Glossary

AJAX progress indicator
  • a

  • AIX (Advanced Interactive eXecutive) is an enterprise-class operating system developed by IBM for its proprietary server platforms, such as IBM Power Systems. AIX is based on the UNIX operating system and is known for its robustness, scalability, and security. AIX is(...)
  • c

  • CopyAssure is a data recovery solution developed by Chilli IT which leverages the IBM Virtualize feature, FlashCopy. Via the Copy Services Manager, a backup policy schedule manages periodic FlashCopy snapshots which are immutable. This secures the data to prevent it from being(...)
  • Cybersecurity refers to the practices and measures taken to protect computer systems
  • d

  • IBM® Db2® is a cloud-native database built on decades of expertise in bringing data governance and security, low-latency transactions, and continuous availability to your mission critical apps and operations. It provides a single place for DBAs, enterprise architects, and developers to keep(...)
  • IBM Entitled Systems Support (ESS) refers to a service and support program offered by IBM to customers who have purchased IBM hardware and software products. ESS is designed to provide customers with access to technical support, software updates, and other resources to help them maintain and(...)
  • DB2 Mirror is a high-availability feature of IBM's DB2 relational database management system that provides continuous availability of critical data. It is designed to ensure that data is always available, even in the event of a failure of the primary database or its associated hardware or(...)
  • DevOps is a software development approach that combines development (Dev) and operations (Ops) to improve collaboration, efficiency, and software delivery. It aims to bridge the gap between software development teams and IT operations teams, fostering a culture of collaboration, automation,(...)
  • The Digital Operational Resilience Act (DORA) is a risk assessment framework for data and operational resilience with a particular focus on cyberattacks. By 2025, the rules and guidance will be enforceable with financial penalties if compliance cannot be proven. The Digital Operational(...)
  • f

  • The Financial Conduct Authority is a regulatory body in the United Kingdom that oversees and regulates financial markets and firms. It is responsible for ensuring that financial markets are fair, transparent, and operate in the best interests of consumers. The FCA regulates various sectors,(...)
  • FCM4’s AI-powered security checks operate on a 24/7 basis and can detect a threat within 1 minute without impacting performance.
  • FlashSystem is a family of all-flash and hybrid storage arrays developed by IBM. These storage arrays are designed to provide high performance, low latency, and advanced data management features for mission-critical workloads. FlashSystem uses IBM's proprietary(...)
  • g

  • GovAssure is a risk assessment framework which enhances cyber security measures to protect the UK government’s IT systems which run key services for the public.  The new cyber security regime will be run by the Government Security Group, part of the Cabinet Office. GovAssure delivers on a key(...)
  • h

  • Hardware Management Console (HMC) is a management tool developed by IBM for managing their Power Systems servers. The HMC is a dedicated hardware device that provides a graphical user interface (GUI) for managing and monitoring Power Systems servers. The HMC provides a range of features for(...)
  • Hybrid cloud refers to a computing environment that combines both public cloud services and private cloud infrastructure, allowing organizations to leverage the benefits of both. In a hybrid cloud model, the organisation maintains some of its applications and data on-premises or(...)
  • i

  • IBM Entitled Systems Support (ESS) refers to a service and support program offered by IBM to customers who have purchased IBM hardware and software products. ESS is designed to provide customers with access to technical support, software updates, and other resources to(...)
  • IBM i (previously known as AS/400, iSeries, and System i) is an operating system developed by IBM for its midrange server hardware platform. IBM i is designed for small to medium-sized businesses and enterprises, and it provides a reliable and secure environment for running business(...)
  • IBM Power refers to a family of server products, including servers, workstations, and operating systems, developed by IBM. The Power architecture is designed to provide high-performance computing for various applications, including business, scientific, and data-intensive workloads. Here are(...)
  • IBM PowerVS refers to IBM Power Virtual Servers, a cloud-based infrastructure offering from IBM. PowerVS is designed to provide virtual servers based on IBM Power Systems architecture. IBM Power Systems are servers specifically designed for mission-critical workloads and applications, often(...)
  • IBM® Storage Defender is a software suite for data resiliency. It is part of the IBM Storage portfolio. Get the capabilities your enterprise needs to go beyond data protection to real data resilience. IBM Storage Defender provides visibility for end-to-end data resilience across your(...)
  • The term "immutable" is used to describe something that cannot be changed or altered. In various contexts, it refers to the inability of an object or data to be modified after it has been created. An "immutable copy" typically refers to a copy of an object or data structure that retains the(...)
  • Anyone who has had access to systems or networks in the past (including employees) can be considered an insider threat. These individuals can leak confidential company data for personal gain or to inflict damage and disruption.
  • l

  • Linux is a free and open-source operating system based on the Unix operating system. It was created in 1991 by Linus Torvalds and has since become one of the most popular operating systems in the world, powering everything from smartphones and personal computers to servers and(...)
  • m

  • Malware, short for malicious software, refers to any software program or code that is designed with malicious intent to disrupt, damage, or gain unauthorized access to computer systems, networks, or user data. Malware is created by cybercriminals with the aim of exploiting vulnerabilities in(...)
  • A managed service is a type of service where a third-party provider takes responsibility for maintaining and managing a particular aspect of a company's IT infrastructure. Managed services are commonly used for tasks such as managing databases, providing security, or managing cloud(...)
  • IBM i Modernization Engine for Lifecycle Integration (Merlin) is a set of tools run in OpenShift containers which guide and assist software developers in the modernization of IBM i applications, allowing them to realize the value of a hybrid cloud, multi-platform DevOps implementation.
  • n

  • NIST stands for the National Institute of Standards and Technology. It is a physical sciences laboratory and a non-regulatory agency of the United States Department of Commerce. NIST's mission is to promote and maintain measurement standards, develop technology, and foster innovation to(...)
  • p

  • Phishing scams trick users into providing their personal information via an email or text. These messages appear to be from a legitimate company where they ask for sensitive information, such as credit card data or login information.
  • PTF (Program Temporary Fix) is a term used in IBM mainframe systems to describe a temporary fix or patch to a software issue or vulnerability. A PTF is a software update that provides a temporary solution to a software problem until a permanent fix is released. The PTF is designed to be(...)
  • q

  • QRadar is a security information and event management (SIEM) system developed by IBM. It is designed to help organizations detect and respond to security threats by collecting and analyzing data from various sources across the network. QRadar provides real-time(...)
  • r

  • Ransomware is a type of malware that locks down files, data or systems, and threatens to erase or destroy the data. Cybercriminals then threaten to release the private or sensitive data to the public unless a ransom is paid.
  • s

  • Brocade SAN (Storage Area Network) switches are a family of high-performance, scalable, and reliable network switches used to connect storage devices and servers in a SAN environment. SAN switches are used to establish a high-speed, low-latency, and resilient network infrastructure for storage(...)
  • Storwize is a family of enterprise-class storage systems developed by IBM. The Storwize family includes a range of storage systems that provide high performance, scalability, and advanced data management features for a wide range of workloads and applications. Storwize storage systems use(...)
  • i

  • The IBM License Metric Tool (ILMT) is a software tool developed by IBM that helps organizations manage and report on the usage of IBM software products to ensure compliance with IBM's licensing requirements. ILMT is primarily designed to address licensing needs related to IBM software products(...)
  • v

  • VIOS (Virtual I/O Server) is a software component of IBM's Power Systems servers that provides virtualization capabilities for I/O devices, such as network adapters, storage devices, and DVD-ROM drives. VIOS acts as a bridge between the physical I/O devices and the virtualized environments(...)
  • Virtual Tape Libraries (VTLs) are data storage solutions that emulate the functionality of traditional tape libraries using disk storage instead of physical tape. They are designed to provide the same level of data protection, backup, and recovery capabilities as tape libraries, while offering(...)
  • w

  • Watson® is an artificial intelligence (AI) system developed by IBM. It is designed to understand natural language, process large amounts of data, and generate insights and answers to complex questions. Watson gained widespread recognition in 2011 when it competed and won on the game show(...)
  • z

  • A "zero-day" refers to a software vulnerability or security flaw that is exploited by cyber attackers before the developers of the affected software or system are aware of it. The term "zero-day" comes from the fact that developers have "zero days" to fix the issue because it becomes known to(...)