Cloud
Networking
Security
Hardware
Misc.
100

Name of Microsoft's Cloud offering for Office Products and Services?

Office 365

100

Who is our primary enterprise networking partner?

Cisco Meraki

100

A cybersecurity solution that monitors, detects, and responds to malicious activity on endpoints

EDR or Endpoint Detection and Response 

100

Who is our primary desktop and server vendor?

Dell

100

A security technology that requires users to provide more than one form of identification to log in to an account.

2FA, MFA, Multifactor Authentication, Two-Factor Authentication

200

A service that protects and restores data from Microsoft 365, such as OneDrive, SharePoint, and Exchange mailboxes. It's designed to help ensure that an organization's data is always recoverable and protected.

Office 365 Backup

200

A device that allows wireless devices to connect to a wired network

Access Point

200

A security model that assumes that no users or machines should be automatically trusted. It's based on the principle of "never trust, always verify" and requires verification for every access request.

Zero Trust
200

The process of regularly updating or replacing a company's computer fleet to improve performance, security, and employee experience.

PC Fleet Refresh or Fleet Refresh


  • SecurityNewer computers have more processing power, which allows them to run better software that can defend against cyber threats.

  • Employee experienceNew technology can help employees work more flexibly and effectively, which can improve recruiting and retention.

  • Cost savings Companies can save money in the long term by offering newer machines that need less maintenance. Also, large orders can qualify for larger discounts than ordering individual units.

200

A backup process where an entire computer system, including its operating system, applications, settings, and all data files, is backed up as a single image

Machine Based Backup

300

A program that identifies and prevents unwanted emails from reaching a user's inbox.

Spam filter

300

A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line.

VoIP or Voice Over IP

300

which is a centralized unit that monitors and manages an organization's security including their SIEM. SOCs are responsible for detecting, responding to, and mitigating cyber threats to an organization's IT infrastructure.

SoC or Security Operations Center

300

A device connects multiple computers or devices in a local network, allowing them to communicate with each other directly.

Switch

300

The process of copying and storing digital backups on remote servers operated by a third-party cloud service provider

Cloud Backup

400

A Microsoft product that allows users to store, organize, and share information, and collaborate with others

Sharepoint

400

A network security system that combines multiple security features into one device to protect a network from cyberthreats. 

Can include security features such as:

  • Antivirus
  • Content filtering
  • Email and web filtering
  • Intrusion detection and prevention
  • Network firewall
  • Anti-spyware

Provided by vendors like Cisco Meraki, Fortigate Fortinet, and others.

UTM or Unified Threat Management

400

Teaches people how to identify, understand, and avoid cyber threats. The goal is to reduce the risk of cyber threats to both the organization and its stakeholders.

Cybersecurity awareness training

400

A computer, software program, or storage device that provides services, data, or resources to other computers, called clients, over a network.

Server

400

The practice of renting space in a third-party data center to house a company's servers, IT equipment, and data storage

Colocation

500

A cloud-based platform that helps companies manage users, devices, and applications

Hosted Directory, Entra (formerly AzureAD) or Jumpcloud

-Benefits manage all platforms from a single location. (PC, Mac, Linux, Tablets and Phones)

-Control user access regardless of physical location.

500

A network security concept that combines network and security functions into a single cloud service.

SASE or Secure Access Service Edge

500

collects event log data from various sources, analyzes it in real-time, and takes action. It helps organizations: 

  • Detect, analyze, and respond to security threats 
  • Improve the detection and remediation of security issues 
  • Provide an extra layer of defense 
  • Meet compliance requirements

SIEM or Security Information and Event Management

500

A security system that prevents unauthorized access to a computer network.

Provided by vendors like Cisco Meraki, Fortigate Fortinet and others.

Firewall

500

A tool that stores and manages login credentials for online accounts, helping users avoid having to remember multiple password.

Password Manager