Last updated November 24, 2025
A list of permissions used to control network traffic.
A Microsoft service that manages and organizes users, computers, and resources within a network.
The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.
Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.Learn more about Allowlisting
A device or software that manages and optimizes the delivery of applications by improving performance, security, and reliability.
A set of rules that allows different software applications to communicate and share data with each other.
The continuous process of identifying, monitoring, and reducing all potential entry points an attacker could exploit.
Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.
A security tool that monitors and controls access between users and cloud services to enforce security policies.
A framework or set of tools used to manage and enforce security controls across cloud environments.
A security platform that protects applications running in cloud environments throughout their entire lifecycle.
Systems, applications, and operations that are hosted and managed via the internet instead of on local servers.
A security technique that removes malicious code from files while keeping the original content safe and usable.
A system that manages and secures customer identities, allowing safe and seamless access to online services.
A security approach that helps organizations identify, manage, and secure all digital assets to reduce potential attack surfaces.
A system that monitors and controls who has access to sensitive data to prevent misuse or unauthorized exposure.
A set of policies and technologies used to prevent unauthorized access to sensitive data. It includes methods like encryption, access control, and authentication to ensure only authorized users can access or modify critical data.
A technique used to protect stored data by encrypting it, ensuring that even if data is accessed by unauthorized users, it remains unreadable without the correct decryption key.
A facility that houses servers, storage systems, and networking equipment used to manage and process large amounts of data.
Protecting databases from cyber threats and unauthorized access. This includes securing data from breaches, maintaining database integrity, and implementing user authentication and encryption to prevent data theft or manipulation.
Techniques used to secure data while it is being transmitted over networks. Data-in-motion encryption ensures data is unreadable to unauthorized parties during transit, while VPNs provide secure and private connections between users and networks.
Techniques and tools used to prevent the unauthorized transfer or leakage of sensitive data outside an organization’s network. DLP solutions monitor and control data flows to reduce the risk of data breaches or accidental exposure.
The process of obfuscating sensitive data to protect it during testing or development without compromising its integrity. Data masking helps prevent exposure of sensitive information while maintaining data accuracy for legitimate purposes.
Measures and strategies implemented to safeguard data from loss, unauthorized access, or corruption. Data protection involves encryption, backups, and access controls to ensure the privacy and integrity of data across its lifecycle.
A dedicated facility or system that monitors data for potential security risks, ensuring that data is continuously protected. Threat monitoring involves the detection, analysis, and mitigation of cybersecurity threats to safeguard data integrity and availability.
The practice of protecting data from unauthorized access, corruption, or theft. Data security involves encryption, user authentication, access control, and other safeguards to ensure data remains safe throughout its lifecycle.
Refers to the process of saving data in a secure and organized manner. Data storage systems include physical storage devices (e.g., hard drives) and cloud-based solutions, with security measures in place to protect against unauthorized access and loss.
The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personally identifiable information.
Measures and tools designed to prevent or mitigate Distributed Denial of Service (DDoS) attacks, which attempt to overwhelm systems or networks by flooding them with excessive traffic. DDoS protection helps maintain service availability.
A testing method that examines a running application to detect security vulnerabilities from an external attacker’s perspective.
A collaborative approach that combines software development and IT operations to improve efficiency, speed, and product quality.
An approach that integrates security practices into every stage of the software development and operations process.
A technology used to protect digital content from unauthorized access, copying, or distribution.
A security approach that monitors and mitigates online risks such as data leaks, phishing, or brand impersonation.
EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.
A set of standards used to evaluate a company’s impact on the environment, its social responsibility, and the quality of its governance practices.
A tool or process that tracks changes to critical files to detect unauthorized modifications or tampering.
A security program or device that filters network traffic and prevents unauthorized or malicious access to an organization’s systems.
The process of proactively identifying and investigating suspicious activities to detect and prevent fraud.
A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.
A framework that helps organizations align IT and business goals while managing risks and ensuring compliance with regulations.
Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.
A physical device that securely manages, stores, and protects digital encryption keys and cryptographic operations.
The use of powerful computers and parallel processing to solve complex problems and perform large-scale computations quickly.
A system that manages user identities and controls their access to resources within an organization.
A strategy developed for organizations to respond to cyber threats and attacks in their network.
Systems used to monitor and control industrial processes such as manufacturing, power generation, and water treatment.
A process of managing and provisioning IT infrastructure using code instead of manual configuration.
A network of connected medical devices and applications that collect and share health data through the internet.
A network of connected devices that communicate and share data with each other over the internet.
Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.
An authentication protocol used to verify the identity of a host or user.
A process used by organizations to verify the identity of clients and prevent fraud or money laundering.
A LAN is a group of electronic devices that are in the same physical location and are connected via a network.
A device or software that distributes network or application traffic across multiple servers to improve performance and reliability.
A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.
A secure method of transferring files between systems with features like tracking, automation, and encryption.
A security method that requires users to provide two or more verification factors to access a system.
A security solution that manages and restricts device access to a network based on predefined security policies.
An endpoint firewall feature that allows centralized management and full control over all network traffic using dynamic access control lists (ACLs).
A security solution that monitors network traffic to detect, analyze, and respond to suspicious or malicious activity in real time.
A method of monitoring network traffic by copying data as it passes through a network connection without interrupting the flow.
The ability to understand the inner workings of a system by observing only its external manifestations
Hardware and software systems used to monitor and control physical processes, machines, and industrial equipment.
The process of protecting an operating system (OS) from unauthorized access, malware, and system vulnerabilities. This includes techniques like patch management, access controls, system hardening, and encryption to ensure the integrity and confidentiality of OS data.
The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.
A tool or software used to securely store and manage passwords for multiple accounts. Password managers help users generate strong, unique passwords and protect them from being easily accessed or stolen by unauthorized parties.
The process of managing and applying updates (patches) to software, systems, and applications to fix vulnerabilities or improve functionality. Patch management ensures that systems are protected from known security threats and are kept up to date with the latest features.
A simulated cyberattack conducted to evaluate the security of an organization's systems, applications, and networks. Penetration testing identifies vulnerabilities that could be exploited by attackers and provides insights into improving security measures.
A set of security measures that build and maintain trust across an organization’s entire digital ecosystem. Pervasive trust services involve ensuring secure communications, authentication, and data integrity across all systems and networks to foster confidence in digital operations.
A framework that uses digital certificates and encryption keys to secure communications and verify the identities of users and systems online.
Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.
The process of identifying, assessing, and mitigating risks to an organization while ensuring compliance with regulatory requirements. This includes implementing controls, auditing systems, and developing policies to minimize legal, financial, and operational risks.
A process of identifying, evaluating, and prioritizing potential risks and vulnerabilities within an organization’s IT systems and infrastructure. This assessment helps organizations understand their security posture and take necessary actions to mitigate threats.
Devices used to forward data packets between computer networks. Routers determine the best path for data transmission and play a critical role in managing network traffic, connecting different networks, and ensuring data is sent securely and efficiently.
A cloud-based architecture that combines networking and security services, such as SD-WAN and SSE, to securely connect users and devices to applications anywhere.
A method of analyzing source code to find security vulnerabilities before running the application.
A process that scans and identifies open-source components in software to detect security risks and license issues.
A virtual WAN technology that uses software to intelligently manage and route traffic across multiple connections for better performance and security.
A software system that searches and retrieves information from the internet based on user queries.
Methods and technologies used to transfer files securely over a network using encryption and authentication to ensure that only authorized users can access transmitted data.
A security protocol that encrypts data transferred between a web server and a browser to ensure safe communication.
A security solution that filters and blocks harmful internet traffic to protect users from web-based threats and data leaks.
The process of establishing, implementing, and maintaining secure configurations for systems, applications, and networks to reduce vulnerabilities and attack surfaces.
The practice of identifying, responding to, and recovering from security incidents or breaches to minimize damage and restore operations.
A system that provides real-time monitoring and analysis of security events and logs across an organization’s IT infrastructure to detect and investigate threats.
The use of automated technologies to streamline security operations and incident response, improving detection and recovery speed.
A centralized team and facility that monitors, detects, and responds to cybersecurity threats in real time.
A platform that integrates security tools and automates incident response to help teams detect and resolve threats faster.
A system that evaluates and scores an organization’s cybersecurity posture based on risk management, compliance, and defense practices.
A cloud-based framework that combines security services like CASB, SWG, and ZTNA to protect users, data, and applications.
Security measures designed to protect digital payment systems using encryption, tokenization, and fraud detection technologies.
Tools and platforms that educate employees on cybersecurity best practices and threats to reduce human error and strengthen awareness.
A system that allows users to log in once and gain access to multiple applications without re-entering their credentials.
A targeted phishing attack where cybercriminals research a specific individual to craft a personalized message aimed at stealing credentials or data.
A high-speed network that provides access to consolidated, block-level data storage, improving data availability and scalability.
The protection of data stored on physical or virtual storage devices through encryption, access control, and redundancy.
The process of connecting various IT systems, applications, and hardware so they work together seamlessly within an organization.
Security measures designed to prevent the theft of physical assets, such as hardware, equipment, or data. Theft security includes physical security measures like alarms, access control systems, and surveillance, as well as digital protection for sensitive data.
A proactive cybersecurity practice that searches for hidden threats or attackers within a network before they cause harm.
Threat intelligence involves the collection and analysis of information about emerging or ongoing cyber threats to help organizations proactively defend against attacks. Signature feeds provide predefined patterns (signatures) of known threats to help security systems identify and block malicious activities.
A system that collects, analyzes, and shares threat data to help organizations detect and respond to cyber threats more effectively.
Identity and access management method that requires 2 unique forms of identification to successfully authenticate. Common authentication factors include something you know (password or passcode), something you have (hardware token or cell phone for SMS or OTC), and something you are (fingerprint, face ID). Combine 2 unique factors to create a more secure login such as a password and OTC or face ID and a passcode.
A unified audit combines multiple logs into a single location. The ThreatLocker® Unified Audit is the central location within the ThreatLocker® portal to view all logged application, storage, and network activity for your organization.
An integrated security solution that combines multiple security technologies, such as firewalls, intrusion prevention systems (IPS), and antivirus protection, into a single platform. Unified threat management simplifies security management and improves efficiency by providing a comprehensive defense against various threats.
A cybersecurity solution that uses machine learning to detect unusual or risky behavior by users or devices that may indicate a threat.
A security process that analyzes user actions to detect abnormal or suspicious behavior that could indicate potential insider threats or compromised accounts.
The process of managing user access to systems, applications, and data based on their role and responsibility within the organization. User rights management ensures that users have appropriate access to resources while minimizing the risk of unauthorized access or data breaches.
A cybersecurity professional or service that provides organizations with expert security leadership and strategy on a part-time or remote basis without the cost of a full-time CISO.
A security system or software that monitors, protects, and manages sensitive data in virtualized or cloud environments.
A technology that provides centrally hosted virtual desktops, allowing users to securely access their work environments from any location without needing physical hardware.
A secure connection that allows users to access a private network over the internet while keeping their data encrypted and private.
A technology that creates virtual versions of computing resources—such as servers, storage, or networks—to improve efficiency, scalability, and flexibility.
Devices that encrypt voice communications to prevent eavesdropping and ensure the privacy and security of sensitive conversations.
The process of identifying and evaluating weaknesses in systems, applications, or networks to prioritize and address potential security risks.
A security tool that filters and monitors HTTP traffic to protect web applications from attacks such as SQL injection and cross-site scripting (XSS).
The act of turning a harmless object or file into a tool for malicious activity, such as embedding a macro in a Word document to execute harmful code or contact a command-and-control server.
A telecommunications network that connects devices across large geographic areas, such as cities or countries.
Security measures designed to protect wireless networks and mobile devices from cyber threats through encryption, access controls, VPNs, and threat detection tools.
An advanced security solution that integrates multiple security tools to detect, investigate, and respond to threats across an organization’s entire IT environment.
A zero-day attack occurs when the developers are unaware of a vulnerability within a software, device, or network that becomes exploited by threat actors. The vulnerability, in this case, is known as a zero-day vulnerability. These "zero-day" vulnerabilities get their name from developers having zero days to implement responses and solutions for the exploited vulnerability.
Zero Trust is a cybersecurity philosophy in which nothing (no users, no devices, etc.) is trusted by default, and everything is verified. Instead, all users, applications, network connections will be blocked by default until verified and expressly permitted. Once permitted, users, applications and network connections will only be allowed what is needed to carry out business, and nothing more.
Leading Transformative Technology Solutions and Services Company