Go Back Up
Alphabetical List

A

Advanced Endpoint Security

Modern protection for laptops, desktops, and servers that goes beyond traditional antivirus software. Instead of relying only on known malware signatures, advanced endpoint security uses behavioral analysis, machine learning, and real-time monitoring to detect suspicious activity before it executes.

  • Why it matters: We deploy this technology as the foundation of our Core Defense and Apex Security solutions to protect your workforce, wherever they connect.

B

Backup and Disaster Recovery (BDR)

The combination of technologies and processes that protect business data and ensure operations can be restored after a disruption. Backups create secure copies of data, while disaster recovery ensures systems, applications, and workflows can be brought back online quickly.

Business Continuity

An organization’s ability to continue operating critical functions during and after unexpected disruptions such as cyberattacks, system failures, or natural disasters. It aligns technology, people, and processes to define acceptable downtime and recovery objectives.

C

Cloud Infrastructure

Servers, storage, networking, and computing resources delivered over the internet rather than hosted on-site. Platforms like Microsoft Azure and AWS allow businesses to scale resources up or down as needs change, reducing capital expense and improving flexibility.

Cloud Migration

The process of moving applications, data, or workloads from on-premise environments to cloud platforms. Successful migrations are planned around business outcomes, accounting for security, compliance, performance, and long-term cost management.

  • See the impact: We manage these transitions through our IT Modernization services to reduce complexity and technical debt.

Co-Managed IT

A shared responsibility model where internal IT teams retain control while CompassMSP provides supplemental expertise, tools, monitoring, and coverage. This prevents burnout and adds critical security capabilities without replacing existing staff.

Compliance

Meeting regulatory and industry requirements that govern how data is protected and systems are managed (e.g., HIPAA, NYDFS 500, PCI DSS, SOC 2). For leadership, compliance is a risk management discipline requiring documented processes and executive oversight.

Cyber Risk Assessment

An evaluation of an organization’s cybersecurity posture that identifies vulnerabilities, threats, and gaps across people, processes, and technology. The goal is to translate technical findings into business impact and actionable priorities.

  • Start here: Our Cybersecurity Advisory team uses these assessments to build roadmap-driven security strategies.

Cyber Resilience

The ability to prevent, withstand, recover from, and adapt to cyber incidents. It recognizes that not all attacks can be prevented, prioritizing continuity and recovery over the unrealistic goal of perfect prevention.

E

Endpoint Detection and Response (EDR)

A security capability that continuously monitors endpoints (laptops, servers) for suspicious behavior and enables investigation and response in real time. EDR tools are critical for detecting threats that bypass traditional defenses.

I

Incident Response Plan

A defined strategy outlining how an organization detects, responds to, contains, and recovers from cybersecurity incidents. It clarifies roles, communication protocols, and escalation paths to reduce chaos during high-pressure situations.

  • Executive readiness: Our vCISO Advisory service helps leadership teams build and test these plans before a crisis occurs.

M

Managed IT Services

A service that combines security technology with human analysts who monitor, investigate, and respond to threats 24/7. Unlike software-only tools, MDR provides active threat hunting and response to reduce dwell time.

  • Advanced defense: MDR is the engine behind our Apex Security solution, providing enterprise-grade protection for mid-market firms.

Multi-Factor Authentication (MFA)

A security control that requires users to verify their identity using more than one factor, such as a password and a mobile prompt. It is one of the highest-impact controls available for reducing credential-based attacks.

  • Implementation: We mandate and manage MFA across all client environments as part of our Cybersecurity Advisory standards.

S

Security Operations Center (SOC)

A centralized function responsible for continuously monitoring, detecting, and responding to cybersecurity threats. SOCs operate 24/7 to provide visibility across endpoints, networks, and cloud environments.

  • 24/7 Coverage: Our US-based SOC powers our Apex Security service, delivering continuous eyes-on-glass monitoring.

V

vCIO (Virtual Chief Information Officer)

Executive-level technology leadership provided on a flexible basis. A vCIO aligns IT strategy with business goals, budgets, and growth plans, focusing on long-term governance rather than day-to-day support.

  • Strategic value: vCIO guidance is a core pillar of our Strategic IT Consulting and high-level Managed IT engagements.

vCISO (Virtual Chief Information Security Officer)

Security leadership that provides risk management, compliance oversight, and governance without the cost of a full-time executive. The vCISO establishes security strategy, policies, and reporting structures.

Z

Zero Trust

A security model that assumes no user or device should be trusted by default. Every access request is verified based on identity, device health, and context to reduce the impact of compromised credentials.

#

24/7/365 Monitoring

Continuous observation of systems and security events, including nights, weekends, and holidays. This ensures issues are detected and addressed before they escalate into downtime or data loss.

Featured Resources

Stay sharp. Stay secure.

Explore expert insights, practical tips, and real-world advice from our blog curated to help you make smarter tech decisions.

Cybersecurity Manufacturing Case Study 0 min read

Manufacturing Company Secures Billion-Dollar Supply Chain at Scale with Forensic-Led Cybersecurity

Discover how a manufacturing company enhanced cybersecurity and achieved billion-dollar supply chain resilience through forensic-led strategies, ensuring operational stability and zero insurance claims.

Telecom Healthcare Case Study 0 min read

Southwest Cardiovascular Associates Boosts Patient Experience & Operational Agility with Unified Communications

Southwest Cardiovascular Associates enhances patient experience and operational efficiency through a unified communications solution, achieving significant productivity and first-call resolution improvements.

Telecom eBooks 0 min read

From Dial Tone to Differentiation: Elevating Customer Experience with Unified Communications

Enhance customer experience and drive loyalty by modernizing your communications with a unified platform that integrates voice, video, and chat for seamless interactions.