Glossary
Remote Access and IT Terms
A
- AEM
Automated Endpoint Management (AEM) is a system designed to simplify the management of devices within an organization’s IT environment. By automating tasks such as patch management, software deployment, and security enforcement, AEM improves operational efficiency, enhances security, and reduces manual workloads. It’s especially useful for IT teams managing large numbers of endpoints remotely.
- Acesso autônomo
O acesso autônomo é uma conexão remota a um computador ou dispositivo sem a necessidade de alguém estar fisicamente presente para conceder permissão. É particularmente útil para suporte de TI, manutenção e atualizações em dispositivos após o horário comercial.
- Acesso remoto
O acesso remoto é a capacidade de aceder a um dispositivo a partir de uma localização remota utilizando uma ligação segura à Internet. Ele permite que os usuários trabalhem ou gerenciem sistemas como se estivessem fisicamente presentes no local.
- Aprendizagem Remota
O ensino remoto refere-se ao ensino ministrado fora de um ambiente tradicional de sala de aula, muitas vezes através de plataformas digitais. Este modelo permite que os alunos acedam aos materiais do curso e participem nas aulas a partir de qualquer lugar, proporcionando flexibilidade na educação.
- Attended Remote Access
Attended remote access allows IT professionals to connect to a user’s device with their consent, typically during a live session. This access type is commonly used in remote support scenarios where the user is present to authorize and oversee the troubleshooting or assistance being provided.
- Augmented Reality
Augmented Reality (AR) integrates digital information, such as images, sounds, and interactive elements, into the real-world environment. AR enhances user experiences by allowing real-time overlay of virtual elements on physical objects. For IT teams, an AR-enabled remote support tool like the one found in Splashtop allows the IT technician to see what the end-user sees through their device camera to provide guidance and support
- AEM
B
- BYOD
Traga Seu Próprio Dispositivo (BYOD) refere-se a uma política que permite que os funcionários usem seus dispositivos pessoais, como smartphones, tablets e laptops, para acessar sistemas e dados da empresa. As políticas de BYOD aumentam a flexibilidade, mas também apresentam desafios de segurança.
- BYOD
C
- Cibersegurança
Cibersegurança é a prática de proteger sistemas, redes e programas de ataques digitais. Envolve uma série de tecnologias, processos e práticas projetados para defesa contra acesso não autorizado, violações de dados e outras ameaças cibernéticas.
- Cloud Computing
Cloud computing refers to the delivery of on-demand computing resources—such as servers, storage, databases, and applications—over the Internet. It enables organizations to scale their operations, reduce costs, and improve flexibility by eliminating the need for on-premises hardware.
- Cibersegurança
E
- End-to-End Encryption
End-to-end encryption is a security process where data is encrypted on the sender’s device and only decrypted on the recipient’s device. This ensures that no one, including service providers, can access the data while it’s in transit, making it an essential feature for secure communications.
- End-to-End Encryption
I
- IAM
O Gerenciamento de Identidade e Acesso (IAM) é uma estrutura de políticas e tecnologias que garantem que as pessoas certas tenham acesso aos recursos corretos nos momentos apropriados. É essencial para manter a segurança e a conformidade nas organizações.
- ITSM
IT Service Management (ITSM) encompasses a set of practices, policies, and tools designed to deliver and support IT services. ITSM frameworks like ITIL help organizations align IT processes with business goals, covering areas such as incident management, service request fulfillment, and change control.
- IAM
M
- MFA
Multi-Factor Authentication (MFA) adds an extra layer of security by requiring users to verify their identity using multiple factors, such as a password, fingerprint, or a one-time code. MFA significantly reduces the risk of unauthorized access, even if one credential is compromised.
- Malware
Malware, short for malicious software, includes programs like viruses, ransomware, and spyware that are designed to harm or exploit devices and networks. It can steal sensitive information, disrupt operations, or give unauthorized access to attackers, making robust security measures critical.
- MFA
P
- PAM
Privileged Access Management (PAM) is a security framework designed to control and monitor access to critical systems and data by privileged users. PAM tools enforce least-privilege access, record session activities, and provide real-time monitoring to mitigate insider threats and breaches.
- PSG
Um Provedor de Serviços Gerenciados (MSP) é uma empresa terceirizada que gerencia remotamente a infraestrutura de TI e os sistemas de usuários finais de um cliente de forma proativa, geralmente por meio de um modelo de assinatura. Os MSPs fornecem uma gama de serviços de TI, incluindo monitorização remota, gestão de segurança e cópia de segurança de dados.
- PAM
R
- RBAC
Role-Based Access Control (RBAC) assigns permissions to users based on their organizational roles. By restricting access to only what’s necessary for each role, RBAC improves security, ensures compliance, and simplifies permission management.
- RMM
Remote Monitoring and Management (RMM) tools provide IT teams with the ability to monitor, manage, and maintain client systems remotely. These tools proactively detect issues, push updates, and generate detailed reports, ensuring smooth operations and minimizing downtime.
- Remote Assistance
Remote assistance enables IT professionals to troubleshoot and resolve technical issues on a user’s device from a distant location. It often includes real-time screen sharing, file transfers, and chat functionalities to provide seamless support.
- Remote Collaboration
Remote collaboration refers to using digital tools and platforms that allow teams to work effectively from different locations. Features like file sharing, video conferencing, and shared editing environments enable productivity without geographical constraints.
- Remote Desktop
A remote desktop allows users to access and control a computer from another location. This technology is widely used for remote work, IT support, and accessing files or applications on a primary computer while away.
- Remote Device
A remote device is any electronic device, such as a smartphone, tablet, laptop, or IoT device, that can be accessed or managed over a network. These devices enable flexibility and connectivity, especially in remote work environments.
- Remote Support
Remote support software allows IT professionals to provide technical support to users by accessing their devices remotely. It typically includes features like file transfer, live chat, and multi-platform compatibility, streamlining the troubleshooting process.
- RBAC
S
- SIEM
Security Information and Event Management (SIEM) systems aggregate and analyze security data from across an organization’s infrastructure. They provide real-time threat detection, incident response, and compliance reporting, helping organizations maintain robust cybersecurity defenses.
- Secure Remote Access
Secure remote access ensures users can connect to devices or networks from distant locations without compromising security. It uses encryption, strong authentication, and secure protocols to protect against unauthorized access and data breaches.
- Suporte Técnico
O suporte técnico envolve o fornecimento de assistência e solução de problemas para usuários de produtos de tecnologia, como computadores, software ou redes. Pode ser entregue pessoalmente, por telefone ou através de ferramentas de acesso remoto para resolver problemas e garantir operações tranquilas.
- SIEM
T
- Trabalho Híbrido
O trabalho híbrido é um modelo de trabalho flexível que combina trabalho remoto e no escritório, permitindo que os funcionários trabalhem em casa ou em outros locais remotos em tempo parcial enquanto passam o tempo restante em um ambiente de escritório tradicional. Esta configuração melhora o equilíbrio entre a vida profissional e pessoal e, muitas vezes, aumenta a produtividade.
- Trabalho Remoto
O trabalho remoto é um acordo de trabalho em que os funcionários executam suas tarefas de trabalho a partir de um local diferente do escritório principal da empresa, normalmente de casa ou de outro local externo, aproveitando a tecnologia para comunicação e colaboração.
- Trabalho Híbrido
V
- VDI
Virtual Desktop Infrastructure (VDI) is a technology that hosts desktop environments on a centralized server. Users can access their desktop from any device, enabling flexibility, improved security, and centralized management for IT teams.
- VPN
A Virtual Private Network (VPN) connects a user’s device and the internet. VPNs are widely used to bypass geographic restrictions and enable access to remote networks.
- VDI
W
- WoL
Wake on LAN (WoL) is a networking standard that allows devices to be powered on remotely by sending a specific signal over the network. This feature is useful for IT administrators performing after-hours updates or troubleshooting.
- WoL