Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Sandbox

This type of environment is a safe space in which executable content that enters an organization via email, such as ransomware or phishing attacks, can be deployed or executed in isolation, without affecting the network server or any of its applications.

Sanitization

The automated removal of hidden metadata, such as comments and revision history, as well as any malicious code so that the information can’t be harvested for phishing attacks and that privacy and the security of proprietary information is maintained.

Secure Email Gateway (SEG)

An on-premise email security solution that monitors emails coming into and out of an organization before they reach an email inbox.

Security Awareness Training (SAT)

This programmatic training helps users at organizations worldwide reduce risks related to cybersecurity, build vital threat resilience, and create a strong security-aware culture.

Security Information and Event Management (SIEM)

This software solution offers enterprise security operations teams a centralized location to collect, aggregate, and analyze data in order to facilitate early attack detection and investigation, and elicit a timely response.

Security Operations Center (SOC)

A coordinated team of experts responsible for enterprise cybersecurity from the onset of threats through infrastructure operations to incident detection and response.

Sender Policy Framework (SPF)

SPF is an email authentication protocol that domain owners use to specify the email servers they send email from, making it harder for fraudsters to spoof sender information

Simple Mail Transfer Protocol (SMTP)

SMTP is a standard communication protocol for transmitting emails over the Internet.

SMS Phishing

Also called Smishing; A newer form of phishing attack, or business email compromise, initiated with an email sent to a prospective victim written to elicit a response with the recipient's cell phone number so the scammer can access their cell phone and applications.

Social Engineering

These types of advanced attacks rely on human interaction presented in a personal and business context in order to establish trust and convince the recipient to take action.

Spam

A broad category of unsolicited commercial bulk email sent out vast recipient lists; often referred to as junk email.

Spear Phishing

These advanced email attacks are disguised as trusted communications, designed to fool people into taking action such as giving up their user credentials or opening an attachment.