Advanced Encryption Standard
Desktop computing service on the AWS cloud. Allows to provision cloud-based virtual desktops.
Application Programming Interface
Former Name of Sophos UTM
Web service to launch or terminate Amazon EC2 instances automatically based on policies, schedules and health checks.
Each Amazon data center location is called a region, each region contains multiple distinct locations called Availability Zones, or AZs.
Free service for AWS customers which provides tools needed to create and manage the infrastructure a particular software application requires to run on AWS.
Global partner program for Amazon Web Services, which is focused on helping partners build a successful AWS-based business.
Entity or organization that issues digital certificates for use by other parties.
Challenge-Handshake Authentication Protocol
Classless Inter-Domain Routing
Set of IP standards to create unique identifiers for networks and individual devices.
User interface of the CloudFormation service.
A component of Amazon Web Services which provides monitoring of AWS resources and applications running on the Amazon infrastructure.
Certificate Revocation List
Translates the underlying IP addresses of computers connected through the Internet into more human-friendly names or aliases.
Compute instance in Amazon EC2 service.
Amazon EC2 provides scalable computing capacity in AWS which allows users to rent virtual computers to run their own computer applications.
Static IP addresses for dynamic cloud computing, which is associated with an account. You control the address until you explicitly release it.
Load balancing solution which automatically scales incoming application traffic across multiple targets.
Tunneling protocol which provides a private, secure path for transporting packets through an otherwise public network.
Generic Routing Encapsulation
System design protocol that ensures a certain absolute degree of operational continuity.
Hypertext Transfer Protocol Secure
Hypertext Transfer Protocol Secure
Protocol for the transfer of information on
Protocol to allow more secure HTTP communication.
AWS Identity and Access Management
Amazon web service to control who can use your AWS resources and in which way.
Data-oriented protocol used for communicating data across a packet-switched network.
Network security and threat prevention technology that examines network traffic flows to detect and prevent vulnerability.
Unique number that devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard.
Internet Protocol Security
Layer Two (2) Tunneling Protocol
Lightweight Directory Access Protocol
Technology based on NAT that allows an entire LAN to use one public IP address to communicate with the rest of the Internet.
Message-Digest algorithm 5
Cryptographic hash function with a 128-bit hash value.
Microsoft Challenge Handshake Authentication Protocol Version 2
Network Address Translation
Security layer which acts as firewall to control traffic in and out of subnets.
System for reusing IP addresses.
Password Authentication Protocol
Public Key Cryptography Standards
Virtual data connection that can be used by programs to exchange data directly. More specifically, a port is an additional identifier—in the cases of TCP and UDP, a number between 0 and 65535 – that allows a computer to distinguish between multiple concurrent connections between the same two computers.
Point to Point Tunneling Protocol
Well-defined and standardized set of rules that controls or enables the connection, communication, and data transfer between two computing endpoints.
Computer that offers a computer network service to allow clients to make indirect network connections to other network services.
Remote Authentication Dial In User Service
Logical unit which stores objects that consist of data and metadata which describe the data.
Cryptographic protocol that provides secure communications on the Internet, predecessor of the Transport LayerSecurity (TLS).
Acts as virtual firewall for an AWS instance to control inbound and outbound traffic.
Password or passphrase shared between two entities for secure communication.
Notification service which provides mass delivery of messages, predominantly to mobile users.
Amazon web service which provides storage through web services interfaces.
Simple Notification Service
Transmission Control Protocol
Protocol of the Internet protocol suite allowing applications on networked computers to create connections to one another. The protocol guarantees reliable and in-order delivery of data from sender to receiver.
Unified Threat Management
VPC provides secure data transfer between private enterprises and public cloud provider. Each data remains isolated from every other data both in transit and inside the cloud provider's network.
Private data network that makes use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol such as PPTP or IPsec.
WAF, also known as reverse proxy, applies a set of rules to an HTTP conversation and therefore protects webservers from attacks and malicious behavior like cross-site scripting (XSS), SQL injection, and others.
Web-based graphical user interface of Sophos products such as UTM and SUM.
Microsoft's implementation of NetBIOS Name Server (NBNS) on Windows, a name server and service for NetBIOS computer names.
Windows Internet Naming Service
Specification for digital certificates published by the ITU-T (International Telecommunications Union – Telecommunication). It specifies information and attributes required for the identification of a person or a computer system.