Zero Network

Zero Network is a security framework aiming to minimize the risk of remote access in the modern IT world. Its slogan is: “never trust – always verify.” Zero Network constantly checks the identity and integrity of devices without respect to location. It provides access to applications and services based on the confidence level of device identity and device health in combination with user authentication.

Zero Day

Zero Day is a software vulnerability that poses an immediate cyber risk since it can be exploited before a fix can be applied, mainly because the vendor is unaware of its existence or a patch is not yet available. Many of the ‘successful’ breaches occur due to zero-day attacks.

XDR Solution

Extended Detection & Response (XDR) is a general term for security software products that collect and correlate data across multiple security layers (e.g., email, endpoint, server, cloud, network) and allow for improved threat analysis and faster response times.

VPN

Virtual Private Network (VPN) establishes a protected network connection when using public networks. Via the VPN, the user’s data traffic is routed through an encrypted virtual tunnel that disguises the IP address and makes its location invisible to potential external attacks. When working remotely, installing and configuring a VPN client on the device ensures secure data access to the company’s network and reduces the risk of data leakage.

VDI

Virtual Data Infrastructure (VDI) is a technology that refers to the use of virtual machines to provide and manage virtual desktops. VDI hosts desktop environments on a centralized server and deploys them to end-users on request. Using VDI, remote workers access a complete desktop and its applications. VDI is known to have a high cost for its deployment and ongoing maintenance.

Third-party contractors

A general term describing a variety of business entities working with an organization on a temporary basis and providing specialized services of some sort (e.g., consulting, creative, legal, etc.). Contractors can be individuals or vendors. The main challenge with third-party contractors is balancing their need for corporate application and data access vs. securing and controlling their access.

TO

Total Cost of Ownership (TCO) is a financial estimate intended to help calculate and determine the overall direct and indirect expenses related to the delivery of a particular product or a service and to assess the long-term value of a purchase to a company or individual.

Single Sign On (SSO)

Single Sign-on is an authentication method that enables users to securely log in to multiple applications and websites using just one set of credentials, thus simplifying access without needing to re-enter authentication factors.

Shadow IT

Shadow IT is the common term for using information technology systems, devices, software, applications, and services without explicit IT department approval, thus creating a parallel IT infrastructure that the corporate IT department does not manage and as such, It becomes a security hazard.

SaaS applications

Software as a Service (SaaS) applications are the modern way of enabling access to services over the Internet without the need to install and maintain the software itself. SaaS applications have become the primary tools through which employees, local and remote, execute their daily operations, and as such, securing their access has become a primary IT focus.

Remote worker

An employee who does not reside within corporate premises requires access to corporate resources and applications from afar effectively and securely.

Privileged users

A user is authorized, and therefore, trusted, to perform security-relevant functions that ordinary users are not authorized to perform. The typical privileged user is a system/IT administrator responsible for managing IT and security infrastructure and can perform actions such as Installing/removing systems.

Policy Enforcement

Policy enforcement is managing network and application connectivity, access, and use according to one or more policies defining the conditions under which access is allowed. This enforcement allows organizations to tightly control which users and devices will be granted access and which types of actions are allowed.

Patch

A patch is a software update package that should be applied to an application or an operating system to update it to solve a security vulnerability, improve performance or fix a bug. Software patches are often referred to as a significant source of security concern since many of the breaches occur via security patches that were known but were never applied, in what is known as ‘patch fatigue.’

Insider Threat

A security risk within the organization involves a misuse of the access to extract internal corporate data. An insider threat typically involves a current or former employee who has access to sensitive information due to their job function or has a privileged account with permission to access restricted information.

Identity Provider

An identity provider is an authentication service that stores and verifies user identity. It is typically a cloud-hosted service that integrates with additional security mechanisms, such as single sign-on (SSO) and Multi-Factor Authentication (MFA) providers, to establish a critical layer of security between users and organizations.

EDR Solution

Endpoint Detection & Response (EDR) is computer software that protects individual devices. It typically aggregates data, such as external communications, user logins, and process execution, and analyzes it to discover anomalies and malicious activity. EDR enables security teams to investigate and respond to incidents, providing in-depth visibility and threat prevention.

Distributed workforce

A general term that reflects the changes in modern organizations is that employees are scattered in different settings and locations, no longer reside in designated company offices, and are engaged via many forms of employment (contactor, part-time, partner, etc.).

BYOD

Bring Your Own Device (BYOD) is a corporate policy that permits employees to use their own personal devices (laptop, tablet, mobile) for work-related purposes, thus requires the organization to enable access to corporate assets, sensitive data and SaaS applications without compromising security and privacy.

Hybrid Access

Is a patented TerraZone solution for the hybrid cloud, In which applications are running in a combination of different environments. Hybrid cloud computing approaches are widespread because almost no one today relies entirely on the public cloud.

orchestration

Orchestration is the automated configuration, management, and coordination of computer systems, applications, and services. Orchestration helps IT to more easily manage complex tasks and workflows.

MFT

Managed file transfer (MFT) is a type of software used to provide secure internal, external and ad-hoc data transfers through a network. MFT software and products are designed to help organizations meet the increasing security, compliance and operational demands of moving information.

MFA

Multi-factor authentication is a layered approach to securing data and applications where a system requires a user to present a combination of two or more credentials to verify a user's identity for login. Sometimes MFA is also referred to as Two-Factor Authentication or 2FA. Technically, MFA could refer to a system where there are more than two forms of authentication.

Cloudflare

Cloudflare is a large network of servers that can improve the security, performance, and reliability of anything connected to the Internet. Cloudflare does this by serving as a reverse proxy Open external link for your web traffic. Cloudflare does this by serving as a reverse proxy for your web traffic. All requests to and from your origin flow through Cloudflare and — as these requests pass through our network — we can apply various rules and optimizations to improve security, performance, and reliability.

SSH

SSH or Secure Shell is a network communication protocol that enables two computers to communicate (c.f http or hypertext transfer protocol, which is the protocol used to transfer hypertext such as web pages) and share data. An inherent feature of ssh is that the communication between the two computers is encrypted meaning that it is suitable for use on insecure networks.

Agentless

Agentless technology is the use of a machine’s native, embedded management functionality to retrieve information. Even if a technology is dubbed as agentless, retrieving data from a device requires a process or processes to run, which consumes resources.

Peer to Peer (P2P)

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer network of nodes.

Secure Data Exchange

The digital change has revolutionized the processing of data. Every day, users exchange large volumes of data in e-mails or clouds. We show under which conditions secure data exchange works.

UEBA

User and Entity Behaviour Analystics (UEBA) uses the behaviour of users to understand and predict potential threats to the network.

Digital Rights Management

Digital Rights Management (DRM) secures sensitive data through its entire life cycle, everywhere it travels, no matter who has it or where it’s stored.