6 Glossary
The following terms and definitions are used in this document.
|
Term |
Short for |
Definition |
|---|---|---|
|
API |
Application Programming Interface |
A a set of rules, protocols, and tools that allows different software applications to communicate with each other. |
|
BC / DR |
Business Continuity / Disaster Recovery |
A plan consisting of the set of policies, processes and procedures that enable a business to minimize the negative effects of a disaster and remain operational during and following its occurrence. |
|
DNS |
Domain Name System |
The Internet's "phone book," translating human-friendly domain names like google.com into numerical IP addresses that computers use to locate each other. |
|
DPA |
Data Processing Agreement |
Admin By Request's main contractual specification of its obligations to customers. |
|
DPO |
Data Protection Officer |
The role at Admin By Request responsible for data protection and ensuring compliance with data privacy regulations like the GDPR. |
|
GDPR |
General Data Protection Regulation |
The primary European specification for ensuring compliance with data privacy and security regulations. |
|
Microsoft Azure SQL |
Microsoft Azure SQL |
A cloud-based family of database management products developed by Microsoft. |
|
OPSWAT |
OPSWAT |
Us-based software company that develops and sells MetaDefender. |
|
RTO |
Recovery Time Objective |
The amount of time within which an organization’s processes, systems and/or applications must be restored in order to avoid significant damage to the business. |
|
SIEM |
Security Information and Event Management |
A subsection within the field of computer security, where software products and services combine security information management (SIM) and security event management (SEM). |
|
SQL |
Structured Query Language |
Language used for managing data in relational database management systems. Often incorporated into product names (e.g. Microsoft Azure SQL). |
|
SSL |
Secure Sockets Layer |
A computing protocol that ensures the security of data sent via the internet by using encryption. |




