Access Control – Ensures only authorised staff or devices can reach critical systems or data.
Active Directory (Entra ID) – Microsoft’s identity service used for secure sign-ins and permissions across Microsoft 365 and Azure.
Antivirus – Endpoint protection against common malware and viruses, often paired with advanced detection tools.
Azure – Microsoft’s cloud platform we deploy and manage for hosting, migration, and enterprise services.
AWS – Amazon’s cloud platform providing scalable infrastructure, analytics, and security services.
Backup – Copies of data stored securely (cloud or on-premises) for recovery after loss or attack.
BCDR (Business Continuity & Disaster Recovery) – Plans and solutions that keep your business online during outages.
Blob Storage – Azure’s object storage for large datasets and data lakes.
Cloud Migration – Moving applications and data to AWS or Azure for scalability and cost savings.
Cortex XDR – Palo Alto’s platform for advanced endpoint, network, and cloud threat detection.
Cyber Essentials Plus – UK government-backed certification showing strong cyber hygiene, with external validation.
Cybersecurity – Measures and solutions that protect IT systems from cyber-attacks and breaches.
Data Analytics – Analysing raw data using platforms like Splunk and Power BI to uncover insights.
Data Lake – Central storage for raw data, structured or unstructured, enabling modern BI and AI.
Disaster Recovery – IT processes and tools to restore operations quickly after an incident.
EDR (Endpoint Detection & Response) – Detects suspicious behaviour on devices, enabling quick action.
Encryption – Technology that protects data by making it unreadable without a key.
Enterprise Networking – Routers, switches, and firewalls (Juniper, Palo Alto) that underpin secure IT infrastructure.
Firewall – A security system that monitors and controls network traffic, acting as a first line of defence.
Failover – Automatic switch to backup systems when the primary system fails.
GDPR – UK/EU regulation on how personal data must be collected, stored, and protected.
Governance – Policies and standards (ISO 27001, CIS benchmarks) for secure IT operations.
High Availability – IT design that minimises downtime through redundancy.
Hardening – Reducing risks by securely configuring systems and devices.
Identity & Access Management (IAM) – Framework for controlling who can access IT resources.
ISO 27001 – International security standard for managing and protecting information assets.
Incident Response – Steps taken to detect, contain, and recover from security incidents.
Juniper – Network equipment vendor; our experts design and support Juniper-based infrastructures.
Key Vault – Microsoft Azure service for managing encryption keys and secrets securely.
Kubernetes – Container orchestration platform for running applications in hybrid cloud environments.
Least Privilege – Principle of granting users only the access they absolutely need.
Load Balancer – Technology that spreads workloads across multiple servers for reliability.
MFA (Multi-Factor Authentication) – Adds an extra layer of security beyond passwords.
Microsoft 365 – Productivity suite we secure and manage with policies, backups, and training.
Monitoring (24/7) – Continuous observation of networks and systems for uptime and threats.
Network Segmentation – Splitting networks into secure zones to limit breaches.
NIST Framework – Global framework for cybersecurity risk management.
Object Storage – Cloud storage for large unstructured datasets like logs or video.
Operational Technology (OT) – Hardware/software controlling industrial systems that must be secured.
Penetration Testing – Ethical hacking to identify weaknesses before criminals do.
Power BI – Microsoft’s BI platform for interactive dashboards and decision-making.
Palo Alto Networks – A global cybersecurity vendor, partner for firewalls and Cortex security solutions.
QoS (Quality of Service) – Network feature that prioritises critical traffic like voice and video.
Ransomware – Malware that encrypts data and demands payment to unlock it.
Risk Assessment – Evaluating threats, vulnerabilities, and impact to plan controls.
Service Desk – 3Roc’s UK-based support team, available for day-to-day IT issues.
SIEM (Security Information & Event Management) – Centralised system for analysing logs (Splunk, Sentinel).
Splunk – Data analytics tool for logs, monitoring, and threat detection.
SOC (Security Operations Centre) – Dedicated team that monitors, detects, and responds to cyber incidents.
Threat Intelligence – Data and insights used to detect and prevent cyber-attacks.
TLS – Encryption protocol securing internet traffic.
Uptime – Measure of system availability, often a key SLA commitment.
Unified Communications – Integrated messaging, calling, and conferencing solutions.
VPN – Secure tunnel allowing staff to access corporate resources remotely.
Vulnerability Management – Ongoing scanning and patching to close weaknesses.
WAF (Web Application Firewall) – Protects websites and apps from common online attacks.
Workload – An application, service, or database running in cloud or on-premises infrastructure.
XDR (Extended Detection & Response) – Cross-layer security solution linking endpoints, network, and cloud.
Yubikey – A hardware security key providing strong MFA for critical accounts.
Zero Trust – Security model: never trust, always verify, applied to all users and devices.
ZTNA – Zero Trust Network Access, modern alternative to traditional VPN.