Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

P

Patch Management

The process of applying vendor-issued updates to close security vulnerabilities and optimize the performance of software and devices. The best patch management services detect missing patches, outdated or EOL software, and known CVEs, then correlate that data with risk severity to help teams prioritize remediations.

PSA

Stands for Professional Services Automation. The core business and operations platform for an MSP delivering managed services. It brings together the service desk and ticketing, time and expense tracking, project management, contracts and SLAs, billing and invoicing, procurement, and reporting in one system, ensuring work is captured, managed, and billed consistently end-to-end.

R

Remote Monitoring and Management (RMM)

The technology IT and MSPs use to centrally monitor, secure, and maintain networks, servers, and devices (endpoints). Modern RMM solutions support both on-premises and cloud infrastructure monitoring and remote smart device management to improve efficiency and cost.

S

Security Operations Center (SOC)

A security team that acts as an organization's central command, bringing together its entire IT infrastructure. High costs, complexity, and staff-intensive requirements make deploying an internal SOS unrealistic for all but the largest enterprises. Managed service providers (MSPs) are key to providing critical SOC services for smaller and mid-market businesses.

SOAR

Stands for Security Orchestration, Automation, and Response. A technology that unifies security tools, automates repetitive tasks, and orchestrates incident response workflows to help security teams manage threats more efficiently, reducing manual effort and improving response times.

Software as a Service (SaaS)

A cloud-based model where software applications are delivered over the Internet, typically via a web browser, on a subscription basis, with the provider managing all underlying infrastructure, maintenance, and updates.

X

XDR

Stands for Extended Detection and Response. While EDR focuses on identifying and responding to threats at the endpoint level, XDR broadens the scope by collecting telemetry data and automatically correlating detections across multiple security domains, including endpoint, identity, email, network, and cloud. Using AI and machine-learning technologies, XDR then performs automatic analysis to integrate them into a centralized security system.

Z

Zero Trust

A cybersecurity strategy based on the principle of "never trust, always verify," assuming threats exist everywhere. Rather than relying on a single technology, it implements multiple security controls, including multi-factor authentication, EDR, Zero Trust Network Access, and dark web credential monitoring. In addition, users only have access to the specific parts of the network they need and not more.

Zero Trust Identity Framework

A security model that requires strict identity verification for every person and device, inside or outside the network perimeter, trying to access resources on a private network.

Zero Trust Network Access (ZTNA)

A security framework that assumes threats are everywhere and therefore verifies every user and device attempting to access resources, and grants least-privileged access to specific applications rather than to the entire network. A foundational security model within SASE.