Skip to content
Capabilities
Close Capabilities
Open Capabilities
Featured Services
Cloud Cost Optimization
Cloud Cost Scorecard
Cloud Security Assessment
Cloud Audit [Launching soon]
Simplified Data Protection
Simplified Disaster Recovery
Cloud Advisory and Consulting
Simplify your IT while reducing cost and increasing security.
Cloud Migration
Services
Migrating workloads to AWS without disrupting your business
Simplified Cloud Networking
Increase agility, and availability and reduce cost.
Simplified Data
Protection
Reduce data protection costs by up to 50%.
Managed Disaster
Recovery
Australia's first no loc k-in Managed Disaster Recovery
Data Assurance
Never worry about your data, and its integrity anymore.
Managed Detect and Response (MDR)
Backed by Breach Prevention warranty.
Cloud Security
Assessment
Identify configurations, risks and attack surfaces.
Cyber Security Services
Radical Security uplift without breaking the bank.
Cloud Cost Optimisation
AWS Services
Close AWS Services
Open AWS Services
Cloud Advisory and Consulting
Simplify your IT while reducing cost and increasing security.
Cloud Migration
Services
Migrating workloads to AWS without disrupting your business.
Cost Optimization
Eliminate Cloud Waste, increase your ROI and reduce your costs.
AWS Cloud Security Assessment
Identify misconfigurations and risks and protect your business.
Azure to AWS Cloud
Migration
Migrating your workloads from Azure to AWS without impacting your operations.
Data Assurance
Never worry about your data, and its integrity anymore.
Managed Detect and Response (MDR)
Backed by Breach Prevention warranty.
Cloud Security
Assessment
Identify configurations, risks and attack surfaces.
Cyber Security Services
Radical Security uplift without breaking the bank.
Cyber Security
Resources
Close Resources
Open Resources
Cloud Cost Scorecard
Assess your cloud spendings and potentials to save cost.
Cloud Computing Acronyms
A collection of Helpful but sometimes confusing acronyms
Cloud Computing Encyclopedia
It is an encyclopedia, but focused on Cloud Computing.
Cloud Security Score
Launching soon.
Cyber Security Acronyms
A collection of every Cyber Security Acronym you must know
Cyber Security Encyclopedia
Launching soon
Get Started
Jump to:
A
B
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
Popular Cloud Acronyms
A
ACL
- Access Control List
ACM
- AWS Certificate Manager
AI
- Artificial Intelligence
AMI
- Amazon Machine Image
API
- Application Programming Interface
AR
- Augmented Reality
ARN
- Amazon Resource Name
ASCII
- American Standard Code for Information Interchange
ASR
- Automatic Speech Recognition
AWS
- Amazon Web Services
AZ
- Availability Zone
B
BC
- Business Continuity
BCDR
- Business Continuity & Disaster Recovery
BGP
- Border Gateway Protocol
BGP ASN
- Border Gateway Protocol Autonomous System Number
BYOD
- Bring Your Own Device
BYOL
- Bring Your Own License
C
CA
- Certificate Authority
CA
- Certificate Authority
CACL
- Cloud ACL (Access control List)
CDN
- Content Delivery Network
CI/CD
- Continuous Integration/Continuous Delivery
CLI
- Command Line Interface
CMK
- Custom Master Key
CORS
- Cross-Origin Resource Sharing
CPU
- Central Processing Unit
CSP
- Cloud Service Provider
CV
- Computer Vision
D
DB
- Database
DHCP
- Dynamic Host Configuration Protocol
DKIM
- Domain Keys Identified Mail
DMS
- Database Migration Services
DNS
- Domain Name System
DR
- Disaster Recovery
CORS
- Cross-Origin Resource Sharing
CPU
- Central Processing Unit
CSP
- Cloud Service Provider
CV
- Computer Vision
E
EBS
- Certificate Authority
EC2
- Elastic Compute Cloud
ECR
- Elastic Container Registry
ECS
- Elastic Container Service
ECS
- Elastic Container Service
EFS
- Elastic File System
EIP
- Elastic IP
EKS
- Elastic Kubernetes Service
ELB
- Elastic Load Balancer
EMP
- End-of-Service Migration Program
EMR
- Elastic Map Reduce
ENI
- Elastic Network Interface
ETL
- Extract, Transform, and Load
F
FIM
- Federated Identity Management
FIS
- Fault Injection Simulator
FTP
- File Transfer Protocol
SFTP
- Secure File Transfer Protocol
G
GB
- Gigabyte
GPU
- Graphic Processing Unit
H
HA
- High Availability
HIPPA
- Health Insurance Portability and Accountability Act
HMAC
- Hash-Based Message Authentication Code
HPC
- High Performance Computing
HRNN
- Hierarchical Recurrent Neural Network
HSM
- Hardware Security Module
HTML
- HyperText Markup Language
HTTP
- Hyper Text Transfer Protocol
HTTPS
- Hyper Text Transfer Protocol Secure
HVM
- Hardware Virtual Machine
I
IaaS
- Infrastructure as a Service
IAM
- Identity and Access Management
IDE
- Integrated Development Environment
Idp
- Identity Provider
IOPS
- Input/Output Operations Per Second
IoT
- Internet of Things
IP
- Internet Protocol
IPSec
- Internet Protocol Security
ISP
- Internet Service Provider
ISV
- Independent Software Vendor
IT
- Information Technology
ITSM
- IT Service Management
J
JSON
- JavaScript Object Notation
K
KDM
- Kinesis Data Stream
KMS
- Key Management Service
L
KDM
- Kinesis Data Stream
M
Mac
- Media Access Control ( Mac Address )
MAC
- Message Authentication Code
MAP
- Migration Acceleration Program
MFA
- Multi-Factor Authentication
MIME
- Multipurpose Internet Mail Extensions
ML
- Machine Learning
MSP
- Managed Service Provider
MTA
- Mail Transfer Agent
MWAA
- Managed Workflows for Apache Airflow
N
NACL
- Network Access Control List
NAT
- Network Address Translation
NLP
- Natural Language Processing
O
OCR
- Optical Character Recognition
OLAP
- Online Analytical Processing
OLTP
- Online Transaction Processing
OU
- Organizational Unit
P
PaaS
- Platform as a Service
PAT
- Port Address Translation
PoC
- Proof of Concept
Q
QLDB
- Quantum Ledger Database
R
RAM
- Resource Access Manager
RDS
- Relational Database Service
REST
- Representational State Transfer
RTMP
- Real Time Messaging Protocol
S
S3
- Simple Storage Service
SaaS
- Software as a Service
SAM
- Serverless Application Model
SAML
- Security Assertion Markup Language
SCP
- Secure Copy Protocol
SCP
- Service Control Policy
SCT
- Scheme Conversion Tool
SDK
- Software Development Kit
SES
- Simple Email Service
SFTP
- Secure File Transfer Protocol
SG
- Security Group
SHA
- Secure Hash Algorithm
SLA
- Service Level Agreement
SMC
- Simple Notification Service
SMTP
- Simple Mail Transfer Protocol
SNS
- Simple Notification Service
SOAP
- Simple Object Access Protocol
SOC
- Service Organization Control
SOC2
- Service Organization Control 2
SoW
- Statement of Work
SPF
- Sender Policy Framework
SPICE
- Super-fast, Parallel, In-memory Calculation Engine
SQL
- Structured Query Language
SQS
- Simple Queue Service
SSE
- Server-Side Encryption
SSH
- Secure Shell
SSL
- Secure Sockets Layer
SSO
- Single Sign-On
SSP
- Supply Side Platform
STS
- Security Token Service
SWF
- Simple Workflow Service
T
TCO
- Total Cost of Ownership
TCP
- Transmission Control Protocol
TLS
- Transport Layer Security
TTS
- Text-to-Speech
TTL
- Time to Live
U
UDP
- User Datagram Protocol
URI
- Uniform Resource Identifier
URL
- Uniform Resource Locator
V
VERP
- Variable Envelope Return Path
VGW (VPG)
- Virtual Private Gateway
VM
- Virtual Machine
VPC
- Virtual Private Cloud
VPN
- Virtual Private Network
VR
- Virtual Reality
W
WAF
- Web Application Firewall
WAM
- WorkSpaces Application Manager
WAR
- Well-Architectured Review
WSDL
- Web Services Description Language
X
XML
- Extensible Markup Language
Y
XML
- Extensible Markup Language
Z
XML
- Extensible Markup Language
B
BC
- Business Continuity
BCDR
- Business Continuity & Disaster Recovery
BGP
- Border Gateway Protocol
BGP ASN
- Border Gateway Protocol Autonomous System Number
BYOD
- Bring Your Own Device
BYOL
- Bring Your Own License
Scroll to Top