Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Account Takeover (ATO)

The process of taking unauthorized possession of online accounts using stolen credentials by cybercriminals with the intent of launching email-borne attacks.

Adaptive Redaction

A process involving the identification of critical or confidential information and cyber threats which are either redacted or sanitized to allow the ongoing flow of communication with no disruption.

Anti-steganography

A sanitization feature operating at the appliance level that detects and cleans exploited images containing nearly undetectable malicious text, hidden code, or malware that flow in and out of the network that are typically not noticed.

Application Programming Interface (API)

A software interface that allows two or more computer programs or components to integrate by communicating with each other. In this case, it allows a SIEM or SOAR (see glossary under "S") to easily ingest threat data to quickly remediate attacks.

Artificial Intelligence (AI)

This scientific application simulates human intelligence by leveraging algorithms, data, and computational power so that hardware and software can perform human-like tasks like learning, reasoning, problem solving, perception, and language interpretation.

Automated Remediation

After attack or threat incidents are reported, an automated workflow takes place, including investigative analysis and triage, minimizing manual efforts to accelerate time-to-containment.