Glossary
vulnerability assessment and penetration test (VAPT)
A security testing to identify security vulnerabilities in an application, network, endpoint, and cloud. Vulnerability Assessment scans the digital assets and notifies organizations about pre-existing flaws. Penetration test exploits the vulnerabilities in the system & determines the security gaps.
Vulnerability Management (VM)
The process of identifying, evaluating, treating, and reporting on security vulnerabilities in systems and the software that runs on them.
vulnerability research (VR)
The term means actually going through publicly disclosed vulnerabilities to determine if they are legitimate issues, aggregating that data, and then normalizing it for consumption.
weaponized document protection
The structural sanitization of documents to ensure complete removal of malicious code without delaying sharing and access. It prevents embedded macro-malware and ransomware from entering your network due to phishing emails, drive-by downloads, or attacking uploads.
web application firewall (WAF)
A specific form of application firewall that filters, monitors, and blocks HTTP traffic to and from a web service. By inspecting HTTP traffic, it can prevent attacks exploiting a web application's known vulnerabilities.
web client
The client, or user, side of the web. It typically refers to the web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site.
workflow
A set of steps that executes a seamless end-to-end working process or “flow.”
workload automation (WLA)
Solutions designed to maintain service levels across a diverse mix of platforms and applications with unified job scheduling and workload automation. Products from Fortra’s JAMS and Automate product lines provide WLA solutions.
zero trust
A security concept centered on the belief that organizations should not automatically trust anything inside or outside their perimeters and instead must verify anything and everything trying to connect to systems before granting access.
zero-day attack, zero-day exploit
An attack that exploits a previously unknown hardware, firmware, or software vulnerability.
ZIP file (ZIP)
A ZIP file can be created to package, compress, and encrypt one or more files. ZIP files are very useful for reducing disk space, minimizing transmission times, and for keeping related files organized together.
Pagination
- Previous page
- Page 7