Common Zero Trust Cloud Security Terms

Air Gap

Learn More

 

AiTM (adversary-in-the-middle)

Learn More

 

Antivirus Software

Learn More

 

Application Access Management

Learn More

 

Attack Surface

Learn More

 

BYOD

Learn More

 

Browser Exploit

Learn More

 

Browser Isolation

Learn More

 

Brute Force Attack

Learn More

 

Cloud Access Security Broker (CASB)

Learn More

 

Cloud Identity And Access Management

Learn More

 

Content Disarm and Reconstruction (CDR)

Learn More

 

Cyberattack

Learn More

 

Data Loss Prevention

Learn More

 

DDOS Attack (distributed denial of service)

Learn More

 

Drive-By Attack

Learn More

 

HTML5

Learn More

 

Kerberos

Learn More

 

Lateral Movement

Learn More

 

Layered Security

Learn More

 

Malware

Learn More

 

Malvertising

Learn More

 

Microsegmentation

Learn More

 

Multi-Factor Authentication

Learn More

 

Network Access Control NAC

Learn More

Network Segmentation

Learn More

Next Generation Firewall (NGFW)

Learn More

 

Phishing

Learn More

 

RDP

Learn More

 

Ransomware

Learn More

Role-Based Access Control

Learn More

Secure Access Service Edge (SASE)

Learn More

 

Secure Service Edge (SSE)

Learn More

 

Secure Web Gateway (SWG)

Learn More

 

Security Breach

Learn More

 

Security Policy

Learn More

 

SSL Inspection

Learn More

 

Trusted Partner Network (TPN)

Learn More

 

VDI

Learn More

 

Virtual Browser

Learn More

 

Watering Hole Attack

Learn More

 

Web Application Isolation

Learn More

 

Zero-Day Attack

Learn More

 

Zero-Day Exploit

Learn More

 

Zero Trust

Learn More

 

Zero Trust Network Access (ZTNA)

Learn More

 

Zero Trust Network Access (ZTNA) Architecture

Learn More

Moving to a Zero Trust isolation-based security approach is faster and easier than you think.

Get a 1:1 Demo