SA (Solution Architect)
A solutions architect creates the overall technical vision for a specific solution to a business problem. They design, describe, and manage the solution. In many ways, this person builds the bridge between a business problem and the technology solution and outlines each of the phases and requirements required to make that solution work.
SaaS (Software-as-a-Service)
A cloud computing offering that provides users with access to a vendor’s cloud-based software that can be accessed through the web or API.
SASE (Secure Access Service Edge)
A technology used to deliver wide area network (WAN) and security controls as a cloud computing service directly to the source of connection rather than a data center.
Secure Remote Access
A service that allows client IT staff to establish secure connections with a remote, non-public computer network.
Security Posture Management
A service that continuously monitors cloud resources for security threats. Ntirety’s security experts will provide recommendations on improving security posture within the cloud.
Security Reporting
A service that provides metrics-based reporting of monthly or weekly events, granting visibility of trends and patterns, as well as common events and alarms within an infrastructure.
Serverless Function
A task (programmatic function) written by a software developer to perform a single action.
Service Level Agreement
A commitment between a client and a service provider to ensure clients are receiving the services they are entitled to.
SIEM (Security information and Event Management)
A platform that combines information management with event management to provide real-time analysis of security alerts generated by applications and network hardware. It is also used to log security data and generate compliance reports.
SmartResponse
Actions that are automated defensive or operational responses to triggered alarm rules.
SOAR (Security Orchestration, Automation, and Response)
Technologies that enable organizations to collect inputs monitored by a security operations team. For example, alerts from the SIEM system and other security technologies—where incident analysis and triage can be performed by leveraging a combination of human and machine power—help define, prioritize, and drive standardized incident response activities. SOAR tools allow an organization to define incident analysis and response procedures in a digital workflow format.
SOC (Security Operations Center)
A centralized unit staffed by expert security personnel that deals with security issues on an organizational and technical level.
SQL (Structured Query Language)
Domain specific language used in programming, management, and use of relational databases.
SSL (Secure Socket Layer)
A protocol for transmitting private information via the internet using a cryptographic system that uses two keys to encrypt data − a public key known to everyone, and a private or secret key known only to the recipient of the message.