An Enterprise Software Glossary

Commonly Used Acronyms (CUA)

Enterprise technology is rapidly changing, and here at Work-Bench we’re lucky to have a front-row seat to the meteoric innovation happening across our industry. As we are constantly hearing new acronyms and abbreviations, we wanted to share our internal glossary with you in an effort to compile this information in a central repository. See below for some of the newest tech & terms that we are seeing in our companies, investments, and industry. Please let us know in the comments section if we missed anything, and we’ll be updating this document periodically!

  • APM — Application Performance Management tools oversee different metrics of software application performance, such as load and response times and computational availability.
  • APT — An Advance Persistent Threat is a sophiscated, coordinated, and tenacious maleware attack against a specific high-target entity, such as a government or business organization.
  • AuthN — AuthN verifies a user’s identity as they login to an application.
  • AuthZ — AuthZ verifies which resources/actions/data an authenticated user is permitted to access within an application.
  • BI — Business Intelligence is the function of interpreting an enterprise’s raw data into structured, and possibly meaningful, insights.
  • CRM — Customer Relationship Management technologies provide tools that automate and synchronize efforts to manage and track customers, and can help with lead generation, market analysis, sales force automation, and more.
  • DBMS — A Database Management System is a piece of software that organizes information in a way that allows users to retrieve and manipulate data.
  • DDOS — A Distributed Denial of Service occurs when virus infected computers — or botnets — spam a target resource (software applications, network, email, etc) with requests, thus tying up the service’s ability to respond to legitimate users.
  • ERP — Enterprise Resource Planning technologies synchronize and integrate enterprises by providing a unified database for departments and activities across an enterprise. These activities may include inventory management, product planning, shipping and payment, HR activities, CRM, and more.
  • ETL — Extract, Transform, and Load refers to the process of migrating data from one database to another in the order of “extracting” data from its original location, “transforming” it into the form specified by the secondary location, and then “loading” the data into the secondary location.
  • GRC — Governance, Risk Management, and Compliance solutions manage information flow to streamline decision-making, prevent and report strategic/financial/cyber threats, and ensure that IT operations comply with company and industry regulations.
  • HRIT — Human Resources Internet Technologies help streamline HR functions in a variety of ways, such as maintaining a database of applicants and automating tasks like performance appraisals and onboarding.
  • IA — Internal Audits help monitor and analyze an enterprises’ business operations, ensuring that they are maintaining regulatory compliance, identifying areas of risk management, aiding fraud detection, and more.
  • IaaS — Infrastructures as a Service allow customers to rent on demand computing resources such as storage, networking, bandwidth, load balancers, and servers over the internet. The provider is responsible for maintaining the distributed hardware involved.
  • IAM — Identity and Access Management technologies ensure information and identity management, providing a regulation compliant framework for granting access privileges and a paper trail for possible audits.
  • InfoSec — Information Security refers to attempts to preserve and manage the integrity of enterprise information, providing digital forensics, detecting vulnerabilities within system infrastructures, defending against malware and more. InfoSec has become a more convoluted practice in recent years due to client security, as enterprises look to defend information being viewed on personal devices in the BYOD environment.
  • LDAP — Lightweight Directory Access Protocol is an open protocol, simplified version of the X.500 standard for retrieving and maintaining distributed directory information services over the internet or company intranet.
  • MDM — Mobile Device Management refers to the corporate administration of mobile devices across a variety of platforms and ensures corporate levels of IT security, synchronicity, configuration, and applications.
  • NoSQL — Not Only SQL databases store and retrieve data via the organization of key value, graph, document, and etc. In this aspect, it differs from the traditional relational database management systems by avoiding a table based design. NoSQL is often used in big data applications.
  • PaaS — Platforms as a Service allow customers to develop and deploy applications and services using tools that are hosted over the internet. They allow customers to circumvent purchasing and maintaining their own private hardware.
  • PII — Personally Identifiable Information is any data that could identify an individual, such as IP address or date of birth.
  • POC — Proofs of Concept are plans that offer stakeholders the ability to review the product plan, address how the product aligns itself with an enterprise’s business goal, offer a potential schedule for how the product will move forward, and discuss possible logistical issues.
  • RDBMS — Relational Database Management Systems organize database relationships in the form of a table. Popular RDMBSs include Microsoft SQL Server, Oracle, and Ingress.
  • RFI — a Request For Information, which is usually requested before an RFP, is a solicitation sent to many potential suppliers asking for basic information about their product. A contract is not guaranteed after an RFI.
  • RFP — A Request for Proposal is a more structured evaluation and selection process than an RFI, wherein enterprises solicit companies to submit competitive business proposals for a painpoint they are attempting to solve.
  • SaaS — Softwares as a Service are applications that customers can rent over the internet.
  • SDDC — Software Defined Data Centers create an IT infrastructure that has virtualized all three of the major parts of computing (servers, networking, and storage).
  • SDLC — Systems Development Life Cycle is a framework that details each step during software development, such as analysis, creation, testing, deployment, and maintenance.
  • SDN — Software-Defined Networking is a networking approach that decouples software from hardware, creating faster and cheaper network capabilities across multi-vendors.
  • SDS — Software-Defined Storage is storage infrastructure managed by software rather than the storage hardware; the separation of storage hardware from the controlling software allows enterprises ease of operation across different hardware vendors.
  • SIEM — Security Information and Event Management technologies collect and analyze logs from end devices like servers and network devices before alerting management if any unusual activity or event correlations are found.
  • SLA — a Service Level Agreement is a contract between a service provider and a customer that can specify, among other things, performance benchmarks like user capabilities, customer service schedules, and more.
  • SME — a Subject Matter Expert is an authority in a specific field.
  • SSO — a Single Sign-On is an authentication service that allows users to access multiple applications for which they have the rights to after undergoing authentication once, usually using the LDAP.
  • STAP — Specialized Threat Analysis and Prevention technologies collect and analyze information that help to detect, prevent, and confront security threats like data exfiltration and other malware.
  • VDI — Virtual Desktop Infrastructure allows users to access a centralized databases/applications while still using fully personalized desktops. it also allows enterprises to manage security while still offering mobility.
  • VM — a Virtual Machine emulates a physical computing environment but is linked to physical hardware by a virtualization layer when it requests CPU, memory, and etc.

Are we missing any? Please let us know in the comments!

comments powered by

One clap, two clap, three clap, forty?

By clapping more or less, you can signal to us which stories really stand out.