Periodic table of application delivery and security

Explore this comprehensive resource for modern IT infrastructure management

Created for novices and experts, this tool sheds light on the critical components necessary for a resilient infrastructure. Inspired by the foundational work of inventor Dmitri Mendeleev, this table categorizes 110 essential elements into 10 distinct blocks, ranging from application deployment, security and performance to optimization.

Please click on each element to read more about it.

 Application deployment  Security  Network elements  Cloud native  Availability
 Management and automation  Performance  Platform  Observability  Optimization
1
Opd
On-premises
                                82
Aff
ADC form factors
2
Pc
Private cloud
8
Cm
Centralized management
                    52
Opa
One pass architecture
58
Mcp
Multi-core processing
64
Mtcp
Multipath TCP
70
Lb
Load balancing...
76
Ciap Customized IP...
83
Mpx Single tenant...
3
Puc
Public cloud
9
Ct
Configuration templates
                 
 
53
La
Latency
59
Sa
Security acceleration
65
Tcpo
TCP optimization
71
Gslb
Global server...
77
Vs
VServer
84
Sdx
Multi-tenant... 
4
Hc
Hybrid cloud
10
Ad
Application dashboard
14
Ps
Physical security
16
En
Encryption
20
Ipr
IP reputation
24
Lacl
L4-L7 & Network... 
28
Ids
Instrusion dectection...
32
Mf
Modular firewall
36
Sp
Security posture
40
Httpc
HTTP callouts
44
Aps
API security
48
Waf
Web application... 
54
Tp
Throughput
60
Tcpm
TCP multiplexing
66
Hso
HTTP/2 & HTTP/3...
72
Ft
Fault tolerance
78
Nat
Network address...
85
Vpx
Virtual form...
5
Mc
Multi-cloud
11
Spm
Single pane of glass...
15
Wavs
Web app vulnerability...
17
Vp
Virtual patching
21
Vpn
Virtual private...
25
Mfa
Multi-factor authentication
29
Sso
Single sign-on
33
Iam
Identity and access...
37
Ztna
Zero trust nework...
41
Df
Device fingerprinting
45
Es
Endpoint security
49
Mdm
Mobile device...
55
Tm
Traffic management
61
Tcpb
TCP buffering
67
Ec
Edge computing
73
Dr
Disaster recovery
79
Dns
Domain name...
86
Cpx
Container-based...
6
Mo
Monoliths
12
Apa
Application centric APIs
  18
Idp
Identity providers
22
Rbac
Role-based...
26
Abac
Attribute-based...
30
Ba
Biometric authentication
34
Tba
Token-based authentication
38
Sm
Session management
42
Bal
Block/allow lists
46
Dsi
Directory services... 
50
Pam
Privileged access...
56
Ch
Caching
62
Tcps
TCP stack
68
Cdn
Content delivery...
74
Cr
Cache redirection
80
Cs
Content switching
87
Blx
Bare metal...
7
Mi
Microservices
13
Cl
Centralized licensing
  19
Scp
Secure coding...
23
Rl
Rate limiting
27
Bm
Bot management
31
Zda
Zero-day attacks
35
Ddos
Distributed denial...
39
Si
SQL injection
43
Xss
Cross-site scripting
47
Csrf
Cross-site request....
51
Mitm
Man-in-the-middle...
57
Sslo
SSL offload
63
Cl
Clustering
69
Wl
Web logging
75
As
Auto-scale
81
Pbr
Policy based...
88
Fipc
FIPS certified...
                                   
      89
Ki
Kubernetes Ingress
90
Sm
Service mesh
91
Apg
API gateway
92
Crd
Custom resource...
93
Ur
URL routing
94
Nst
North-south traffic
95
Ewt
East-west traffic
96
Tdpt
Traffic distribution...
97
Sg
Service graph
98
Ci/Cd
Continuous integration...
99
Acd
Automated canary...
       
      100
M
Metrics
101
E
Events
102
L
Logs
103
T
Traces
104
Rt
Response time
105
Ss
Service status
106
Gi
Gateway insight
107
Aahm
Application & ADC...

108
Pl
p99 latency

109
Apii
API insights
110
Noe
Network observability...
       

Embrace a holistic approach to application security and delivery, and elevate your strategies to meet the challenges of today’s digital world.

Explore the NetScaler platform