Glossary
Fortra’s Digital Guardian
A Fortra product line that enables customers to mitigate the risk for data loss from internal and external threats.
Fortra’s FileCatalyst
A Fortra product line that accelerates and optimizes file transfers, particularly for large files, across global networks at speeds hundreds of times faster than FTP. Fortra’s FileCatalyst is part of the Secure File Transfer Suite.
Fortra’s Globalscape
A Fortra product line that gives businesses flexible and secure file transfer tools to meet and exceed unique business goals with on-premises and cloud-based managed file transfer solutions. Fortra’s Globalscape is part of the Secure File Transfer Suite.
Fortra’s GoAnywhere
A Fortra product line that allows organizations to simplify, integrate, and move data anywhere, securely and across all environments and applications. Fortra’s GoAnywhere is part of the Secure File Transfer Suite.
Fortra’s Halcyon
A Fortra product line for enterprise monitoring that allows organizations to monitor and manage the different types of computer architecture they use. Fortra’s Halcyon is part of Fortra’s Core Solutions Business Unit.
Fortra’s Infrastructure Protection Suite
A Fortra suite with solutions designed to build a resilient security posture by defending every part of the organization. Products from Fortra’s Digital Defense, Beyond Security, Core Security, Cobalt Strike, and Powertech make up the Infrastructure Protection Suite.
Fortra’s Intermapper
A Fortra product line for network monitoring, including enterprise network monitoring, live mapping, and alerting that helps network administrators maintain healthy IT environments.
Fortra’s PhishLabs
A Fortra product line that delivers digital risk protection through curated threat intelligence and mitigation. Using threat-specific technology and operations, PhishLabs protects digital assets from external brand, account takeover, social media, data leakage, and advanced email threats. Fortra’s PhishLabs is part of the Email Security & Anti-Phishing Suite.
Fortra’s Powertech
A Fortra product line that protects data on IBM i. (Note that Powertech Antivirus runs on AIX, Linux, IBM Z, and LinuxONE in addition to IBM i) Fortra’s Powertech is part of the Vulnerability Management Suite.
Fortra’s Robot
A Fortra product line that provides automation solutions for all critical areas of IBM i systems management. Fortra’s Robot is part of the IBM i Suite.
Fortra’s Sequel
A Fortra product line that helps IT deliver data to business users and executives fast and in whatever format desired—mobile dashboard, Excel file, PDF report, etc. Sequel installs on IBM i and can connect to other remote data (Microsoft SQL Server, DB2, Oracle, MySQL, and others). Fortra’s Sequel is part of the IBM i Suite.
Fortra’s Terranova Security
A Fortra product line that offers global phishing simulation and security awareness training in more than 40 languages. The platform and content incorporate gamification techniques to increase engagement and knowledge retention.
Fortra’s Titus
A Fortra product line that provides data classification, identification, and security automation solutions for better regulatory compliance and control over data. Fortra’s Titus is part of the Data Protection Suite.
Fortra’s Tripwire
A Fortra product line with solutions that work on-premises and in the cloud to find, monitor, and minimize a wide range of threats without disrupting daily operations or productivity. Fortra’s Tripwire is part of the Managed File Integrity service.
Fortra’s Vityl
A Fortra product line for capacity management. It ensures IT meets business needs by monitoring key systems and ensuring capacity needs are addressed. Formerly TeamQuest.
Fortra’s Vityl Capacity Management (VCM)
A tool from Fortra’s Vityl product line that assists organizations with analyzing their historical data in order to create the optimal capacity plan
General Data Protection Regulation (GDPR)
A law that affects all European residents and companies that store data or do business in the European Union (EU). Its goal is to ensure personal data is used, processed, and stored in a specific way.
Health Insurance Portability and Accountability Act (HIPAA)
A 1996 Federal law that restricts access to individuals' private medical information. Addressing HIPAA and HITECH Compliance Challenges
human risk management (HRM)
Technology that helps organizations understand and quantify the security risk posed by employee behavior to reduce the likelihood of successful cyberattacks and data breaches.
IBM i
IBM operating system (also known as iSeries, AS/400). For more details on IBM i terms visit the IBM online glossary.
identity and access management (IAM)
The policies, programs, and technologies that reduce identity-related access risks within a business by managing digital identities and user access to data, systems, and resources.
incident response plan (IRP)
An Incident Response Plan is a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.
indicators of compromise (IOC)
Pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.
information rights management (IRM)
Information rights management is a subset of digital rights management technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or enterprise digital rights.
infrastructure as a service (IaaS)
A form of cloud computing that provides virtual computing resources such as storage, networking, and other capabilities over the internet.
infrastructure protection (IP)
Infrastructure protection pertains to the security of critical business application infrastructure and protecting technology, systems, and business assets. Infrastructure protection (IP) is also used internally in Fortra to define the IT Infrastructure Protection business unit encompassing Fortra's Core Security, Cobalt Strike, Digital Defense, Beyond Security, and Outflank product lines.
internal penetration testing (IPT)
An internal network pen test is performed to help gauge what an attacker could achieve with initial access to a network. An internal network pen test can mirror insider threats, such as employees intentionally or unintentionally performing malicious actions.
International Traffic in Arms Regulations (ITAR)
The U.S. regulation that requires companies that manufacture, sell, or distribute defense articles or services to comply with the regulations as defined in the United States Munitions List (USML). The goal is to restrict and control the export of military technologies.
internet of things (IoT)
The network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.
intrusion detection and prevention
Intrusion detection and intrusion prevention. Intrusion detection and prevention are two broad terms describing application security practices used to mitigate attacks and block new threats. The first is a reactive measure that identifies and mitigates ongoing attacks using an intrusion detection system.
intrusion detection system (IDS)
An IDS, also known as an intrusion detection system, is a software or physical device that monitors activity to detect any signs of unauthorized access. When it detects a potential intrusion, it alerts a central security system that keeps track of security events and information.
intrusion prevention system (IPS)
Intrusion prevention systems are network security solutions that examine a network for illegitimate access. If it discovers a possible intrusion, it prevents the intruder from moving further into the network or removes them completely. Intrusion prevention systems can come in the form of physical devices or software applications. They are also referred to as IPS.
JavaScript object notation (JSON)
A text-based, human-readable data interchange format used for representing simple data structures and objects in browser-based code.
machine learning (ML)
The process by which a computer improves its own performance by continuously incorporating new data into an existing statistical model.
malware
A broad term that covers every type of software created to disable or damage computer systems. Viruses, worms, spyware, and ransomware are all forms of malware.
managed detection and response (MDR)
A service that provides remotely delivered modern security operations center capabilities focused on quickly detecting, investigating, and actively mitigating incidents. Fortra’s Alert Logic product line delivers managed detection and response solutions.
Pagination
- Previous page
- Page 3
- Next page