Glossary
Identity-Based Attack
A category of tactics and techniques used by threat actors that use deceptive practices to exploit the identity of trusted colleagues and brands, including phishing, business email compromise, and account takeover-based attacks.
Inline Deployment
This type of deployment in email architecture sits along (or in line with) the SMTP chain, interacting with emails as they come in and evaluating them before they reach the inbox.
Insider Threat
An advanced attack that is usually inadvertently caused by employees when sharing or clicking malicious emails, links, attachments, etc., including spear phishing, social engineering, and account takeover-based attacks.
Integrated Cloud Email Security (ICES)
A multi-tiered architecture for cloud-based email security that supplements the native capabilities of a cloud email provider through the use of APIs and machine learning models and processing for attack detection.