A robot reads a scroll

Cybersecurity
Terms & Definitions

Understanding security terminology helps you make informed decisions about protecting your organization. This glossary defines essential security terms for managed services and enterprise protection.

U

UC (Unified Communications)
Plus icon.

Integrated communication platforms combining voice, video conferencing, instant messaging, and collaboration tools into single systems. Unified communications improve productivity but require security controls protecting against eavesdropping and unauthorized access.

UEM (Unified Endpoint Management)
Plus icon.

Centralized platforms managing and securing all endpoint devices including laptops, smartphones, tablets, and IoT devices. UEM consolidates mobile device management, application deployment, and security policy enforcement across diverse device types.

Unified Threat Management (UTM)
Plus icon.

All-in-one security appliances combining multiple security functions like firewall, antivirus, intrusion prevention, and content filtering. UTM simplifies management for smaller organizations but creates single points of failure.

Unmanned security systems
Plus icon.

Automated security solutions including CCTV cameras, motion sensors, and alarm systems operating without on-site personnel. Unmanned systems provide continuous monitoring but require remote management and regular maintenance.

User Access Review
Plus icon.

Periodic audits verifying users maintain appropriate access rights aligned with current roles and responsibilities. Access reviews identify orphaned accounts, excessive permissions, and policy violations requiring remediation.

User Access Rights
Plus icon.

Specific permissions granted to users defining which systems, data, and functions they can access. Access rights follow least privilege principles, limiting permissions to only those required for job functions.

User Awareness Training
Plus icon.

Security education programs teaching employees to recognize phishing, social engineering, and other threats. Awareness training reduces human error by building security-conscious cultures and improving threat reporting.

User Provisioning / Deprovisioning
Plus icon.

Processes for creating, modifying, and removing user accounts and access rights during onboarding, role changes, and offboarding. Automated provisioning ensures consistent access controls while deprovisioning prevents unauthorized access.

Get in Touch

Fill-up the contact form and we will connect with you shortly.

By submitting this form, you are agreeing to receive additional communications from MCK Network Solutions. You can opt out at any time. Please review our Privacy Policy for additional information about how MCK Network Solutions protects your privacy.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Plus icon.