Data Loss Prevention (DLP) is a set of technologies and policies designed to prevent the leakage of confidential information outside an organization. DLP systems monitor and control the flow of data, detecting suspicious activities and blocking the transmission of sensitive information. Cosmikal integrates DLP capabilities into its Endurance solution, ensuring that critical information is not exposed through unauthorized access or vulnerabilities.
DISTANCE LEARNING
Distance learning refers to educational instruction delivered outside of a traditional classroom, often through digital platforms. This model allows students to access course materials and participate in classes from anywhere, providing flexibility in education.
E.
END TO END ENCRYPTION
End-to-end encryption is a security process where data is encrypted on the sender’s device and only decrypted on the recipient’s device. This ensures that no one, including service providers, can access the data while it’s in transit, making it an essential feature for secure communications.
ENDPOINT MANAGEMENT
Endpoint management is the process of overseeing and maintaining all devices that connect to an organization’s network, such as laptops, desktops, mobile devices, and servers. Effective endpoint management ensures that each device is secure, up to date, and compliant with organizational policies. It often includes patch management, monitoring, configuration enforcement, and threat detection.
F.
FERPA
Family Educational Rights and Privacy Act is a U.S. federal law that protects the privacy of student education records. It grants parents and eligible students the right to access, review, and request corrections to education records, and limits the disclosure of personally identifiable information without consent. Educational institutions must comply with FERPA by securing student data and ensuring appropriate access controls are in place.
G.
GDPR
The General Data Protection Regulation is a comprehensive data protection law enacted by the European Union to govern how personal data is collected, processed, and stored. It gives EU citizens the right to access, correct, and delete their personal data, and imposes strict requirements on organizations for data security, transparency, and consent. Non-compliance can result in substantial fines and legal penalties.
H.
HIPAA
Health Insurance Portability and Accountability Act is a U.S. law that sets national standards for protecting sensitive patient health information. It requires healthcare providers, insurers, and their business associates to implement physical, administrative, and technical safeguards to ensure data confidentiality, integrity, and availability. HIPAA compliance is essential for any organization handling electronic protected health information (ePHI).
HYBRID WORK
Hybrid work is a flexible work model that combines remote and on-site work, allowing employees to work from home or other remote locations part of the time while spending the rest in a traditional office setting. This setup improves work-life balance and often boosts productivity.
I.
IAM.
Identity and Access Management is a framework of policies and technologies that ensures the right individuals have access to the right resources at the right time. It is essential for maintaining security and compliance within organizations.
ITSM
IT Service Management encompasses a set of practices, policies, and tools designed to deliver and support IT services. ITSM frameworks like ITIL help organizations align IT processes with business goals, covering areas such as incident management, service request fulfillment, and change control.
IoT
The Internet of Things refers to a network of interconnected physical devices, such as sensors, appliances, and wearables, that collect and exchange data over the internet. IoT devices enable automation, real-time monitoring, and more intelligent decision-making across industries. However, they also present security and privacy challenges that require robust network and endpoint protection.
J.
JIT (Just-In-Time)
Provisioning refers to the dynamic, on-demand granting of access to systems or resources. Instead of assigning permanent access rights, JIT ensures that users are granted the necessary permissions only when needed and for a limited time, reducing the risk of unauthorized access and minimizing the attack surface.
K.
KERBEROS
Is a network authentication protocol that uses cryptography to verify the identity of users and protect communication between systems on a network. It is commonly used in corporate environments to ensure secure access to resources and services.
KEY MANAGEMENT
Is the process of managing and protecting cryptographic keys used to encrypt and decrypt information. In cybersecurity, proper key management is crucial to maintaining the integrity and confidentiality of data protected by encryption.
L.
LDAP
Lightweight Directory Access Protocol is a network protocol used to access and manage directory services, such as user databases and resources within a network. LDAP allows for user authentication and management of access permissions to systems.
M.
MDM
Mobile Device Management is a set of tools and policies that allow IT teams to control, secure, and enforce policies on smartphones, tablets, and other mobile endpoints. MDM solutions help organizations protect sensitive data, manage app usage, remotely wipe lost devices, and ensure compliance with internal security standards.
MFA
Multi-Factor Authentication (MFA) adds an extra layer of security by requiring users to verify their identity using multiple factors, such as a password, fingerprint, or a one-time code. MFA significantly reduces the risk of unauthorized access, even if one credential is compromised.
MSP (Managed Service Provider)
Is a third-party company that proactively manages a client’s IT infrastructure and end-user systems remotely, typically through a subscription-based model. MSPs offer a variety of IT services, including remote monitoring, security management, and data backup.
MALWARE
Short for malicious software, includes programs like viruses, ransomware, and spyware that are designed to harm or exploit devices and networks. It can steal sensitive information, disrupt operations, or give unauthorized access to attackers, making robust security measures critical.
N.
NAT (Network Address Translation)
Is a technique used in networks to allow multiple devices on a local network to share a single public IP address. This technology hides the internal IP addresses of devices behind a public IP address, enhancing security by preventing internal devices from being accessible from outside the network.
O.
ON-PREMISE
On-prem, short for on-premises, refers to IT infrastructure and software that are physically hosted within an organization’s facilities. Unlike cloud-based systems, on-prem solutions are managed internally by in-house IT teams. While offering more control over data and systems, on-prem deployments typically require a more significant investment in hardware, maintenance, and security.
P.
PAM
Privileged Access Management (PAM) is a security framework designed to control and monitor access to critical systems and data by privileged users. PAM tools enforce least-privilege access, record session activities, and provide real-time monitoring to mitigate insider threats and breaches.
PORT FORWARDING
Port forwarding is a network configuration technique that redirects incoming traffic from a specific external port to an internal IP address and port within a private network. It enables remote access to devices or services, such as remote desktops, webcams, or game servers, behind a firewall or router. While useful for enabling connectivity, port forwarding can introduce security risks if not properly configured, as it may expose internal systems to the public internet. For safer alternatives, secure remote access solutions like Splashtop can eliminate the need for port forwarding altogether.
Q.
QoS (Quality of Service)
Is a set of technologies that ensures the performance, availability, and reliability of communication networks, guaranteeing that certain types of traffic (such as video conferencing or critical applications) are prioritized over others. In the context of Cosmikal’s solutions, QoS can be integrated into corporate networks to ensure that access to critical systems and data transfer are carried out efficiently and without interruptions, even in environments with high bandwidth demand.
R.
RBAC
Role-Based Access Control assigns permissions to users based on their organizational roles. By restricting access to only what’s necessary for each role, RBAC improves security, ensures compliance, and simplifies permission management.
RMM
Remote Monitoring and Management (RMM) tools provide IT teams with the ability to monitor, manage, and maintain client systems remotely. These tools proactively detect issues, push updates, and generate detailed reports, ensuring smooth operations and minimizing downtime.
REMOTE ACCESS
Remote access is the ability to access a device from a remote location using a secure internet connection. It allows users to work or manage systems as if they were physically present on site.
REMOTE ADMINISTRATION
Is the process of managing and configuring systems, servers, or networks from a distant location. It allows IT administrators to perform tasks such as software installation, user management, security policy enforcement, and system monitoring using remote management tools, ensuring operational continuity without on-site access.
REMOTE ASSISTANCE
Enables IT professionals to troubleshoot and resolve technical issues on a user’s device from a distant location. It often includes real-time screen sharing, file transfers, and chat functionalities to provide seamless support.
REMOTE COLABORATION
Refers to using digital tools and platforms that allow teams to work effectively from different locations. Features like file sharing, video conferencing, and shared editing environments enable productivity without geographical constraints.
REMOTE DESKTOP
A remote desktop allows users to access and control a computer from another location. This technology is widely used for remote work, IT support, and accessing files or applications on a primary computer while away.
REMOTE DEVICE
Is any electronic device, such as a smartphone, tablet, laptop, or IoT device, that can be accessed or managed over a network. These devices enable flexibility and connectivity, especially in remote work environments..
REMOTE IT SUPPORT
Refers to the practice of providing technical assistance to users or devices from a different location using remote access software. IT teams can troubleshoot issues, install updates, configure settings, and perform maintenance without being physically present. This approach improves response times, reduces downtime, and allows businesses to support users across multiple locations efficiently.
REMOTE MANAGEMENT
Is the process of monitoring, maintaining, and administering systems, networks, or endpoints from a distance. IT professionals use remote management tools to ensure devices remain secure, up to date, and fully functional without on-site access. It plays a key role in modern IT operations, especially in distributed or hybrid work environments.
REMOTE MANAGEMENT SOFTWARE
Provides IT administrators with the tools needed to manage remote devices, servers, and networks. These platforms often include features like device monitoring, patch deployment, performance tracking, and automation. By centralizing control and visibility, remote management software helps organizations maintain operational continuity and minimize risks across all endpoints.
REMOTE SESSION
A remote session occurs when a user connects to another computer or device over a network to interact with its desktop or interface as if they were physically present. Remote sessions enable tasks like accessing files, running applications, providing support, or managing systems from a different location, often via remote desktop software or secure access platforms.
REMOTE SUPPORT
Remote support software allows IT professionals to provide technical support to users by accessing their devices remotely. It typically includes features like file transfer, live chat, and multi-platform compatibility, streamlining the troubleshooting process.
REMOTE TROUBLESHOOTING
Involves diagnosing and resolving technical issues on a user’s device or system without being physically present. IT professionals use remote access tools to investigate problems, run scripts, update settings, and apply fixes in real time, helping reduce downtime and support costs.
REMOTE WORKFORCE
Consists of employees who work outside of a traditional office environment, often from home or other off-site locations. Supported by remote access software, collaboration tools, and cloud services, remote work allows businesses to operate flexibly while reducing overhead and expanding their talent pool across geographies.
REMOTE WORK
Remote work is a work arrangement where employees perform their job tasks from a location other than the company’s main office, typically from home or another off-site location, utilizing technology for communication and collaboration.
S.
SHIELDED REMOTE DESKTOP
A shielded remote desktop is an advanced solution that secures remote access connections, providing a controlled and protected environment against attacks and unauthorized access. Cosmikal’s shileded remote desktop solution, integrated into Endurance, ensures that all remote connections are encrypted, authenticated, and protected from threats, making it an essential tool for corporate environments with high security requirements.
SIEM
Security Information and Event Management systems aggregate and analyze security data from across an organization’s infrastructure. They provide real-time threat detection, incident response, and compliance reporting, helping organizations maintain robust cybersecurity defenses.
SNMP
Simple Network Management Protocol is a standard protocol used to monitor and manage devices on a network. It allows IT administrators to gather performance metrics, detect faults, and configure devices like routers, switches, printers, and servers. SNMP is widely used in enterprise environments to support network health monitoring and infrastructure management.
SECURE REMOTE ACCESS
Ensures users can connect to devices or networks from distant locations without compromising security. It uses encryption, strong authentication, and secure protocols to protect against unauthorized access and data breaches.
T.
THINCLIENT
A thin client is a low-cost, low-power device that relies on central servers for processing and data storage. These devices are ideal for remote and secure work environments, where processing power is handled by the server rather than the local device. Cosmikal integrates thin client solutions into its product offering, providing a secure and efficient interface for accessing remote applications and systems through Endurance.
TECHNICAL SUPPORT
Technical support involves providing assistance and troubleshooting to users of technological products such as computers, software, or networks. It can be delivered in person, over the phone, or through remote access tools to resolve issues and ensure smooth operations.
U.
USER ACCOUNT CONTROL
User Account Control is a security feature in Microsoft Windows that helps prevent unauthorized changes to the operating system. When a task requires administrative privileges, UAC prompts the user for permission or an admin password. This helps protect the system from malware and unintended modifications by limiting elevated access to trusted actions only.
UNATTENDED ACCESS
Unattended access is a remote connection to a computer or device without the need for someone to be physically present to grant permission. It is particularly useful for IT support, maintenance, and device updates outside of business hours.
V.
VDI
Virtual Desktop Infrastructure is a technology that hosts desktop environments on a centralized server. Users can access their desktop from any device, enabling flexibility, improved security, and centralized management for IT teams.
VAULT
An encrypted vault is a secure storage location where access keys, passwords, and other sensitive data are kept. Encryption ensures that the stored information is protected from unauthorized access. In the context of Endurance, an encrypted vault is used to securely store privileged access credentials, safeguarding critical information in IT environments of companies that require a high level of security.
VPN
A Virtual Private Network connects a user’s device and the internet. VPNs are widely used to bypass geographic restrictions and enable access to remote networks.
W.
WoL
Wake on LAN is a networking standard that allows devices to be powered on remotely by sending a specific signal over the network. This feature is useful for IT administrators performing after-hours updates or troubleshooting.
WEB SECURITY
Web security is a set of practices and technologies designed to protect applications and websites from cyber threats such as code injection attacks, malware, and unauthorized access. In the context of Cosmikal, web security includes the protection of user interfaces, access to platforms, and applications through secure protocols, ensuring the integrity and confidentiality of the data exchanged.
X.
XSS (Cross-Site Scripting)
Is a security vulnerability in web applications that allows attackers to inject malicious scripts into pages viewed by other users. These scripts can steal sensitive information, such as cookies or user credentials. To prevent XSS attacks, applications must properly validate and filter user inputs and apply content escaping techniques. Cosmikal implements security measures to protect its solutions from XSS vulnerabilities, ensuring the integrity of web applications.
Y.
YAML (YAML Ain’t Markup Language)
YAML is a human-readable data serialization language commonly used for configuring applications and managing data in computer systems. It is especially popular in the world of software development and Infrastructure as Code (IaC).
Z.
ZERO TRUST
Is a security framework based on the principle of “never trust, always verify.” It assumes that threats can exist both inside and outside the network, so no user or device is granted access by default. Instead, access is granted based on strict identity verification, continuous authentication, and least-privilege principles. Zero Trust helps protect against data breaches, lateral movement, and insider threats.