There are hundreds of cloud related products and services out there today. Far more than we could ever even attempt to fit in to a beautifully crafted blog post. SEO eat your heart out, but even the biggest of geeks have their limitations.
But we have pulled together a glossary of what’s what in the cloud. Naturally, the aaaaaalphabetical list starts strong…
Active Directory Domain Services (AD DS) is Microsoft's pre-cloud directory-based identity related services.
Advanced Threat Analytics (ATA) from Microsoft helps protect businesses from advanced targeted cyberattacks and insider threats. ATA is really clever; detecting suspicious activity and then adapting and learning, keeping up with the changing threats and user behaviours.
Advanced Threat Protection (ATP) solutions are designed to defend against complex malware attacks that specifically target sensitive data.
Antivirus 30% of businesses with antivirus solutions have either incorrectly configured or deployed them.
Azured Australia is our sister company, located in sunnier climes…and where the Azured journey began. We might live miles apart – but we work closely together.
Azure Cloud is made up of more than 200 products and cloud services. We probably won’t cover them all here…but we’ll have a damn good try.
Azure Active Directory was replaced with Microsoft Entra ID in May 2022.
Azure Active Directory Domain Services enables you to join Azure virtual machines to a domain without domain controllers.
Azure Cost Alerts allow you to monitor usage in a more budget-friendly way. Best of all, it's automated so you'll be alerted as soon as you go over your set thresholds and spending limits.
Azure Landing Zone brings together all your subscriptions in to Azure for scale, security, governance, networking and identity.
Azure Migrate and Modernise (AMM) programme is funded by Microsoft and helps accelerate and simplify client migration and modernisation projects. As we hold the Microsoft Azure Specialisations, we can access funding from Microsoft to deliver AMM projects for clients, providing they meet certain criteria.
Azure Virtual Desktop combines the scale, security and cost benefits of Azure and Microsoft 365 – for a secure, seamless remote desktop experience from pretty much anywhere in the world, be it café, boat or mountainside. Remote and hybrid teams, we see you.
Azured Baseline Security Review does exactly what is says on the tin. It’s our mainstay, the kick-starter to any IT project. It provides an in-depth report covering Azure Active Directory, Single Sign-On, Email Security, Conditional Access, Azure and Active Directory.
Azured Data Protect is our fully managed data protection service with digital rights management. We’re here to make sure your critical business data and IP remains yours, and only yours.
Azured Identity Protect for safe access, protection and monitoring of all your business-critical apps, data and files in the Azure cloud.
Azure Network Security provides everything you need to keep your network secure with Azure Firewall, Azure DDoS, Azure Front Door, Azure Bastion and Azure Content Delivery Network. A Forrester study looking at the cost savings and business benefits provided by Azure Network Security reported a 165% ROI.
Azured Remote Protect is our fully managed, subscription-based Firewall as a Service, powered by next-gen technology from Palo Alto…with some funky stuff behind the scenes making enterprise-grade security solutions affordable for SMBs.
Azured Sentinel Starter Kit from Azured is designed to introduce, establish and provide a framework for working with Microsoft Sentinel. (See also 'Microsoft Sentinel')
Breached! is our LinkedIn newsletter. This is where we share some of our favourite content that we think our network will find useful, interesting – or even maybe both. It’s easy to subscribe, just sign up here.
Cloud Adoption Framework (CAF) is a full lifecycle framework that enables cloud architects, IT professionals, and business decision makers to achieve their cloud adoption goals. It provides best practices, documentation, and tools that help you create and implement business and technology strategies for the cloud. Following best practices for the CAF allows your organisation to better align business and technical strategies and ensure success.
Cloud Security Review is our flagship solution, providing you with a comprehensive report, which includes the current security posture of your Microsoft environment, the configuration health of your identity and devices, and recommendations for the foundations to build a secure, robust IT infrastructure.
Conditional Access policies are, at their simplest, if-then statements, i.e. if a user wants to access a resource, then they have to complete an action first. For example, if a finance manager wants to access the payroll system, they will need multi-factor authentication to access it.
CMBD (configuration management database) is a central database used to store information about all the hardware and software installations in your network IT environment, allowing managers to identify, manage, control and configure assets across their environment.
Customer Charter We’re really quite proud of who we are and the service experience we deliver to our clients. So much so that we’ve written the Azured Customer Charter to show we’re serious about our space in the Azure cloud security world.
Cyber Essentials is a UK government-backed scheme to help protect organisations against the most common cyberattacks. It’s seen as a good benchmarking standard.
Cyber Insurance is specifically designed to protect businesses from data breaches and cyber-attacks. It’s predicted that the global cyber insurance market will grow from $7bn to $20.6bn by 2025.
Cybersecurity as the attack surface area and the level of sophistication of cyberattacks increase, businesses need to consider the operational, financial, reputational and strategic consequences a cyberattack would have on the way they do things.
Cyber Strategy should be based around the framework of Identity, Protect, Detect, Response, and Recovery. It should be specific, actionable, realistic – with a roadmap for delivery. Consider how to calculate and manage risk, plug vulnerabilities, and how to implement the next steps of your cyber strategy. We know it sounds like a lot of hard work and that your time is just too precious, but when there’s a hacker at your door…
C360 is a groundbreaking SaaS platform from our trusted Microsoft Teams partner, Conversant, that seamlessly manages all your communication services within your Microsoft Teams environment.
Data Loss Prevention (DLP) for intelligent detection and control of sensitive information across Office 365, One Drive, SharePoint, Microsoft Teams – and the endpoints to which they’re connected.
Data Breach More than 60 per cent of businesses go bust after experiencing a data breach.
Databricks was named a Leader in Gartner’s Magic Quadrant for Data Science and Machine Learning platforms, and provides one platform to unify all your data, analytics and AI workloads.
Database Migration simplifies on-premises database migration to the cloud.
DDoS Attacks aim to overwhelm online services and ultimately, take that service offline. Help defend against attacks with Azure DDoS Protection.
Device Management In the chain of cloud security, the device is often the weakest link. So much can go wrong. Out of date software and operating systems, inadequate protection, user error… and with the number of networked devices expected to hit 29.3 billion devices by 2023, there’s no better time to get your devices in order.
Digital Transformation Moving over to the cloud is rarely an easy decision for any business. And, as with anything worthy of your time and effort, preparation is key; user management, network, storage capacity, perimeters, firewalls, servers, and devices all need your consideration.
Dynamic Multipath Optimisation (DMPO) uses techniques developed by VMware to deliver a resilient solution that considers the current performance of WAN links.
Email Security is a beast. It covers everything we need to predict, prevent, detect and respond to both attacks and access protection…for the 306.4 billion emails that were sent in 2021 alone.
Endpoint Protection Platform (EPP) is a security solution for endpoints, i.e. servers and devices, to protect against cyberthreats like antivirus protection, firewalls, anti-malware software, and data loss prevention (DLP). EPPs typically sit in the cloud, using cloud data to support businesses with advanced monitoring and remote remediation. See Microsoft Defender for Endpoint.
Endpoint Security protects endpoints, your network-connected devices like laptops, mobile phones, servers. Endpoint security protects, yep you got it, all the endpoints, from all those malicious actors.
Exchange Online Protection is Microsoft's cloud-based filtering service that protects against spam malware and other email threats (and great for securing your business against phishing attacks).
Firewall Secure your network by monitoring all incoming and outgoing traffic – and controlling what’s allowed in and out of your organisation. Rules and policies are where the fun starts, and things are even better when the firewall is configured and deployed correctly…
Firewall as a Service (FWaaS) is our next-gen firewall with a managed internet gateway in Microsoft Azure, underpinned by the latest Palo Alto tech. Fully managed and subscription-based, for total flexibility and scalability. We currently manage 50+ firewalls in the UK and Australia so we know a thing or two...
Gartner If there's anything worth knowing in the world of cloud technology research, let Gartner be your oracle.
Human Operated Ransomware is where cybercriminals infiltrate an organisation’s IT infrastructure, elevate their privileges, and deploy ransomware to critical data. It's different from traditional ransomware as these attacks target an entire organisation – rather than deploying malware on a single device. They are one of the most significant and impactful trends in cyberattacks today...but they are preventable.
Hybrid Cloud IT strategies combining on-premises and cloud infrastructure is a pretty common sight, either during the transition to full cloud or, believe it or not, forever and ever.
Identity and Access Management (IAM) Your name’s not down, you’re not coming in. With complete control over who can access what and when – your personalised policies decide who can come in, how long they can stay for – and if you’d like them to show you an extra form of ID along the way (MFA, anyone?). Download our free guide to Cloud Identity and Access Management.
Into The Blue is our monthly e-newsletter delivered directly to your inbox. Sign up to receive our best bits of insight and information about cloud security, all in one place.
Jumanji Navigating your way through the pitfalls of cloud adoption can be a bit like playing the game Jumanji – without the monkeys and Dwayne Johnson (more’s the pity). If you get stuck, you could always try calling our name out loud three times.... Azured. Azured. AZURED!
Keepnet Labs is a service that helps expose vulnerabilities in your email setup as well as your user behaviour and helps remediate them. There's a real emphasis on the human factor in email security.
Luxury Yacht What we can all kick back on once our cloud security, much like the yacht itself, is watertight. Sangria in hand, sun cream at the ready, mankini donned, slightly dubious paella waiting... Enjoy!
Log management SIEM systems (see SIEM) gather vast quantities of data (far more than you or I could ever even attempt to manage) – log management ensures the data is stored and organised correctly, and determines whether it shows signs of a threat, attack or breach.
Man-in-the-Middle Attacks MITM attacks involve a hacker sitting between a network user and a web application (or server) that they’re trying to connect to. Just sitting there, collecting your personal data, passwords, banking details…
Mobile Device Management MDM allows admins to control, secure, configure, deploy and enforce policies on mobile endpoints like mobile phones, tablets and laptops.
Microsoft 365 formerly knows as Office 365. Work securely in the cloud from just about anywhere with Outlook, Teams, Word, Excel, PowerPoint and SO many more apps and services.
Microsoft 365 Copilot combines the power of large language models (LLMs) with your data in the Microsoft Graph (your calendar, emails, chats, documents, meetings, and more) and the Microsoft 365 apps to turn your words into the most powerful productivity tool on the planet.
Microsoft Defender Advanced Threat Protection (ATP) for preventative protection, post-breach detection, automated investigation, and response. It’s fair to say, it's got your back in the Azure cloud.
Microsoft Defender for Cloud Apps protects your multi-cloud and hybrid environments by providing rich visibility, control over data travel, and sophisticated analytics to identify and combat cyberthreats across all your cloud applications in your environment
Microsoft Defender for Endpoint is a new and complete endpoint security solution. Easy to use and cost effective, businesses can secure their Windows, macOS, Linux, Android, iOS, and network devices against sophisticated threats including malware and ransomware.
Microsoft Defender for Office 365 protects your Office 365 subscriptions against advanced threats like business email compromise and credential phishing, and automatically investigate and remediate attacks. Named a Leader in The Forrester Wave: Email Security 2021.
Microsoft Digital Defence Report includes practical information and guidance from the security experts at Microsoft – empowering businesses to defend themselves against the risk of cyberthreats.
Microsoft Entra is the product family name for all identity and network access solutions from Microsoft. It’s part of the Microsoft Security portfolio, which also includes Microsoft Defender for cyberthreat protection and cloud security, and Microsoft Sentinel for security information and event management (SIEM).
Microsoft Entra ID (formerly Azure Active Directory) is the master. The complete identity and access management solution from Microsoft with integrated security, connecting a whopping 425 million people to their apps, devices and data, every month. Microsoft Entra ID helps organisations secure and manage identities for hybrid and multi-cloud environments.
Microsoft Gold Partner Azured is a certified Microsoft Gold Partner – our crew over in Australia have even been recognised as a top 3 Microsoft Azure Partner in the Australian SME market. As a company, we take our Gold status very seriously.
Microsoft Intune focuses on mobile device management (MDM) and mobile application management (MAM). Intune gives you complete control of all devices and apps, and ensures compliance across your organisation.
Microsoft Remote Desktop is an app that allows you to connect to a remote PC or virtual apps and desktops.
Microsoft Secure Score allows you to measure the strength of your organisation's security, tighten any areas that need tightening, and track your progress across your entire cloud environment.
Microsoft Sentinel is a security information and event management platform. See also 'Azured Sentinel Starter Kit'.
Multi Factor Authentication or MFA is recommended by Microsoft as the single most important deterrent against cyber attacks. We’ve said it once, we’ve said it twice…and we’ll probably never stop saying it.
Network as a Service (NWaaS) by Azured. Optimise your network, deliver key applications faster and more securely, and reduce costs and management with NWaaS, our fully-managed SD-WAN solution powered by VMWare VeloCloud.
Network-based Attacks are carried out using vulnerabilities within the network or application and include DDoS attacks, eavesdropping Attacks, SQL injection and cross-side scripting (XSS) attacks.
Next-Generation Firewalls (NGFW) have been designed to address advanced security through intelligent, context-aware security features. The only type of firewall worthy of Azured's Firewall as a Service (FWaaS).
Office 365 Advanced Threat Protection (ATP) is a cloud-based email filtering system to protect your business against unknown malware and viruses
Palo Alto We believe the Palo Alto firewall is the best firewall in the market, so it made sense for us to build our FWaaS around their technology. Palo’s next-gen intelligent firewalls are the most successful in reducing risks and preventing attacks.
Passphrases are the new form of password with three or more random words put together. Numbers and characters should be added to strengthen them, like ToTheMoonAndBack007. Avoid things like pet’s names, favourite holidays – anything that can be found on your social profiles (see social engineering).
Passwords The list of the 10 most common passwords are eye-wateringly difficult to comprehend in such a complex world. It seems there are plenty of folk adopting a “keep it simple” approach with one weak password used across multiple identities, devices and applications. Locking down those strict password policies is crucial.
Phishing is a type of cyberattack that tricks users into opening emails, texts or instant messages. Here are some tips to protect your business against phishing attacks.
Power BI is a collection of software services, apps, and connectors that work together to turn unrelated sources of data into coherent, visually immersive, and interactive insights.
Privileged Identity Management (PIM) is a service in Azure Active Directory that enables you to manage, control, and monitor access to important resources within your organisation. If you’re looking to minimise the number of people with access to secure information or resources, PIM might be the answer.
Qui-Gon Jinn. Now, we know we’re clutching at straws here – but you try thinking of a cloud-related subject beginning with Q. All we can say is Qui-Gon was the imparter of some of the best advice ever, “Feel, don’t think. Trust your instincts. And your cloud security specialist”. Yep, he really did say that.
Ransomware is a form of malicious software (or malware) designed to encrypt files, databases and applications, blocking users and administrators from accessing systems until a hefty ransom is paid.
Ransomware as a Service Cybercriminals operating illegal RaaS businesses help orchestrate attacks, including providing the decryption methods and handling the ransom payment.
Recovery Plan It’s fair to assume you’re going to be hacked. But having a Recovery Plan in place will keep any downtime to a minimum and ensure the team knows how to proceed in the event of an attack. Documenting the process will potentially highlight any gaps in your business before a problem arises.
Remote Access allows staff to securely access their desktop computers or servers from another device over the internet.
Remote Working According to Gartner, 48% of employees will work remotely in the post-pandemic world. The recent increase in cyberattacks isn’t just down to an increase in remote working. But the speed and haste at which systems were configured and deployed, during the rush get everyone working remotely, might have some explaining to do.
Secure Access Service Edge or SASE (pronounced “sassy”) is a technology used to deliver wide area network (WAN) and security controls as a cloud computing service directly to the source of connection (user, device, branch office, Internet of things (IoT) device, or edge computing location) rather than a data centre.
SD-WAN We strive to work with the best and as far as WAN edge infrastructure goes, there is no better choice than VMware SD-WAN. The concept is a bit of a mind-bender, so we put together a short explainer video.
Security Adoption Framework (SAF) provides guidance for organisations through end-to-end security modernisation across a 'hybrid of everything' multi-cloud and multi-platform technical estate.
Sentinel is Microsoft's SIEM is a Leader in Gartner's Magic Quadrant for security information and event management solutions.
SIEM, which is a much shorter way of saying Security Information and Event Management, is the monitoring, analysis of data across your organisation – alerting you before any serious damage is done. Slipping a SIEM into you cloud environment supports threat detection, security incident management, and compliance requirements. Sentinel is Microsoft's SIEM.
Single Sign-On (SSO) allows users to access multiple applications with one set of credentials. This might sound risky, but when configured properly SSO can lead to quicker and more secure experience.
SOAR (Security Orchestration, Automation and Response) addresses threat and vulnerability management, security incident response, and security operations (SecOps) automation. SOAR helps security teams prioritise threats and alerts (created by SIEM) by automating incident response workflows. It helps find and resolve critical threats faster with extensive cross-domain automation, and surfaces real threats from massive amounts of data, resolving incidents faster.
SOC (pronounced “sock”), a security operations center is a team of experts that proactively monitors, detects, and analyses an organisation’s security.
Social Engineering is where hackers access your network, services, identity, apps and infrastructure by manipulating the single most variable and therefore most vulnerable asset in your organisation… yep, your people.
SQL or Structured Query Language is a standard language for accessing databases and has been an international standard (or ISO) since 1987. The old ones are the best an' all that.
Telstra came to us back in 2015 with a tough problem. No one else could solve it. Until we came along. Since then, we’ve been Telstra’s partner-in-residence, and we work closely with them to drive innovation.
Unified Communications as a Service is a cloud delivery model that brings unified communications (UC) – like chat, file sharing, telephony, and video conferencing tools—into a single interface or platform. Our trusted partner for unified communications is Conversant Technology.
Unsecure network is not to be confused with an insecure network, which you deal with very differently by telling them how lovely they look in blue and asking if they’ve had a new haircut. An unsecure network is often a free guest wifi that doesn’t require authentication to connect to and is obviously a happy playground for hackers.
Virtual WAN optimises and automates branch to branch connectivity through Azure.
VMWare VeloCloud When it comes to WAN edge infrastructure, there’s no better choice than VMware SD-WAN by VeloCloud. Protect your WAN with SD-WAN as they say...
VPN or Virtual Private Network allows remote users (for employees who are not on an office-managed network) to securely access an organisation's services; keeping your data secure in the cloud, and completely out of harm's way.
Wide Area Network (WAN) is a wide network connecting smaller networks of computers over a large area (a region, country or even the world). Y'know like the internet...
Yacht. (See Luxury Yacht)
Zero Trust It's simple. Trust nothing or no-one. Microsoft’s Zero Trust model is based on verifying explicitly, using the least privileged access, and ALWAYS assuming breach. It covers identities, endpoints, apps, data, infrastructure, and networks.
This post was originally published on 17 April 2022 and last updated on 13 December 2023.