Menu

ITSpedia – your IT encyclopedia / January 2026

8 min

It's a new year – and with it comes not only a regular batch of IT terms, but alsoa new look for your favorite ITSpedie!

There aren't many fields where abbreviations reign supreme and flourish as much as in information technology. And to help you stay on top of things, we're bringing you more additions to our glossary in the first month of 2026.

And because we are not Google :), we always addour tip to each passwordin other words, our view of the matter. We are more than aware that even in IT there are a number of terms that only grandly describe something that has long been happening in practice.

And because the list of terms in ITSpedia is growing, we have prepareda newPDF version that you can conveniently download in its entirety – and use for self-study, for example ;).

Stay up to date with us and take a look at the terms that have just landed on ITSpedia in January 2026:

Latest entries in the collection

SASE

Secure Access Service Edge (SASE) combines network and security functions into a single cloud model. It responds to the need for secure access to applications in an environment where the traditional network perimeter is losing its significance.

Our tip: SASE is particularly suitable for organizations with distributed users and a high proportion of SaaS applications. For smaller companies with simple topology, its implementation may be unnecessarily complex.

SLA

A Service Level Agreement (SLA) defines measurable parameters for the service provided, particularly availability, response time, and responsibilities. In the area of security, it is an important tool for managing risks and expectations.

Our tip: The SLA should correspond to the actual criticality of the service. An overly ambitious SLA without the appropriate processes and tools often increases costs without delivering any real security benefits.

XDR

Extended Detection and Response (XDR) unifies threat detection and response across multiple security domains. It enables better identification of complex attacks and reduces the time from detection to response.

Our tip: XDR delivers the greatest value where multiple security tools and sufficient data for correlation already exist. However, without follow-up processes and qualified personnel, its potential remains untapped.

Complete list of entries

Download the current list of terms in ITSpedia in PDF format!

ITSpedia downloadable in PDF format

January 2025

What else to read

See more news from the world of IT and ITS

Cybersecurity audit - the key to real data protection

Looking for a partner for your IT?

Do not hesitate to contact us.

Michal Šon

Michal Šon

Director of Key Accounts

Anna Říhová

Anna Říhová

Business Development Manager

Jan Šafrata

Jan Šafrata

Business Development Manager

Sign up for our newsletter