Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Identity-Based Attack

A category of tactics and techniques used by threat actors that use deceptive practices to exploit the identity of trusted colleagues and brands, including phishing, business email compromise, and account takeover-based attacks.

Inline Deployment

This type of deployment in email architecture sits along (or in line with) the SMTP chain, interacting with emails as they come in and evaluating them before they reach the inbox.

Insider Threat

An advanced attack that is usually inadvertently caused by employees when sharing or clicking malicious emails, links, attachments, etc., including spear phishing, social engineering, and account takeover-based attacks.

Integrated Cloud Email Security (ICES)

A multi-tiered architecture for cloud-based email security that supplements the native capabilities of a cloud email provider through the use of APIs and machine learning models and processing for attack detection.