B

  • Business Continuity: Advanced planning and preparation to ensure an organization can perform its key operations without interruption and maintain service, recoverability, and consistency.
  • Business Continuity Plan: An organization’s plans and procedures to ensure that critical business functions remain available to customers and suppliers so business operations can continue with as little disruption as possible, even during emergencies and other difficult situations.

D

  • Disk Replication: Copying logical disk volumes onto separate physical hard disks in real time to ensure consistency between redundant resources and improve reliability, accessibility, or fault-tolerance.
  • DRaaS: Disaster Recovery as a service is a cloud computing service that backs up an organization’s data and servers into a third-party cloud computing environment to provide failover in the event of a man-made or natural disaster.

E

  • Encryption: Altering and scrambling information to appear random to all users except for those for whom the data is intended in order to conceal information by preventing accurate interpretation.

H

  • Hybrid Cloud: A cloud computing environment that uses a combination of private cloud and public cloud services to orchestrate the sharing of data and apps between each service for the delivery of core services.

I

  • IBM z Series: IBM’s industry-leading family of enterprise mainframe servers that offer a high-performance operating environment and achieve scalable and secure enterprise computing.
  • IaaS: A cloud infrastructure service in which virtualized computing resources, such as servers and software, are delivered to customers over the internet for cloud computing, networking, and storage capabilities.
  • IT Managed Service Provider (MSP): An information technology company that fills gaps in organizations’ IT departments by providing various IT environment monitoring and managing services, as well as consultation.
  • IT Infrastructure Managed Services: Third-party management and support of IT systems that includes performance monitoring and problem resolution to ensure continuity of business operations and optimize IT infrastructures.

M

  • Mainframe as a Service: A subscription cloud service for the support of mainframe infrastructure that provides compute and storage capabilities and allows mainframe capacity to scale to meet organizations’ requirements.
  • Mainframe Disaster Recovery: Protecting data on a mainframe by regularly offloading mainframe data to the cloud or remote servers to provide backups for information retrieval should a disaster occur.
  • Mainframe Hosting: A utility service that fulfills organizations’ mainframe storage and computing needs and reduces mainframe expenses by providing off-site hardware, software, maintenance, power, and cooling, as well as disaster recovery services.
  • Mainframe Hosting and Co-Location Services: Dedicated and shared multi-tenant mainframe environments that reduce capital expenses and provide access to the latest and fastest technology while also allowing organizations to maintain production control over their workloads.
  • Mainframe Performance Monitoring: Monitoring the availability and tracking performance indicators of mainframe hardware systems and subsystems across an organization in order to adjust and optimize operations.
  • Mainframe Ransomware: A malicious attack on a company’s mainframe systems that restricts users’ access until a ransom is paid to unlock it.
  • Mainframe Security: The practice of monitoring a mainframe environment to protect against unauthorized access and accidental or intentional data tampering.
  • Mainframe Security Vulnerabilities: Network, operating system, human, and process weaknesses that directly affect or compromise a mainframe environment and can expose systems to ransomware, hackers, innocent human error, or malicious insider threats.
  • Mainframe Systems Programming: Overseeing the system upgrades and customization and maintenance of a mainframe operating system.
  • Mainframe Virtual Tape: Archival storage that allows an organization to save data as if it were being stored on tape, although it might actually be stored on another storage medium, and to manage data so less storage space is needed.

P

  • PaaS: Platform as a service is a service model that delivers a cloud computing platform over the internet, including an operating system, database, and web server, and is typically used for application development.
  • Private Cloud: Proprietary architecture in a cloud computing environment in which all hardware and software resources are accessible only by a single user or a limited number of users.
  • Public Cloud: A virtualized environment where users share resources and leverage them as needed while maintaining the privacy of their own data.

R

  • RACF: Resource Access Control Facility is an add-on software product that implements mainframe security processes by managing user access to critical resources and hosting access-control information.
  • Remote Backup: An online managed backup service that backs up and stores data files to a remote, cloud-based server on a regularly scheduled basis or as changes are made.

S

  • SaaS: Software as a Services is a software delivery and licensing model in which software is hosted in centrally in the cloud and is accessed online via a subscription.
  • Soc2 Compliance: Service Organization Control 2 is an auditing procedure that evaluates security, availability, and confidentiality controls so organizations can securely manage their data and keep client information private.

Z

  • Z Systems Mainframe: IBM’s suite of mainframe servers that deliver secure, reliable, and fast computing services. Features of the newest additions to the family include expansion on pervasive encryption, data protection advancements, and integrated on-chip compression.
  • z/Os Security: System integrity features to minimize intentional or accidental damage to the IBM Z Series Operating System and its production environment by instituting high-level security policies to prevent malicious or accidental breaches from impacting production work or compromising data.