Skip to Content Skip to Footer
Fusion5 New Zealand
    • Applications
    • Cloud Platforms
      • Cloud Platforms
      • Amazon Web Services (AWS)
      • Citrix
      • Microsoft Azure
      • Oracle Cloud Infrastructure
      • Resources
        • Resources
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • AWS Cloud Cost Optimisation eBook
        • Integrating FinOps with your cloud cost optimisation strategy
          See all resources
    • CRM
      • CRM
      • Dynamics 365 CRM
      • Dynamics 365 Customer Insights
      • Dynamics 365 Customer Service
      • Dynamics 365 Field Service
      • Dynamics 365 Sales
      • Resources
        • Resources
        • How your marketing communication can be enterprise quality
        • 6 data migration mistakes that will stop your CRM project in its tracks
        • Why do so many CRM implementations fail?
          See all resources
    • ERP
      • ERP
      • NetSuite
      • Dynamics 365 Business Central
      • Dynamics 365 Finance and Operations
      • JD Edwards
      • Resources
        • Resources
        • How do you choose the right ERP?
        • ERP upgrade powers Counties Energy
        • Why Project Governance Matters in ERP
          See all resources
    • HR & Payroll
      • HR & Payroll
      • Jemini
      • Jade Star
      • EmpowerHR
      • MYOB PayGlobal
      • MyWorkplace
      • TimeFiler
    • Planning and Analytics
      • Planning and Analytics
      • BlackLine
      • IBM
      • Insight Software
      • Workday Adaptive Planning
      • Resources
        • Resources
        • AFL Streamlines Reporting with Workday
        • Why Excel and ERP aren’t financial planning best friends. And what you can do about it
          See all resources
    • Service Management
      • Service Management
      • Ivanti
      • Xurrent
      • Resources
        • Resources
        • Shellharbour City Council empowers service management
        • Optimising service management with an integrated approach
        • Why your business needs an integrated Service Management platform
          See all resources
    • Services
    • Artificial Intelligence
    • Cloud
      • Cloud
      • Cloud Advisory
      • Cloud Engineering
      • Cloud Migration
      • Cloud Platforms
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Consultancy and Advisory
      • Consultancy and Advisory
      • Digital Transformation Consulting
      • Infrastructure
      • Programme Management
      • Organisational Change Management
      • Security
      • Resources
        • Resources
        • Why Project Governance Matters in ERP
        • When it comes to successful delivery, hybrid is the passport to success for most projects.
          See all resources
    • Customer Success Team
      • Customer Success Team
      • Help Desk
      • PartnerPlus
    • Data and Analytics
    • Infrastructure
      • Infrastructure
      • Server and Database Management
      • Virtual Workspaces
      • Resources
        • Resources
        • Dive deep into cost optimisation for your Azure environment with our comprehensive guide. 
        • Cloud wars: AWS vs. Azure - who wins in cost management?
        • Unlock your cloud's full potential: A guide to cost optimisation
          See all resources
    • Integration
    • Managed Services
      • Managed Services
      • Managed Cloud
      • Managed Help Desk
      • Managed Infrastructure
      • Managed Security
      • Resources
        • Resources
        • The future of Service Management: Is each department in your business ready?
        • Optimising service management with an integrated approach
        • Overcoming common service management challenges
          See all resources
    • Payroll
      • Payroll
      • Outsourced Payroll
      • Remediation as a Service
    • Security
      • Security
      • Endpoint Detection and Response
      • Governance, Risk & Compliance
      • Modern Work
      • Security Operations Centre
      • Resources
        • Resources
        • Cyber threats in 2024: A growing menace
        • Your guide to eliminating cyber threats
        • The rising tide of cyber threats: How prepared are you?
          See all resources
    • Industries
    • All industries
    • Agribusiness
    • Education
    • Financial Services
    • Manufacturing
    • Professional Services
    • Public Sector
    • Wholesale Distribution
    • Strategic Partners
    • Amazon Web Services (AWS)
    • Microsoft
      • Microsoft
      • Microsoft overview
      • Products
        • Products
        • Microsoft Azure
        • Microsoft Copilot
        • Dynamics 365 Customer Engagement (CRM)
        • Dynamics 365 Business Central
        • Dynamics 365 Finance and Operations (ERP)
      • Services
        • Services
        • Licensing
        • Modern Work
        • Premier Support
      • Industries
        • Industries
        • Construction
        • Education
        • Financial Services
        • Food and Beverage
        • Manufacturing
        • Not for Profit
        • Local Government
        • 3PL
      • Resources
        • Resources
        • HHG and Microsoft Copilot: AI efficiency with a human touch
        • Right-size your Dynamics 365 storage and licences before August 30, 2025
        • Adopting Microsoft Copilot
          See all resources
    • Oracle
      • Oracle
      • Oracle overview
      • Products
        • Products
        • NetSuite
        • JD Edwards
      • Resources
        • Resources
        • BLUNT Umbrellas unfolds sustainable technology strategy
        • Treasury Wine Estates - ERP project success story
        • NetSuite Video Testimonials
          See all resources
    • Partner Ecosystem
    • Explore
    • All insights & resources
    • Blogs
      • Blogs
      • AI in Law: A general counsel’s journey
      • Ask the experts: 10 business benefits of an integration-first strategy
      • Powering standout CX with Dynamics 365
        See all blogs
    • Case studies
      • Case studies
      • ERP upgrade powers Counties Energy
      • HHG and Microsoft Copilot: AI efficiency with a human touch
        See all case studies
    • Events
      • Events
      • Go beyond human limits: Activate the new workforce
        See all events
    • News
      • News
      • Fusion5 achieves Inner Circle Partner status for 9th year
      • Fusion5 strengthens NetSuite services with Applejack
      • Fusion5 acquires APAC Shopify Premier Partner
        See all news
    • Resources
      • Resources
      • Build AI on trusted data eBook
      • Avoiding digital transformation failure: A practical guide for CIOs
      • AWS Cloud Cost Optimisation eBook
        See all resources
Contact Us

The ABCs of cyber security

Microsoft Blogs Security Services
  • Microsoft
  • Products
    • Dynamics 365 Customer Engagement (CRM)
    • Dynamics 365 Finance & Operations (ERP)
    • Dynamics 365 Business Central
    • Microsoft Azure
    • Microsoft Copilot
  • Industries
    • Construction
    • Education
    • Financial Services
    • Manufacturing
    • Food and Beverage
    • Not for Profit
    • Local Government
    • 3PL
  • Services
    • Licensing
    • Premier Support
  • Resources
    • Resources
    • Blogs
    • Case Studies
    • Events

If you're concerned about whether your business has the proper protection and your executives have the tools and solutions they need, check out our plain language guide to what's out there to help.

Do you think IT acronyms are annoying?

Well, you can be forgiven if you're struggling to wrap your head around some of the latest cyber security acronyms — there's a lot!

But while the abundance of new acronyms can be frustrating, they come with good reason as they represent a myriad of new approaches the technology industry is taking to help you keep pace with the ever-evolving cyber threat that exists today.

Cyber security is big business. Microsoft recently announced a quadrupling of their cyber security investment to $20 billion over the next five years, a number that is unmatched across the industry. But with the cost of cybercrime predicted to hit $10.5 trillion by 2025 (2022 Cybersecurity Almanac), IT Security leaders worldwide are still feeling the pinch.

A recent survey reports that 51% of security executives have experienced 'extreme stress or burnout' during the past year, with 65% saying they were considering leaving their jobs.

So, if you're concerned about whether your business has the proper protection and your executives have the tools and solutions they need, check out our plain language guide to what's out there to help. No longer will your eyes glaze over the growing number of acronyms as you continue to optimise your cyber security.

ABCs Meaning
CAASM

To understand your Cyber Asset Attack Surface Management (CAASM), let's start with your attack surface, defined as any physical or digital interface where a cyber attacker could gain entry to your system and access your sensitive information.

CAASM is a relatively new term that provides greater visibility over assets such as your software (cloud or on-premises), code repositories, devices, and identities.

As the complexity of your digital assets continues to evolve, particularly with the emergence of remote working, the harder it is to understand your complete digital asset profile, not to mention monitor and protect it from any potential breach.

CAASM provides a single pane of glass for your digital asset management. Without it, you're not just limiting the visibility of your IT Security team, but leaders throughout the business are left in the dark about their areas of greatest vulnerability. So, it serves not just as a tool within your cyber security team's confines but can help educate the rest of the business and help them visualise their shared risk.

CASB  A Cloud Access Security Broker (CASB) is a piece of software that sits between your users and your cloud applications to enforce security policies set by your security team or partner. Think of it as your security bouncer that acts as a gatekeeper to your digital environment and helps to flag any unsafe activity. And can be applied to entirely cloud-based environments, on-premises, or a hybrid of both.

Without a CASB, you're increasing the risk and complexity when moving your business to the cloud. An advanced CASB will ensure you have policies that include authentication, single sign-on, authorisation, credential mapping, device profiling, encryption, tokenisation, logging, alerting, and malware detection/prevention (Gartner, 2022).
CNAPP Cloud-Native Application Protection Platform (CNAPP) is another newly coined term that combines Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platforms (CWPP).

But what are CSPM and CWPP, I hear you ask? Well, before we get into the differences, let's address one of the commonalities: they all relate to your 'cloud' security.

Your cloud computing infrastructure, whether it's private, public, or a hybrid model, will include Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS). When it comes to managing these, you may find comfort in using one of the three major providers: Amazon Web Services, Google Cloud Platform and Microsoft Azure.

However, Gartner states that through to 2025, 99% of cloud security failures will be the fault of the customer. That's you. Why? It primarily comes down to misconfiguration, or more simply, human error. And that's precisely what CNAPP, CSPM, and CWPP are for — to prevent the misconfiguration of your cloud-based infrastructure
CSPM Going back to your CASB (your security bouncer), think of your Cloud Security Posture Management (CSPM) as your security bouncer on steroids. As you continue to scale the size and complexity of your business, CSPM will use automation to identify and remediate the risks across your cloud infrastructures.

Throughout the day, your cloud may connect and disconnect from thousands of networks (which makes the cloud so powerful), but it also increases the complexity of its security.

This is why CSPM can add so much value to your business. It reduces alert fatigue because minor alerts can be monitored and reduced using artificial intelligence, which ultimately frees up your time and productivity as a security team.

CSPM not only monitors the current state of your infrastructure, it defines the desired state of your infrastructure, ensuring that all network activity meets your security policy standards.
CWPP

To understand a Cloud Workload Protection Platform (CWPP), let's first define a 'cloud workload', which is any app, database or function run within the cloud.

A CWPP solution is limited to monitoring and protecting workloads within the cloud. Think of it like a mechanic who can monitor and protect the car from potential breakdowns but can't do anything to protect you from another car on the road rear-ending you at a red light.

In summary, CWPP ensures the security of the cloud workloads, while CSPM focuses on the broader view, including the accounts deploying those workloads on the company's cloud platforms.

With elements from Microsoft Defender for Cloud, Microsoft Sentinel, Azure DevOps, Microsoft Secure Score, and Secure Score, we can achieve the same goals as CWPP, especially CNAPP, which combines CSPM and CWPP. (Watch this space as we're likely to see Microsoft Dynamics 365 published on the Gartner Magic Quadrant).

FWaaS

'Firewall' has become a commonly understood term, even by the most technology-illiterate users. This is because firewalls have remained the most basic and fundamental form of network security for the last 25 years.

What separates a Firewall as a Service (FWaaS) from a standard firewall is its security capability and near-instant scalability.

A FWaaS can be integrated within instances of Microsoft Sentinel for increased visibility, where a connector or API has been made available by the FWaaS supplier.

MDR

A Managed Detection and Response (MDR) service combines the speed of technology and automation and the expertise of human intervention to perform threat hunting, monitoring, and response. The main benefit of MDR is that it helps rapidly identify and limit the impact of threats without the need for additional staffing.

Any business that needs the ability to respond to any threats to information security rapidly should consider an MDR solution

MSSP

An MSSP is a Managed Security Service Provider. MSSPs typically monitor security events and manage IT security technology.

Managed Detection and Response (MDR) services are often compared to Managed Security Services Provider (MSSP) services. While they share similarities, they also have significant differences.

MDR services are proactive and focus on improving vulnerabilities within your environment, whereas MSSPs are designed to be reactive to real and immediate threats that enter your environment.

So you could say an MDR provider is going to provide a greater layer of security than an MSSP.

SASE

Secure Access Service Edge (SASE), pronounced 'sassy', was first described by Gartner (2019) as "The Future of Network Security in the Cloud."

Traditional security systems were designed to assume that most, if not all, users and applications would sit inside the local network perimeter, but this is no longer the case. Your data has moved to the cloud, your employees often work remotely, and your business transformation initiatives need your technology to remain agile.

One of its key benefits is the ability for it to be scaled up and down based on usage.

SecOps

The term SecOps is a conjunction of Security and Operations. It is a result of removing barriers between security-focused and operationally focused teams within your business.

As with many functions within your business, priorities can vary dramatically, so SecOps was designed to reduce conflicting priorities and align disparate tools that can create inefficiencies, reduce your security posture and expose the business to unnecessary risk.

When security and IT operations teams work more closely together in a SecOps approach, they share accountability for the priorities included in maintaining the productive state and security of their enterprise's environment.

SOC

If SecOps is your highly skilled team of professionals, then Security Operations Centre (SOC) is the shared command centre facility from which they can perform threat detection and alert triage.

In the case of your security partner, it may also be used to deliver SOC as a service which can include Managed Detection and Response (MDR) and Extended Detection and Response (XDR) services for customers too.

Most, but not all, SOCs operate 24/7 with SecOps teams working in shifts to log activity and mitigate threats.

XDR

Extended Detection and Response (XDR) collects threat data from previously siloed security tools across an organisation's technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.

XDR typically involves the creation of automated playbooks and results in tightly integrated detection and response. One of the advantages of having a security partner is that it provides your business with access to a comprehensive playbook of threats that have occurred across a range of environments. This gives greater visibility of potential threats that may approach your environment.

ZTNA

Zero Trust Network Access (ZTNA) is a philosophy as much as it's a technology. It ultimately assumes that all devices and their users are threats until they prove otherwise.

Think of it as guilty until proven innocent, which may seem a little unjust, but it's this set of granular, adaptive and context-aware policies which could ultimately save the business millions in lost data, finances or reputation.

Next time you're banging your head against a brick firewall because you have to perform another Multi-Factor Authentication (MFA) to access your emails, think of the bigger picture and the added layer of security for the rest of the business.

As a Microsoft Gold Certified Partner (including Gold Security) with Managed Services ISO/IEC 27001 certification — Fusion5 leverages the capability of Microsoft Dynamics 365 to achieve a SecOps that includes but is not limited to the security protocols above. 

If you'd like to learn more about any of the security acronyms covered here or simply looking for a security partner you can trust — reach out for a chat with one of our friendly team members today. 

Great outcomes start with great conversations.

Let's talk.

Read next

Blog

Is marketing automation holding you back?

Explore why legacy automation tools are no longer enough and how to unlock modern, connected, and customer-centric marketing with Dynamics 365.

Blog

Does your contact centre have that customer feelgood factor

The ASA (average speed of answer) golden rule varies from around 80% of calls answered in 20 seconds to 90% answered in 10 seconds.

Blog

An apple a day, keeps the hackers at bay

Discover how to navigate the delicate balance of cloud cost optimization while maintaining robust cybersecurity. 

Blog

If it don't fit don't Sales force it

It's important to invest time into reviewing the capabilities each solution offers to match them against your organisation's requirements.

Blog

From siloed Sales & Marketing teams to shared success 

Sales and marketing can't work in silos anymore. Learn how a unified platform aligns your teams, streamlines workflows, and improves customer experience.

  1. Home
  2. Microsoft
  3. Blogs
  4. The ABCs of Cyber Security

Fusion5

  • Contact Us
  • About Us
  • Our People
  • Careers
  • Infusion
  • Marketplace
  • Submit an RFP

New Zealand Offices

  • Wellington (04) 473 4552
  • Auckland (09) 379 0525
  • Christchurch (03) 943 4369
  • Dunedin (03) 474 1819
  • English (Australia) Visit Fusion5 Australia

Our Partners

  • Microsoft
  • NetSuite
  • JD Edwards
  • IBM
  • Workday Adaptive Planning
  • Amazon Web Services AWS
  • Fusion5 New Zealand
  • Privacy Policy
  • Privacy Settings
  • Whistleblower Policy
  • © 2025 Fusion5 Limited
  • Consultant Login
Chat with Bernie
Hello, you’re speaking with Bernie!
Bernie ×