115 terms
Cloud and virtualization terms
You don’t need a server room to run modern apps. Use this glossary to decode cloud and virtualization terms so you can move a project to the cloud, avoid risky settings, and talk clearly with your provider.
Cloud computing: A definitive guide
Cloud computing is the delivery of computing services over the internet, providing on-demand access to applications, software, analytics, and data storage.
Child partition
A child partition is a separate virtualized environment within a parent partition (which acts as the host).
Cloud application portability
Cloud application portability is the ability to move apps, data, and workloads between different cloud platforms easily.
Cloud sprawl
Cloud sprawl refers to a situation when a lack of centralized oversight makes an organization's cloud usage unmanageable.
Cloud spanning
Cloud spanning refers to the practice of distributing workloads and applications across multiple cloud environments.
Cloud automation
Cloud automation refers to the process of automating the deployment and management of cloud computing resources.
Cloud printing
Cloud printing refers to a technology that allows users to send print jobs to remote printers over the internet.
Cloud orchestration
Cloud orchestration is the practice of coordinating cloud processes to produce a cohesive workflow that is compliant with the organization’s internal policies.
Cloud Workload Protection Platform
A cloud workload protection platform (CWPP) is a security tool that safeguards the software and data running in a company's cloud services.
Zero client
Zero Client is a minimalistic computing device without a hard drive, memory, software, or processing power.
vRealize automation
vRealize automation (vRA) is a cloud automation tool developed by VMware that enables IT administrators to create, deploy, and manage multi-cloud infrastructure and applications.
VM Sprawl
VM Sprawl is the uncontrolled growth of virtual machines within an environment.
VM escaping
VM escaping is a vulnerability in virtualization technology where an attacker escapes the isolation of a virtual machine and gains access to the underlying operating system and other VMs on the same physical machine.
Virtualization security
Virtualization security is a set of practices for protecting virtualized environments (such as virtual machines and hypervisors), which come with unique challenges that simply aren’t present in traditional physical environments.
Virtual to physical
Virtual to physical (V2P) is the process of moving software and data from a virtual environment (like a virtual machine or cloud server) to a physical hardware setup (like a dedicated server or a computer).
Virtual switch
A virtual switch is a program that lets virtual machines transfer data to one another, directing traffic based on media access control (MAC) addresses.
Virtual storage portal
A virtual storage portal is an online platform that allows you to upload and manage your digital files and data (e.g., photos, videos, music, ebooks, and more).
Virtual private server
A virtual private server is a type of web hosting service that maintains a separate virtual environment for the user on a shared physical server.
Virtual private data center
A virtual private data center (VPDC) is a virtualized version of a physical data center for business needs.
Virtual private cloud
A virtual private cloud (VPC) is a virtualized private network space in a public cloud environment.
Virtual machine snapshot
A virtual machine snapshot is a copy of a virtual machine's entire state, including its memory, disk, and settings.
Virtual machine configuration
Virtual machine configuration is another term for setting up a virtual machine on your computer.
Virtual machine cluster
A virtual machine cluster is a group of interconnected physical servers (hosts) that pool resources to provide a unified environment for managing and running multiple virtual machines.
Virtual host
A virtual host is a hosting service provider that specializes in virtual infrastructure solutions such as virtual servers, computers, storage, and other hybrid platforms that enable the hosting of applications, data, and/or services.
Virtual hard disk
A virtual hard disk is a file format that simulates a physical hard disk drive.
Virtual environment
A virtual environment refers to a software-based environment that emulates a hardware system.
Virtual drive
A virtual drive mimics a physical hard drive through software.
Virtual device
A virtual device is a software-based tool that mimics the functions and features of physical hardware components.
Virtual desktop infrastructure
Virtual desktop infrastructure (VDI) is a virtual network computing system that uses virtual machines to provide and manage virtual desktops.
Virtual Dedicated Server
A Virtual Dedicated Server is a hosting service that divides a single physical server into multiple virtual ones.
Vertical Cloud
A vertical cloud is a customized service developed for a particular industry, like healthcare, finance, or governmental institutions.
Service broker
In simple terms, service brokers are intermediaries between service providers and consumers.
Serverless
Serverless is a cloud computing architecture that eliminates the need for developers to manage and maintain servers.
Server virtualization
Server virtualization is the process of dividing one physical server into multiple virtual servers via a software layer known as a hypervisor.
Self-provisioning
Self-provisioning is when companies allow users to get access to apps or resources without directly involving the IT department.
SECaaS
SECaaS is a cloud-based model where security service providers host and manage security services and infrastructure in the cloud, allowing customers to use the services via the internet on a subscription basis.
Raw device mapping
Raw device mapping (RDM) is a virtualization technology developed by VMware.
Public cloud infrastructure
Public cloud infrastructure is a type of cloud computing that third-party providers use to deliver products, services and tools to end users over the internet.
Private cloud storage
Private cloud storage is a cloud computing model where a single organization manages its own isolated cloud infrastructure.
Physical to virtual
Physical to virtual (often shortened to “P2V”) is the process of migrating a physical computing environment (traditional computing infrastructure with physical servers) to a virtualized one (hypervisors and virtual machines).
Paravirtualization
Paravirtualization refers to a virtualization technique in which the guest operating system (the OS being virtualized) is aware of the fact that it's running in a virtualized environment and directly interacts with the underlying virtualization platform, or hypervisor.
Open Virtualization Format
Open Virtualization Format is a standard for packaging and distributing software that runs in virtual machines.
Multitenancy
Multitenancy is a software design where one application serves many customers or user groups (tenants).
Mobile cloud computing
Mobile cloud computing (MCC) is a computing approach that uses cloud technology to offer services (like apps) to mobile devices.
Middleware
Regarding cybersecurity middleware or Cloud Middleware refers to various software solutions that operate as an intermediary layer that facilitates communication, integrations, or interaction between different applications and software components.
Micro virtual machine
A micro virtual machine is hardware-isolated virtual machines (VM) that create a secure environment for tasks involving data from untrusted sources.
Managed Video as a Service
Managed Video as a Service is a cloud solution that provides video surveillance and storage services.
Kernel-based Virtual Machine
Kernel-based Virtual Machine is an open-source virtualization technology built into the Linux kernel.
Java virtual machine
A Java virtual machine (JVM) is a software engine that runs Java programs on any computer, regardless of your operating system.
Intelligent cloud
Intelligent cloud refers to a cloud computing model incorporating artificial intelligence (AI) to enhance the capabilities of cloud services.
Intel Virtualization Technology
Intel Virtualization Technology is Intel processors’ native ability to partition computing capacity and host several operating systems on one machine at the same time.
Integration platform as a service
Integration platform as a service (iPaaS) is a cloud-based platform that helps companies integrate different systems, applications, and data sources.
Hypervisor
A hypervisor, or virtual machine monitor (VMM), is software, firmware, or hardware that creates and manages virtual machines (VMs).
Hyperscale
Hyperscale, in computing and technology, refers to a system or infrastructure designed to scale up and handle vast amounts of data, workloads, or user demand.
Hybrid cloud storage
Hybrid cloud storage combines private on-premises data storage with public cloud storage.
Hybrid cloud security
Hybrid cloud security defines the practices, strategies, and technologies that safeguard the data and resources in a hybrid cloud environment.
Hybrid cloud management
Hybrid cloud management combines all the tools, strategies, and processes organizations use to oversee a hybrid cloud environment.
Hosted virtual desktop
A hosted virtual desktop allows you to access a computer's workspace anywhere.
Host virtual machine
A host virtual machine is the hardware supplying computing resources for a guest virtual machine (VM), managed by programs called hypervisors.
Hardware virtualization
Hardware virtualization is the process of a physical machine (host) utilizing specialized software called a hypervisor to emulate one or more virtual machines (VMs).
Hardware as a service
Hardware as a service is a business model where customers rent out physical IT infrastructure on a subscription.
Guest Operating System
A Guest Operating System is an OS installed within a virtual machine (VM) or on a partitioned physical host.
Grid computing
Grid computing is a distributed computing infrastructure that uses a grid of computers to perform large-scale complex tasks.
Function as a service
Function as a service is a cloud computing platform that lets users develop, run, and manage application functionalities without the infrastructure typically required to perform these tasks.
Enterprise as a service (EaaS)
These days subscription services are everywhere and Enterprise as a service (EaaS) is no exception.
Emulator
An emulator is a hardware device or a piece of software that allows one computer system (the host) to perform the operations of another computer system (the guest).
Elastic IP address
An elastic IP address is a static IPv4 address that can be remapped to different resources in a cloud computing environment.
Docker
Docker is a platform that enables developers to create, deploy, and run applications packaged in virtual containers.
Distributed cloud
A distributed cloud is a cloud computing model in which cloud resources, services, and infrastructure are distributed across multiple physical locations, including data centers, edge computing nodes, and other remote facilities.
Digital twin
A digital twin refers to a digital simulation of a real-world object, system, or process that leverages real-time information to generate a dynamic and precise model.
Desktop as a Service
Desktop as a Service is a cloud computing solution in which a provider delivers virtual desktops over the internet, typically on a subscription basis.
Data cloud
A data cloud is an integrated cloud-based platform that enables organizations to manage data from various sources.
Data center virtualization
Data center virtualization is designing, developing, and implementing virtual versions of physical IT resources, such as servers, storage devices, and networks, within a data center environment.
Container technology
Container technology, frequently called OS-level virtualization, is a compact, self-contained, executable software package.
Container isolation
Container isolation is the practice of keeping containers — lightweight and isolated units that encapsulate an application and its dependencies — separately and independently from each other and the host system.
CNAPP
A cloud-native application protection platform (CNAPP) is a security solution to safeguard cloud-native applications.
Cloudware
Cloudware refers to software and services that run on the internet (“the cloud”) instead of local devices.
CloudTrust protocol
CloudTrust protocol (CTP) refers to a mechanism that provides transparent security and compliance information about cloud services.
Cloud VPS
A cloud VPS (virtual private server) is a hosting solution that grants users exclusive access to an allocated set of resources, including CPU, memory, and bandwidth within a cloud computing environment.
Cloud storage gateway
As a technology, cloud storage gateway makes connectivity and data transfer between local and cloud systems possible.
Cloud server
Cloud server refers to a virtual server that runs in a cloud computing environment.
Cloud security posture management
Cloud security posture management refers to the practices and tools used to ensure that cloud-based systems are configured and managed in a secure and compliant manner.
Cloud provisioning
Cloud provisioning is the process of allocating computing resources (such as virtual machines, storage, databases, and networking components) in a cloud environment.
Cloud operations management
Cloud operations management is a set of practices and technologies for managing cloud infrastructure so it runs smoothly, stays secure, doesn't cost too much, and is always available when you need it.
Cloud operating system
A cloud operating system is a system that can store and analyze data for a web-based app while also providing access to the server's hardware and software.
Cloud networking
Cloud networking refers to the use of cloud-based services to manage and deploy a company network.
Cloud encryption gateway
Cloud encryption gateway is a security solution that acts as an intermediary between a client and a cloud service provider to encrypt data before it leaves the client's network and enters the cloud.
Cloud enablement
Cloud enablement is the process of integrating cloud computing services into an organization’s existing IT infrastructure.
Cloud elasticity
Cloud elasticity can dynamically and automatically adjust computing storage and various network resources for constantly changing workloads.
Cloud database
A cloud database is a database built on and accessed through a cloud-based platform.
Cloud data platform
A cloud data platform is an online hub that offers tools for storing, managing, analyzing, and processing data from different sources.
Cloud communications
Cloud communications refer to delivering communication services through the internet when third-party providers host applications, switching, and storage.
Cloud cartography
Cloud cartography refers to a method used to map the virtual infrastructure of cloud computing environments.
Cloud-based supercomputing
Cloud-based supercomputing means using a group (known as a cluster) of powerful internet-connected computers to efficiently manage and solve complicated tasks.
Cloud attack
A cloud attack is a malicious activity that targets systems, services, infrastructure, or data hosted in a cloud.
Cloud as a service
Cloud as a service is a business model for delivering cloud services using subscriptions or pay-per-use arrangements.
Cloud archiving
Cloud archiving is when you store data in a cloud for a long term.
Cloud architecture
Cloud architecture uses remote servers over the internet to manage and provide computing resources.
Cloud advertising
Cloud advertising is advertising that uses cloud computing to run campaigns.
Citrix server
Citrix server is a suite of products by Citrix Systems that provide a virtualization platform for hosting applications and desktop environments.
CIEM
Cloud infrastructure entitlement management (CIEM) is a cybersecurity technology that aids organizations in managing and controlling identity privileges and access entitlements within cloud environments.
Broad network access
Broad network access refers to the system’s ability to provide access over the network through various devices.
Big data as a service
Big data as a service (BDaaS) is a cloud-based service that gives companies the tools and infrastructure for storing and analyzing large volumes of data.
Bare-metal provisioning
Bare-metal provisioning is installing an operating system or applications directly onto a server's hardware without an intervening layer such as a virtual machine or a hypervisor.
Application virtualization
Application virtualization is a technology that encapsulates computer programs from the operating system on which they run.
Application streaming
Application streaming refers to technology that allows users to use software applications or access digital content over the internet without needing to download and install them.
Application service provider
An application service provider (ASP) is a company that delivers software services over the internet.
Application infrastructure provider (AIP)
An application infrastructure provider (AIP) offers tools and services for creating, launching, and managing applications.
Application hosting
Application hosting refers to storing and running software applications on a server or cloud to make them accessible online.
AI as a service
AI as a service (AIaaS) is a third-party solution offering companies artificial intelligence tools on a subscription basis.
The importance of cloud and virtualization terminology
Cloud platforms can save money and speed up releases — but a small setup mistake can expose data or cause outages. Knowing the basics helps you pick the right options, set safer defaults, and work smoothly with your provider and team.
Choose the right setup
Understand IaaS, PaaS, and containers to match your workload to the right service and avoid overpaying.
Avoid misconfigurations
Terms like “hypervisor,” “snapshot,” and “identity and access management” make it easier to lock down resources from day one.
Collaborate clearly
A shared vocabulary keeps conversations with developers and vendors direct and productive.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.