A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z A AMC (Annual Maintenance Contract) Active Directory (AD) API (Application Programming Interface) B Backup and Recovery BOM (Bill of Materials) BI (Business Intelligence) BDR (Backup and Disaster Recovery) Bandwidth C Cloud Computing Cloud Security Cybersecurity CRM (Customer Relationship Management) Cloud Migration Compliance Consulting D Digital Transformation Data Storage Solutions Disaster Recovery (DR) DDoS (Distributed Denial of Service) Data Centre DMARC (Domain-based Message Authentication, Reporting & Conformance) E Endpoint Security EDM (Electronic Document Management) ERP (Enterprise Resource Planning) ELV (Extra Low Voltage Systems) E-Commerce Email Security F Firewall Financial Management Software FZCO (Free Zone Company) Firewall-as-a-Service (FWaaS) Full-Stack IT Support G GDPR (General Data Protection Regulation) Green IT GCC (Gulf Cooperation Council) GRC (Governance, Risk and Compliance) GPU Cloud Computing H HCM (Human Capital Management) HANA (High-performance Analytic Appliance) Hybrid Cloud Help Desk I IoT (Internet of Things) IP (Internet Protocol) IT Infrastructure ISO 27001 IaaS (Infrastructure as a Service) IT Consultancy J Just-In-Time (JIT) Manufacturing Joint Venture IT Integration JTBD (Jobs-to-be-Done) in ERP Selection Journey to the Cloud Joint IT Infrastructure Management Job Scheduling Jump Server (Jump Host) K KPI (Key Performance Indicator) KYC (Know Your Customer) Automation Key Management Knowledge Base L LAN (Local Area Network / Local Area Networks) Lifecycle Management (IT Asset) LDAP (Lightweight Directory Access Protocol) Low-Code Application Development Legacy System Latency Optimisation M Managed IT Services MDM (Mobile Device Management) MRP (Material Requirements Planning) MFA (Multi-Factor Authentication) N Network Security Network Monitoring NESA (National Electronic Security Authority) Network Access Control (NAC) Network Infrastructure NOC (Network Operations Centre) O On-Premises (On-Prem) Omnichannel IT Support OPEX (Operational Expenditure) Outsourced IT Support Object Storage P Penetration Testing Public Cloud PaaS (Platform as a Service) Private Cloud Q QA (Quality Assurance) Quick Deployment ERP Quantum-Safe Encryption Quality of Service (QoS) Query Optimisation R RAID (Redundant Array of Independent Disks) RPA (Robotic Process Automation) RMM (Remote Monitoring and Management) S SaaS (Software as a Service) Social Engineering SIEM (Security Information and Event Management) Structured Cabling RSLA (Service Level Agreement) T Ticketing System Thin Client Threat Detection and Response TCP/IP (Transmission Control Protocol / Internet Protocol) Total Cost of Ownership (TCO) 2FA (Two-Factor Authentication) U UCaaS (Unified Communications as a Service) User Access Management (UAM) UAE Data Protection Law Unified Communications (UC) Unified Threat Management (UTM) Uptime V Virtualisation VAT (Value Added Tax) VPN (Virtual Private Network) VoIP (Voice over Internet Protocol / Voice over IP) Vulnerability Assessment W WAN (Wide Area Network) Wi-Fi (Wireless Fidelity) WMS (Warehouse Management System) Wireless Security X XML (Extensible Markup Language) XML-Based EDI (Electronic Data Interchange) X-as-a-Service Portfolio Consolidation XDR (Extended Detection and Response) XaaS (Everything as a Service) xSP (Extended Service Provider) XDR (Extended Detection and Response) XSOAR (Extended Security Orchestration, Automation and Response) Y Your IT Roadmap (Strategic IT Planning) Yield Management (ERP Analytics) Year-on-Year IT Cost Reduction Year-Round IT Monitoring Year-End Close YoY Security Posture Improvement Z Zero Trust Security ZTNA (Zero Trust Network Access) Zero-Click Attack Zero Downtime Migration Zone-Based Firewall Architecture Zero Latency Networking Zero-Touch Provisioning (ZTP) Zero-Day Vulnerability Zero-Knowledge Proof