Glossary
digital rights management (DRM)
A broad term that describes how organizations control the publication and use of digital assets. Fortra’s Vera provides a digital rights management solution.
digital risk protection (DRP)
An operational process that combines intelligence, detection, and response to mitigate attacks across the external digital risk landscape.
distributed denial of service (DDoS)
A common form of cyberattack that disrupts the normal functioning of a website, often targeting government, retail, financial, or media organizations.
document management (DM)
The process of electronically capturing, managing, and distributing documents and forms on-premises or in the cloud. Fortra’s Document Management product line helps organizations go paperless with document solutions that automate key business processes.
domain-based message authentication, reporting, and conformance (DMARC)
An email authentication protocol used to prevent spoofing.
domainkeys identified mail (DKIM)
A technique that uses a domain name to digitally “sign” emails, so recipients are confident in the sender and know the message hasn’t been altered in transit.
dynamic application security testing (DAST)
A procedure that actively investigates running applications with penetration tests to detect possible security vulnerabilities.
email security
Solutions that comprise all the technology and policies designed to protect email content and communications against cyberattacks. Fortra’s Agari, PhishLabs, and Clearswift product lines deliver email security solutions.
email spoofing
When a fraudster forges an email header ‘From’ address to make it appear as if it was sent by someone else, usually a known contact like a high-level executive or trusted outside vendor.
encryption
A method of encoding data to make it unusable or unreadable until it’s decrypted by an authorized party with keys (symmetric or asymmetric) which can read or access the data.
endpoint detection and response (EDR)
An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.
endpoint protection platform (EPP)
A solution deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.
extended detection & response (XDR)
SaaS capabilities that integrate and simplify security solutions into a holistic approach to protect endpoints, servers, email, and other corporate IT infrastructure.
external penetration testing
Also known as an external network pen test, it is designed to test the effectiveness of perimeter security controls to prevent and detect attacks as well as identifying weaknesses in internet-facing assets such as web, mail and FTP servers.
Federal Information Security Management Act (FISMA)
Signed into law in 2002, this law requires security guidelines be implemented to help protect and reduce the security risk of sensitive federal data. It requires all federal agencies to protect and support their operations by developing, documenting, and implementing a comprehensive information security plan. All agencies within the U.S. federal government, as well as some state agencies, and any private sector organization in a contractual relationship with the government, are bound by these FISMA compliance regulations.
file integrity monitoring (FIM)
Technology that monitors and detects changes in files that may indicate a cyberattack. Fortra’s Tripwire product line delivers file integrity monitoring solutions.
firewall as a service (FWaaS)
Firewall as a Service
Fortra’s Agari
A Fortra product line that protects the workforce from inbound business email compromise, supply chain fraud, spear phishing, and account takeover-based attacks, reducing business risk and restoring trust to the inbox. Fortra’s Agari is part of the Email Security and Anti-Phishing Suite.
Fortra’s Agari DMARC Protection (DMP)
A Fortra product that automates DMARC email authentication and enforcement to prevent brand abuse and protect customers from costly phishing attacks.
Fortra’s Agari Phishing Defense (APD)
A Fortra product that stops phishing, BEC, and other identity deception attacks that trick employees into harming their business.
Fortra’s Agari Phishing Response (APR)
A Fortra product that is purpose-built for Microsoft Office 365 to automate the process of phishing incident response, remediation, and breach containment.
Fortra’s Alert Logic
A Fortra product line that offers managed detection and response (MDR) services. Alert Logic works as a seamless extension of security teams, augmenting existing cybersecurity resources and technology to safeguard on-premises, cloud, SaaS, and hybrid infrastructures. Fortra’s Alert Logic is part of the Managed Detection and Response service.
Fortra’s Automate
A Fortra product line that unifies RPA with back-end application integration to deliver a holistic and stable RPA + BPA solution. Fortra’s Automate is part of the Automation Suite.
Fortra’s Beyond Security (BSEC)
A Fortra product line that enables organizations to continuously scan networks and web applications for vulnerabilities, test products for unknown security holes, and conduct source code analysis. Fortra’s Beyond Security is part of the Vulnerability Management Suite.
Fortra’s Boldon James
A Fortra product line that provides data classification to help organizations identify and categorize the data they need to protect, for regulatory compliance and improved control over data. Fortra’s Boldon James is part of the Data Protection Suite.
Fortra’s Clearswift
A Fortra product line that provides consistent protection across email, web, and cloud endpoints, allowing teams to collaborate effectively and securely while providing IT with control and visibility over sensitive data. Fortra’s Clearswift is part of the Email Security and Anti-Phishing Suite.
Fortra’s Clearswift Secure Email Gateway (SEG)
An email security Fortra product that protects against spam, viruses, and advanced threats including phishing, ransomware, and spyware.
Fortra’s Clearswift Secure Exchange Gateway (SXG)
A Fortra product that ensures that internal email correspondence on an Exchange 2010, 2013, or 2016 deployments matches the confidentiality and compliance policies of an organization.
Fortra’s Clearswift Secure ICAP Gateway (SIG)
A fully automated Fortra product that augments the security of critical information flowing through an organization’s existing web proxy infrastructure or managed file transfers.
Fortra’s Clearswift Secure Web Gateway (SWG)
A Fortra product that protects from cyber threats initiated by internet viewing while also enforcing a company’s regulatory policies
Fortra’s Cobalt Strike
A Fortra product that gives organizations a post-exploitation agent and covert channels to emulate a quiet, long-term embedded actor in their network. Fortra’s Cobalt Strike is part of the Offensive Security Suite.
Fortra’s Core Security
A Fortra product line that helps companies proactively prevent, detect, test, and monitor risk in their business via cyberthreat prevention and identity governance. Fortra’s Core Security is part of the Vulnerability Management and Offensive Security Suites.
Fortra’s Core Security - IGA (Identity Governance & Administration)
Part of Fortra’s Core Security product line which provides a comprehensive suite of identity governance and access management solutions that help organizations minimize risk, streamline operations, and reduce costs.
Fortra’s Data Classification Suite (DC)
The Data Classification Suite includes Fortra’s Titus and Boldon James.
Fortra’s Data Security Suite
A Fortra suite with solutions that protect sensitive data. Product lines include Fortra’s Titus, Boldon James, Agari, Clearswift, GoAnywhere, Vera, FileCatalyst, Tripwire, Terranova Security, Alert Logic, PhishLabs, Digital Guardian, and Globalscape
Fortra’s Digital Defense (DDI)
A Fortra product line that empowers businesses to protect vital assets by identifying, prioritizing, and tracking the remediation of vulnerabilities before they are exploited.
Pagination
- Previous page
- Page 2
- Next page