Zum Inhalt springen
Helpdesk-Support:
+800 4479 3300
Quick Support
Login
IT Maintenance
International IT Service
Product Overview Support
Mainframe
Firmware updates
Service Level Agreements
Ticket management & spare parts
Service coverage K&P
Services
IT Maintenance
Managed Services
IT Projects
IT Security
Cloud services
K&P Products
Manufacturer Portfolio
Digitalization funding programs
The company
Management Team
Code of conduct
History
Compliance
Facts & Figures
Customers
Locations
Quality Management
Sustainability
Tech Academy
BLUE Consult
Partner Business
Blog
Success Stories
Careers
Contact
Careers
Contact
+49 6122 7071-0
info@kpc.de
https://kundencenter.kpc.de/
Home
/
Glossar
Glossar
Scrum
,
Social engineering
,
Green Information Technology
,
Deepfakes
,
NIS2 Directive
,
Multi-factor authentication
,
Cyber Security
,
Profit center
,
Generative AI
,
Deep learning
,
Neural network
,
Incident Response Plan
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
W
X
Y
Z
A
Antivirus software
Alerting
Artificial Intelligence (AI)
AIOps
Agile development
Awareness training
Access Point
Algorithm
Application monitoring
API (Application Programming Interface)
Asset check
B
Botnet
Backup as a Service (BaaS)
Blockchain
Backup
Big Data
BIOS (Basic Input/Output System)
C
Cyber Security
Capex (Capital Expenditure)
Compliance audits
Cloud computing
Continuous Deployment
Caching
Chatbot
Cloud-native
Compliance monitoring
Cloud monitoring
Cold Storage
Change management
Cloud orchestration
CI/CD (Continuous Integration/Continuous Deployment)
D
Data Lake
Dual boot
DHCP (Dynamic Host Configuration Protocol)
DevOps
DNS (Domain Name System)
Dashboards
Data Mining
Digital Twin
Data governance
DDoS (Distributed Denial of Service)
Docker Compose
Deduplication
Deep learning
Data Fabric
Data Warehouse
Deepfakes
Data Integrity
Debugging
E
Encryption
Elastic Stack (ELK)
End-of-Life (EOL)
Edge AI
End-User Experience Monitoring
Edge Monitoring
Endpoint Security
Elasticity
Endpoint Management
Edge Computing
ETL (Extract, Transform, Load)
F
Framework
Firewall
Failover
Function as a Service (FaaS)
FinOps
First level support
Firmware
G
GDPR (General Data Protection Regulation)
Git
Gateway
Generative AI
Green Information Technology
Grafana
H
Hyperthreading
Hot Storage
Helpdesk
Honeypot
Hashing
Hybrid Cloud
Hardware maintenance
I
IPv6
Intrusion Detection System (IDS)
Incremental backup
Intrusion Prevention System (IPS)
IoT (Internet of Things)
IoT monitoring
Incident Response Plan
IaaS (Infrastructure as a Service)
Intrusion Detection System (IDS)
J
JSON (JavaScript Object Notation)
JavaScript
K
Kerberos
Kubernetes
Keylogger
KPI (Key Performance Indicator)
L
Logfile
Latency
Library
LAN (Local Area Network)
M
Monitoring
Mean Time to Repair (MTTR)
Mean Time Between Failures (MTBF)
Machine Learning
Metrics
Microservices
Modem
MLOps (Machine Learning Operations)
Metadata
Multi-factor authentication
Middleware
N
Network monitoring
Network Function Virtualization (NFV)
Nginx
Network Security Monitoring (NSM)
NAT (Network Address Translation)
Network Topology
Nagios
Network Latency Monitoring
NIS2 Directive
Neural network
O
Object Storage
Opex (Operational Expenditure)
Observability
OAuth
On-Premises
P
Phishing
PaaS (Platform as a Service)
Packet Sniffing
Profit center
Prometheus
Patch
PKI (Public Key Infrastructure)
Q
Query
Quantum Computing
QoE (Quality of Experience)
R
REST (Representational State Transfer)
Router
Redundancy
Ransomware
S
Sandboxing
Security monitoring
Social engineering
Software maintenance
Scrum
Service processes
SD-WAN (Software-Defined Wide Area Network)
Server monitoring
SaaS (Software as a Service)
Syslog
Snapshot
Simple Network Management Protocol (SNMP)
SIEM (Security Information and Event Management)
Spoofing
SOC (Security Operations Center)
T
Tokenization
Third Party Maintenance (TPM)
TLS (Transport Layer Security)
Thin Client
Throughput
U
USB (Universal Serial Bus)
Uptime
V
VLAN (Virtual Local Area Network)
VPN (Virtual Private Network)
Vulnerability management
Virtual Machine (VM)
W
WAN (Wide Area Network)
WLAN Survey
WPA3 (Wi-Fi Protected Access 3)
W
WAF (Web Application Firewall)
X
XaaS (Everything as a Service)
XSS (Cross-Site Scripting)
XML (Extensible Markup Language)
Y
Yield
YAML (YAML Ain’t Markup Language)
Z
Zero Trust Architecture
Zoning
Zip
Nach oben scrollen