Resources

Blog

Find out the latest news in IT

White Papers

Learn about IT solutions that can help your business grow

Case Studies

How we help businesses like yours succeed

IT Glossary

Find out the latest news in IT

Glossary

D

DaaS

Desktop as a Service is a type of virtual computing that embraces mobility by transforming any device into your work computer and allows you to control applications and conduct business securely through the cloud.

Related Resources

Domain

A domain contains a group of resources that can be accessed and administered with a standard set of rules and procedures. Within the Internet, domains are named by the IP (Internet Protocol) address, and all of the devices sharing a common element of the IP address are stated to be within the same domain.

Related Resources

Domain Controller

A domain controller is a server that supports network security by verifying the user authentication and authorization and manages the user database for the domain. Domain controllers are mainly significant in Microsoft directory services terminology and authenticating Windows user identities.

Related Resources

DNS

A Domain Name System (DNS) is a system that maintains a directory of domain names and translates them to IP addresses.

Related Resources

Open DNS

OpenDNS is a third party set of cloud-based consumer products aimed at making internet connection faster, safer, and more reliable through performing URL, DNS, IP Layer, Proxy and Content Filtering. DNS Forwarders are set in place to filter all traffic in the cloud before it gets to your public facing firewall and internal network.

Related Resources

Downtime

Downtime refers to the period of time where a system or service is inactive usually as a result of system function failure because of an unplanned event, routine maintenance, or other inconveniences. This inactivity ultimately has a negative impact on productivity and processes within the business environment.

Related Resources

Data Loss Prevention

Data Loss Prevention is a system or service that prevents users from breaching sensitive or critical information outside of the corporate network. The network administrator(s) manages what data end users can transfer. Firewalls, antivirus software, and intrusion detection systems (IDS) are often accessible as standard security measures and products that protect devices against both outsider and insider attacks.

Related Resources

DoD Wipe

DoD wipe refers to a method of standards, created by the Department of Defense, which is used in overwriting the data that aims to destroy all electronic data residing on a hard disk drive or other digital media. A DoD wipe requires a computer’s information to be overwritten seven times in order for the data to be considered unrecoverable.

DRaaS

DRaaS (Disaster Recovery as a Service) is a system of policies and procedures set in place that will give businesses and organizations total system backup in the event of a system failure that is either natural or human-induced, and it allows operations to continue while the primary system undergoes repair.

Related Resources