Veeam Glossary

A

Application Virtualization

Application virtualization is the practice of using a virtualization layer to trick an application into thinking it’s interacting directly with the host operating system. 

C

Containers vs VMs

Containers and virtual machines (VMs) are both virtualization solutions, although they serve different purposes and work in slightly different ways. 

Cloud Security

Cloud security implements a combination of technical and organizational measures to protect the data and services of a business.

Conti

When a cybercriminal deploys Conti on a victim's network, it spreads rapidly while encrypting and transferring data to a remote location.

CryptoLocker

In most cases, CryptoLocker is delivered through phishing emails that attempt to trick victims into downloading and executing the ransomware.

D

Desktop Virtualization

Desktop virtualization is a technical implementation that enables a system to emulate other systems using only software.

E

Endpoint Security

Endpoint security is the practice of securing endpoints such as mobile devices, laptops and desktop computers from malicious activity.

H

Hypervisor

A hypervisor is a virtualization tool that allows a single host computer to run multiple guest virtual machines, sharing resources such as processor threads, memory or network throughput.

M

Malware

Malware is malicious software designed to infect computers, phones or similar devices. The software may damage the device, collect information or be used to extort money from the victim.

N

Network Virtualization

Network virtualization transforms a hardware-based network into a software-based network, known as Software Defined Networking (SDN).

R

Ransomware

Ransomware is a form of malware that prevents users from accessing their systems or personal files. It is not a computer virus.

Ransomware Types

Ransomware can be divided into four key categories, based on the type of threat it presents to its victims.

S

Server Virtualization

Server virtualization is the practice of using software to divide a single physical server into several virtual machines (VMs), each of which can run a different operating system.

P

Phishing

Phishing is a form of social engineering attack in which malicious parties trick a person into providing sensitive information.

V

Virtual Desktops

Virtual desktops are a form of desktop environment that users can access remotely from a variety of endpoint clients.

Virtual Desktop Infrastructure (VDI)

Virtual desktop infrastructure, or VDI, refers to the infrastructure used to provision and manage virtual machines and provide virtual desktops to users. 

Virtual Machine

A virtual machine, or VM, is exactly what the name suggests, a form of virtual computer.

Virtualized Security

Virtualized security is a flexible, software-based system that provides security to VMs.

Vulnerability Management

Vulnerability management is the process of identifying and assessing vulnerabilities, reporting on them and managing or mitigating them.

W

WannaCry

WannaCry is a ransomware cryptoworm that specifically targets computers running any version of the Microsoft operating system.