Anti-Virus software can scan your computer on a search & destroy mission for malicious software that corrupts your computer. These malicious pieces of software can delete and alter data that is important to your operating system, causing down time to your systems and business. Anti-Virus software is also attributed to Virus, Malware and Spyware prevention, protecting your data from being corrupted, misused or stolen.
Bandwidth The data speed or rate, measured in bits per second (bps).
For example, a modem with a bandwidth of 56 kilobits per second (Kbps) can transmit a maximum of about 56,000 bits of digital data in one second.
Firewalls keep your network secure by filtering out malicious pieces of software from entering your computer. Firewalls can either be physical, hardware based firewalls, or software based, analyzing incoming data and comparing it to a database of known malicious software. Also note, that most Firewalls and Anti-Virus software packages automatically update there database of what is considered as Malware.
Malware, short for malicious software, is software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.
Managed Service Providers - MSP
A team of highly trained engineers who maintain your IT systems, they are outsourced and provide IT Support for your business.
An operating system allows software to communicate with your hardware. It is the most essential piece of software a computer can have, they run on everything from desktops to microwaves. The type of operating systems we are interested in though are far more complex, I'm talking about Windows, Mac and Linux. Those three were all built for the desktop market but there are also OS' on the mobile platforms with Googles Android and Apples iOS; note where the OS in "iOS" comes from.
The installation of patches from a software vendor onto an organization's computers. Patching thousands of PCs and servers is a major issue. A patch should be applied to test machines first before deployment, and the testing environments must represent all the users' PCs with their unique mix of installed software.
Provides the customer with off site support. With the customer's permission, this small .exe file automatically downloads to the remote PC. It's the interface through which technicians communicate with Customers and conduct remote support. The applet automatically removes itself from the remote PC at session conclusion. Click here to see more
Secure Socket Layer Or Transport Layer Security
SSL or TLS
This provides a secure communication method of sensitive data like credit card details by encrypting them before they are sent over the internet. Providing peace of mind to you and your customers
Part of a service contract where the level of service is formally defined.
These services range from telephone, remote & on site –All Guaranteed!
Simple Network Management Protocol
Simple Network Management Protocol A widely used network monitoring and control protocol. Data are passed from SNMP agents, which are hardware and/or software processes reporting activity in each network device (hub, router, bridge, etc.) to the workstation console used to oversee the network.
The individual who uses a PC, Laptop, Workstation or Tablet in there every day work activities.
Voice over IP A digital telephone service that uses the public Internet and private backbones for call transport. Support for the public switched telephone network (PSTN) is also provided so that VoIP calls can originate and terminate from regular telephones. Many companies, including Vonage, 8x8 and AT&T (CallVantage), typically offer calling within the country for a fixed fee and a low per-minute charge for international. Customers are required to have broadband Internet access (cable or DSL).