IT related terms clarified
Within Spotit, we offer a lot of IT-focused solutions. Find out exactly what all our IT- and security-related terms mean through this glossary.
GDPR or general data protection regulation
The GDPR legislation is a European law that has been in force since May 2018. GDPR stands for the General Data Protection Regulation. Within Spotit , we use a GDPR assessment to analyze the extent to which your company is legally compliant.
Red & Blue teaming
Chief Information Security Officer or CISO
The CISO, also known as Chief Information Security Officer, is a certified professional who helps you properly manage your business processes related to information security.
The Spotit Computer Security Incident Response Team (CSIRT) ensures that you can beat cyber criminals at their own game. This team intervenes and is available on demand or can be part of your contract with us.
In cybersecurity, we deploy the right people, policies, processes and technologies to protect companies, their critical systems and sensitive information from digital attacks. Within Spotit, for example, we set up cybersecurity maturity assessments to analyze the extent to which your company’s security strategy is effective.
Cybersecurity maturity assessment or Cybersecurity readiness assessment
Using workshops and frameworks, Spotit maps the maturity of your cybersecurity. In this assessment, we record what your company can still do to better secure itself against cybercrime, and what measures you are already applying.
Data Protection Officer or DPO
DPOs check to what extent all aspects of the GDPR legislation are complied within your company. This Data Protection Officer has the necessary legal and technical skills and is the person of choice to relieve you of any worries regarding this legislation.
Domain-based Message Authentication, Reporting & Conformance, or DMARC, provides better insight into your mail environment. This allows you to choose who is authorized to send mail from your domain name. This software also protects your brand name from phishing and spoofing.
Ethical hacking or pentesting is the practice where, in a legal way, we try to get into your network just like real hackers. The goal here, of course, is to protect your company’s cybersecurity.
Within this assessment, our team analyzes to what extent your company is already compliant with the GDPR legislation that has been in place since May 2018.
High level design
A high-level design is a draft, a plan outlining the needs of your business, new applications and strategic vision of your desired network. This practical plan simplifies cost management and is fully customized and future-proofed.
Information Security Officer or ISO
The ISO is the person par excellence responsible for monitoring and applying the information security policy. This professional guidance not only ensures compliance, but also evaluates and tests new security products and technologies.
This standard represents the international standard for information security. You can call on Spotit Security to analyze your entire information security.
ISO 27k assessment
To ensure that your company is compliant with the ISO 27001 standard, you can come to us for an ISO 27k assessment. In this audit, we analyze current measures, draw up a GAP analysis and formulate concrete action points.
In a Microsoft 365, or M365 assessment, nearly 90 security elements are checked and analyzed. Each element is tested and the critical state of each is rated. After this assessment, you will receive recommendations to improve your security.
NaaS or Network as a Service
NaaS, or Network as a Service, is a cost model where we make modern, high-performance technology accessible and available at a low cost. Using this system, we improve productivity and enumerate thoughtful investments that improve your company’s infrastructure.
Network virtualisation & automation or SDN
Via Software-Defined Networking, or SDN, it is easier to manage and automate your network. This ensures a secure and high-performance network that is at the same time flexible and user-friendly.
Network Operations Center or NOC
Through Spotit Network Operations Center, or NOC, we are happy to take over the management of your network environment. Through this service, we unburden our customers and are able to continuously improve the network and security infrastructure.
Operational Technology / Internet of Things security or OT/ IoT security is becoming increasingly important. Being connected to the IT network, these technologies are also often exposed to vulnerabilities. The security of these systems can therefore be better ensured.
Software Defined – Wide Area Network, or SD-wan, provides a more secure, stable and cost-efficient network, including from the cloud. It also reduces the time needed to deploy new services.
Security & network assessment
In this intensive review, Spotit maps out your entire network environment and IT security. We put the pain points and quick wins on the table to then reduce the noted risks to an acceptable level.
Security Operations Center or SOC
In the SOC, or security operations center, we monitor your IT environment 24/7. We get to work on detecting and stopping security threats in a timely manner every time. So you can focus on your company’s core business with peace of mind.
Social engineering is the other term for criminals who carry out phishing attacks and try to attack your network environment in various ways. Through our training courses and simulations, we provide support.
UBA or User behavior analytics
User Behavior Analytics, or UBA, are tools that provide in-depth insights into the behavior of your users on your network. These tools also send out timely alerts when risky behavior is detected.