Glossary: Cybersecurity Terms & Definitions

Find the definition of the most commonly used cyber security terms in our glossary below.

2FA (Two-factor authentication)

Two-Factor authentication is an extra layer of security used to ensure the person accessing a website is who they say they are. It is used to prevent unauthorized access, as users [...]

802.1x

802.1x is an authentication protocol used for network access control. It allows users to be authenticated before being allowed connection to a local area network (LAN). It helps ensure only authorized [...]

API Key

An API Key is like a digital keycard that some websites or apps give to others. It’s a special code that allows them to use certain features or get information, sort [...]

API Token

API Token is an authentication mechanism used to identify and authorize users when accessing a website or application. It enables secure access by providing a unique, encrypted identifier that is used [...]

Access-control List (ACL)

802.1x Access Control List (ACL) is a security protocol that enables secure access to networks, devices and applications. It is used to control access by allowing or denying certain types of [...]

Allowlist

Allowlist is a tool used to protect digital assets and networks. It blocks malicious activity by creating a list of known safe IP addresses, domains and URLs that are authorized to [...]

Blocklist

A Blocklist is a cybersecurity tool used to protect websites from malicious actors. It works by blocking access to sites that have been identified as potential threats, keeping them from accessing [...]

Browser Isolation

Browser Isolation is a cybersecurity tool used by companies to help protect their networks from malicious online threats. It works by isolating web browsers from the rest of their network, allowing [...]

Brute-force Attack

A brute-force attack is a method used to gain access to restricted information, accounts, or systems by using trial and error. It involves trying all possible combinations of characters until the [...]

CASB (Cloud Access Security Broker)

A CASB (Cloud Access Security Broker) is a security solution that helps protect data stored in cloud services. It monitors and enforces policies to ensure the safety of any data going [...]

Cloud Application Access

CASB (Cloud Access Security Broker) is a cybersecurity solution for controlling user access to cloud applications. It provides visibility and control over cloud usage activities, including data security, compliance, and threat [...]

Cloud LAN

Cloud LAN is a secure, cloud-based local area network that helps organizations protect their data. It allows users to connect to the internet while maintaining secure access to internal networks and [...]

Content Delivery Network (CDN)

CDN is an online service that accelerates the delivery of content over the internet. It works by caching and distributing web content on a global network of servers located in different [...]

Content spoofing

Content spoofing is a form of cyber attack in which attackers replace legitimate content on a website with malicious content. It is used to distribute malware and steal confidential information from [...]

Cross-site scripting

Cross-site scripting (XSS) is a type of cyber attack where malicious code is injected into websites to steal user data. It can be used to gain access to administrative accounts, redirect [...]

DDoS attack (Distributed Denial of Service)

A DDoS attack is an attempt to disrupt an online service by flooding it with traffic from multiple sources. It paralyzes the server, making it unable to respond to legitimate requests. [...]

DNS Filtering

DNS Filtering is like having a gatekeeper for the internet. It decides which websites you can or cannot visit based on their names. It helps keep bad or unwanted stuff away, [...]

Device Permissions

Device Permissions are settings that allow a user to control which applications or programs can access data on their device. They give users full control over how their device is used [...]

DoS attack (Denial of Service attack)

A DoS attack (Denial of Service attack) is a malicious cyberattack intended to overwhelm a system with requests, making it unavailable for legitimate users. It is used to disrupt services and [...]

End-point Security

End-point security is a type of cybersecurity used to protect networks and devices from malicious attacks. It helps detect and prevent threats, by utilizing a range of tools to monitor user [...]

FWaaS (Firewall as a service)

Faas means Firewall as a Service. You can use the firewall as a hardware appliance (physical computer in your network), as a virtual appliance (still a computer, but it’s running in [...]

File Transfer Protocol (FTP) Servers

File transfer protocol, or FTP, is a network protocol that enables data transfer between computers connected to a computer network. FTP servers can manage and host content within an organization’s private [...]

Firewall

A Firewall is a tool for securing a computer or network environment. It acts as a barrier between the internal and external networks, preventing malicious traffic from entering the network while [...]

IP Address

IP stands for Internet Protocol, which is the set of rules that makes it possible for devices to communicate over the Internet. With billions of people accessing the Internet every day, [...]

IP Adress Tracking

IP tracking, also known as IP grabbing, extracts the IP addresses of unknowing users with third-party services. Malicious individuals can manipulate IP addresses to affect users’ access to websites and online [...]

IdP (Identity provider)

An identity provider (IdP or IDP) stores and manages users’ digital identities. Think of an IdP as being like a guest list, but for digital and cloud-hosted applications instead of an [...]

Internet Access Security

Internet Access Security (IAS) is a form of cybersecurity that safeguards users against unauthorized access to networks, data, and online resources. It works by using authentication measures such as passwords, two-factor [...]

Layer 3 hardware

Layer 3 hardware is a type of network hardware that is used to read and forward data across a network. It works by reading the IP addresses contained within each packet [...]

Least Privilege Access

Least Privilege Access is a cyber security control that helps to ensure only the right people have access to the right resources. It works by setting up limits on what each [...]

Location permissions

Location permissions enable a user to give an application access to their device’s location data. This can be granted when the app is installed, and it will allow the app to [...]

Malware

Malware is a malicious software that infects your device to steal or damage data. It is usually spread through email attachments, downloading software, or websites and can be used for a [...]

Mandatory Access Control

Mandatory Access Control (MAC) is a type of access control system that limits access to resources based on security labels. It is used in many different types of organizations and for [...]

Network Access Control

Network Access Control (NAC) is a cyber security technology that helps protect networks from external threats. NAC works by monitoring and managing user access to the network. It ensures only authorized [...]

Network Isolation Access Client (NIAC)

Network Isolation Access Client (NIAC) is a specialized hardware device engineered to enable secure network connections. It can be integrated with a broad range of devices, including printers, IP cameras, hard [...]

Network Segmentation

Network segmentation is a cyber security technique used to divide a network into smaller, isolated parts. It helps decrease the risk of malware or malicious attacks spreading across the entire network, [...]

OAuth

OAuth is an authentication protocol that helps to ensure secure online access. It works by allowing users to log in with a third-party provider like Google or Facebook, instead of providing [...]

Open ports

Open ports are network entry points that allow external devices to connect through the Internet. They can be found on computers, servers, and other connected devices. Open ports are used for [...]

Phishing

Phishing is a form of social engineering attack used to steal personal information and data. It is typically done by posing as a trusted source and sending malicious links or emails [...]

Public key

Public keys are cryptographic keys used in cybersecurity to provide secure communication. It is a form of asymmetric cryptography, meaning that two different keys are used: one for encryption (public key) [...]

RDP (Remote Desktop Protocol)

Remote Desktop Protocol (RDP) is an encrypted protocol used to access remote computers or networks securely. It enables users to remotely control and manage a computer from a different location, as [...]

Ransomware

Ransomware is a type of malicious software used by cyber criminals to take control of your computer or digital device. It works by encrypting data stored on the device, preventing you [...]

SASE (Secure Access Service Edge)

SASE (Secure Access Service Edge) is a cloud-based network architecture that provides secure access to applications and services over the internet. It combines network security capabilities such as firewalls, encryption, authentication, [...]

SD-Wan

SD-WAN provides an innovative solution to modern cyber security threats. It stands for Software Defined Wide Area Network and is a secure, virtual network that enables organizations to securely connect their [...]

SDN (Software-defined Network)

Software-defined Networking (SDN) is a revolutionary way for networks to be managed and operated. It separates the network control plane from the data forwarding plane, allowing for more flexibility and control. [...]

SDP (Software-defined Perimeter)

Software-defined Perimeter (SDP) is a cybersecurity technology that helps organizations protect critical systems and data. It works by creating an invisible ā€œperimeterā€ around the network, creating a secure ā€œtunnelā€ for communication [...]

SSL

SSL (Secure Sockets Layer) is the most widely used security protocol on the Internet. It is a technology that establishes an encrypted link between a server and a client, ensuring that [...]

SSO (Single Sign-on)

SSO (Single Sign-on) is an authentication process that allows users to access multiple applications with just one set of credentials. It eliminates the need for users to log in separately for [...]

SWG (Secure Web Gateway)

SWG (Secure Web Gateway) is a security solution that simplifies the user experience and provides an additional layer of protection against cyber-attacks. It works by verifying user identity when they first [...]

TLS (Transport Layer Security)

TLS (Transport Layer Security) is a type of digital encryption that helps protect data sent over the internet. It works by encrypting communication between two systems so that it can’t be [...]

Trojan

A Trojan is a type of malicious software that allows an attacker to access your system and data. It disguises itself as legitimate software, and once it’s installed on your computer, [...]

VPN (Virtual Private Network)

VPN stands for Virtual Private Network and is a type of secure connection that creates a barrier between you and the internet, allowing you to access the web safely and privately. [...]

WAF (Web application firewall)

A web application firewall (WAF) is a security feature designed to protect websites from malicious online activity. It works by inspecting incoming and outgoing traffic for malicious content. If it identifies [...]

Web Application Isolation

Web application isolation is an important cyber security concept that isolates web applications from each other to improve security. It works by creating a secure environment where web apps are housed [...]

ZTNA (Zero Trust Network Access)

Zero Trust Network Access (ZTNA) is an approach to cyber security that provides users with secure access to applications and data within a network. It works by verifying every request that [...]

Zero Trust Security

Zero Trust Security is an approach to cyber security that eliminates the traditional concept of trusting any user or device within a network. Instead, users and devices must be authenticated and [...]

mTLS (mutual TLS)

mTLS (mutual TLS) is a cyber security protocol that provides secure communication between two or more entities. It works by authenticating each party involved in the communication through encryption and certificates. [...]

​​Encryption algorithm

An encryption algorithm is a tool used to scramble and protect sensitive information. It works by turning readable data into unreadable code, making it impossible for anyone without the right key [...]

Find out how we can protect your business

In our demo call we’ll show you how our technology works and how it can help you secure your data from cyber threats.

Cybersecurity
Are you an integrator or distributor?

Need an affordable cybersecurity solution for your customers?

We’d love to help you get your customers on board.

checkmark

White glove onboarding

checkmark

Team trainings

checkmark

Dedicated customer service rep

checkmark

Invoices for each client

checkmark

Security and Privacy guaranteed