Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

active content

Code hidden in documents, such as macros, which can be weaponized.

adaptive data loss prevention (A-DLP)

Solutions that automatically apply the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting. Fortra’s Digital Guardian and Clearswift product lines deliver adaptive data loss prevention solutions.

advanced encryption standard (AES)

A popular encryption standard approved by the U.S. National Institute of Standards and Technology (NIST).

advanced persistent threat (APT)

A cybercrime category directed at business and political targets. APTs require a high degree of stealth over a prolonged duration of operation to be successful.

agile development

A development approach that delivers software in increments by following the principles of the Manifesto for Agile Software Development.

antivirus (AV)

A program that searches, detects, prevents, and removes software viruses from a computer or server.

application programming interface (API)

A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application, or other service.

application service provider

A company that offers individuals or enterprises access to applications and related services over the internet.

artificial intelligence (AI)

A branch of computer science dealing with the simulation of intelligent behavior in computers; also the capability of a machine to imitate intelligent human behavior.

ASC X12 (X12)

A form of EDI data that is supported by the ASC X12 standard. It is used by organizations worldwide to exchange sensitive data with other businesses.

automated infrastructure management system (AIMS)

Hardware and software systems that monitor, map, and document connectivity across an entire network.