AES
Advanced Encryption Standard
Amazon WorkSpaces
Desktop computing service on the AWS cloud. Allows to provision cloud-based virtual desktops.
AMI
Amazon Machine Image
API
Application Programming Interface
APN
AWS Partner Network
ASG
Astaro Security Gateway
Astaro Security Gateway
Former Name of Sophos UTM
Auto Scaling
Web service to launch or terminate Amazon EC2 instances automatically based on policies, schedules and health checks.
Availability Zones
Each Amazon data center location is called a region, each region contains multiple distinct locations called Availability Zones, or AZs.
AWS
Amazon Web Services
AWS CloudFormation
Free service for AWS customers which provides tools needed to create and manage the infrastructure a particular software application requires to run on AWS.
AWS Partner Network
Global partner program for Amazon Web Services, which is focused on helping partners build a successful AWS-based business.
AZ
Availability Zone
BYOL
Bring Your Own License
CA
Certificate Authority
Certificate Authority
Entity or organization that issues digital certificates for use by other parties.
CHAP
Challenge-Handshake Authentication Protocol
CIDR
Classless Inter-Domain Routing
Classless Inter-Domain Routing
Set of IP standards to create unique identifiers for networks and individual devices.
CLI
Command Line Interface
CloudFormation Console
User interface of the CloudFormation service.
CloudWatch
A component of Amazon Web Services which provides monitoring of AWS resources and applications running on the Amazon infrastructure.
CRL
Certificate Revocation List
DN
Distinguished Name
DNS
Domain Name Service
Domain Name Service
Translates the underlying IP addresses of computers connected through the Internet into more human-friendly names or aliases.
EBS
Elastic Block Store
EC2
Elastic Compute Cloud
EC2 Instance
Compute instance in Amazon EC2 service.
EIP
Elastic IP
Elastic Compute Cloud
Amazon EC2 provides scalable computing capacity in AWS which allows users to rent virtual computers to run their own computer applications.
Elastic IP
Static IP addresses for dynamic cloud computing, which is associated with an account. You control the address until you explicitly release it.
Elastic Load Balancing
Load balancing solution which automatically scales incoming application traffic across multiple targets.
ELB
Elastic Load Balancing
FTP
File Transfer Protocol
Generic Routing Encapsulation
Tunneling protocol which provides a private, secure path for transporting packets through an otherwise public network.
GRE
Generic Routing Encapsulation
HA
High Availability
High Availability
System design protocol that ensures a certain absolute degree of operational continuity.
HTTP/S
Hypertext Transfer Protocol Secure
HTTPS
Hypertext Transfer Protocol Secure
Hypertext Transfer Protocol
Protocol for the transfer of information on the Internet.
Hypertext Transfer Protocol over Secure Socket Layer
Protocol to allow more secure HTTP communication.
IAM
AWS Identity and Access Management
Identity and Access Management
Amazon web service to control who can use your AWS resources and in which way.
Internet Protocol
Data-oriented protocol used for communicating data across a packet-switched network.
Intrusion Prevention System
Network security and threat prevention technology that examines network traffic flows to detect and prevent vulnerability.
IP
Internet Protocol
IP Address
Unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard.
IPsec
Internet Protocol Security
L2TP
Layer Two (2) Tunneling Protocol
LDAP
Lightweight Directory Access Protocol
Masquerading
Technology based on NAT that allows an entire LAN to use one public IP address to communicate with the rest of the Internet.
MD5
Message-Digest algorithm 5
Message-Digest algorithm 5
Cryptographic hash function with a 128-bit hash value.
MSCHAPv2
Microsoft Challenge Handshake Authentication Protocol Version 2
NAS
Network Access Server
NAT
Network Address Translation
Network Access Control List
Security layer which acts as firewall to control traffic in and out of subnets.
Network Address Translation
System for reusing IP addresses.
OGW
Outbound Gateway
PAP
Password Authentication Protocol
PAYG
Pay As You Go
PKCS
Public Key Cryptography Standards
Port
Virtual data connection that can be used by programs to exchange data directly. More specifically, a port is an additional identifier—in the cases of TCP and UDP, a number between 0 and 65535 – that allows a computer to distinguish between multiple concurrent connections between the same two computers.
PPTP
Point to Point Tunneling Protocol
Protocol
Well-defined and standardized set of rules that controls or enables the connection, communication, and data transfer between two computing endpoints.
Proxy
Computer that offers a computer network service to allow clients to make indirect network connections to other network services.
PSK
Preshared Key
RADIUS
Remote Authentication Dial In User Service
RAS
Remote Access Server
S3
Simple Storage Solution
S3 bucket
Logical unit which stores objects that consist of data and metadata which describe the data.
Secure Sockets Layer
Cryptographic protocol that provides secure communications on the Internet, predecessor of the Transport LayerSecurity (TLS).
Security Group
Acts as virtual firewall for an AWS instance to control inbound and outbound traffic.
Shared Secret
Password or passphrase shared between two entities for secure communication.
Simple Notification Service
Notification service which provides mass delivery of messages, predominantly to mobile users.
Simple Storage Service
Amazon web service which provides storage through web services interfaces.
SNS
Simple Notification Service
SSH
Secure Shell
TCP
Transmission Control Protocol
Transmission Control Protocol
Protocol of the Internet protocol suite allowing applications on networked computers to create connections to one another. The protocol guarantees reliable and in-order delivery of data from sender to receiver.
URL
Uniform Resource Locator
UTM
Unified Threat Management
Virtual Private Cloud
VPC provides secure data transfer between private enterprises and public cloud provider. Each data remains isolated from every other data both in transit and inside the cloud provider's network.
Virtual Private Network
Private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol such as PPTP or IPsec.
VPC
Virtual Private Cloud
VPN
Virtual Private Network
WAF
Web Application Firewall
Web Application Firewall
WAF, also known as reverse proxy, applies a set of rules to an HTTP conversation and therefore protects webservers from attacks and malicious behavior like cross-site scripting (XSS), SQL injection, and others.
WebAdmin
Web-based graphical user interface of Sophos products such as UTM and SUM.
Windows Internet Naming Service
Microsoft's implementation of NetBIOS Name Server (NBNS) on Windows, a name server and service for NetBIOS computer names.
WINS
Windows Internet Naming Service
X.509
Specification for digital certificates published by the ITU-T (International Telecommunications Union – Telecommunication). It specifies information and attributes required for the identification of a person or a computer system.