Last updated February 13, 2025
A list of permissions used to control network traffic.
The highest level of privileges a user has in the operating system (OS) of an organization; usually allowed to perform most or all functions.
Historically referred to as whitelisting, Allowlisting is a ThreatLocker endpoint security module that blocks all applications from operating unless explicitly permitted.Learn more about Allowlisting
Short for “Data Back Up,” a Back Up is a method of saving your devices’ data in a different online or offsite location.
Systems, applications, and operations that are cloud-based are hosted or conducted via the internet.
The act of unauthorized, illegal transfer of confidential data, normally personal data like health records, financial data, and personal identifiable data.
A set of policies and technologies used to prevent unauthorized access to sensitive data. It includes methods like encryption, access control, and authentication to ensure only authorized users can access or modify critical data.
Techniques and tools used to prevent the unauthorized transfer or leakage of sensitive data outside an organization’s network. DLP solutions monitor and control data flows to reduce the risk of data breaches or accidental exposure.
The process of obfuscating sensitive data to protect it during testing or development without compromising its integrity. Data masking helps prevent exposure of sensitive information while maintaining data accuracy for legitimate purposes.
Measures and strategies implemented to safeguard data from loss, unauthorized access, or corruption. Data protection involves encryption, backups, and access controls to ensure the privacy and integrity of data across its lifecycle.
A dedicated facility or system that monitors data for potential security risks, ensuring that data is continuously protected. Threat monitoring involves the detection, analysis, and mitigation of cybersecurity threats to safeguard data integrity and availability.
The practice of protecting data from unauthorized access, corruption, or theft. Data security involves encryption, user authentication, access control, and other safeguards to ensure data remains safe throughout its lifecycle.
Refers to the process of saving data in a secure and organized manner. Data storage systems include physical storage devices (e.g., hard drives) and cloud-based solutions, with security measures in place to protect against unauthorized access and loss.
A technique used to protect stored data by encrypting it, ensuring that even if data is accessed by unauthorized users, it remains unreadable without the correct decryption key.
Protecting databases from cyber threats and unauthorized access. This includes securing data from breaches, maintaining database integrity, and implementing user authentication and encryption to prevent data theft or manipulation.
Techniques used to secure data while it is being transmitted over networks. Data-in-motion encryption ensures data is unreadable to unauthorized parties during transit, while VPNs provide secure and private connections between users and networks.
Measures and tools designed to prevent or mitigate Distributed Denial of Service (DDoS) attacks, which attempt to overwhelm systems or networks by flooding them with excessive traffic. DDoS protection helps maintain service availability.
EDRs monitor and record activities and workloads taking place on a device. Using various techniques, EDRs will work to detect any suspicious activity and respond accordingly. EDR enables IT administrators to view suspicious activity in near real-time across an organization's endpoints. Focusing on behavioral patterns and unusual activity, EDRs will work to block threats and protect devices.
A security program or software that filters your network traffic and prevents outsiders, including malicious threat actors, from entering your organization.
A golden ticket attack is an attack that targets Windows Active Directory access control. Threat actors bypass normal authentication by taking advantage of a Kerberos weakness. Attackers must have access to the system before a Golden Ticket Attack can be performed.
Generally, someone who uses technical skills to overcome technical problems. In cybersecurity, a hacker is referred to as a threat actor with malicious intent to access an individual’s or organization’s data unauthorized.
A strategy developed for organizations to respond to cyber threats and attacks in their network.
Another way of saying on demand, something is enabled exactly when needed and disabled when no longer needed.
An authentication protocol used to verify the identity of a host or user.
A LAN is a group of electronic devices that are in the same physical location and are connected via a network.
A single programming instruction that expands into a set of instructions to automate actions in your device, tools, or software in order to provide a certain output per user input. Macros are commonly found in office applications like Word and Excel.
An endpoint firewall that enables you to have total control over all network traffic, using dynamic ACLs, all managed from a central location.
The ability to understand the inner workings of a system by observing only its external manifestations
The process of protecting an operating system (OS) from unauthorized access, malware, and system vulnerabilities. This includes techniques like patch management, access controls, system hardening, and encryption to ensure the integrity and confidentiality of OS data.
The ability to manage users’ admin rights within your organization on a timed basis to mitigate risk by giving users the minimum access needed.
A tool or software used to securely store and manage passwords for multiple accounts. Password managers help users generate strong, unique passwords and protect them from being easily accessed or stolen by unauthorized parties.
The process of managing and applying updates (patches) to software, systems, and applications to fix vulnerabilities or improve functionality. Patch management ensures that systems are protected from known security threats and are kept up to date with the latest features.
A simulated cyberattack conducted to evaluate the security of an organization's systems, applications, and networks. Penetration testing identifies vulnerabilities that could be exploited by attackers and provides insights into improving security measures.
A set of security measures that build and maintain trust across an organization’s entire digital ecosystem. Pervasive trust services involve ensuring secure communications, authentication, and data integrity across all systems and networks to foster confidence in digital operations.
Business model in which a ransomware organization will develop and launch ransomware in exchange for payment by the party that wishes to target an organization.
The process of identifying, assessing, and mitigating risks to an organization while ensuring compliance with regulatory requirements. This includes implementing controls, auditing systems, and developing policies to minimize legal, financial, and operational risks.
A process of identifying, evaluating, and prioritizing potential risks and vulnerabilities within an organization’s IT systems and infrastructure. This assessment helps organizations understand their security posture and take necessary actions to mitigate threats.
Devices used to forward data packets between computer networks. Routers determine the best path for data transmission and play a critical role in managing network traffic, connecting different networks, and ensuring data is sent securely and efficiently.
Spear Phishing is a targeted Phishing attempt where a threat actor researches a specific person (usually someone with higher-level admin access to data and programs) and uses what they have learned to create a tailored phishing attempt specifically for that user.
Methods and technologies used to transfer files over a network in a secure manner. Secure file transfer solutions use encryption and authentication protocols to ensure that sensitive files are protected during transmission and that only authorized users can access them.
A security solution designed to protect users from malicious websites and online threats by filtering web traffic and enforcing security policies. Secure web gateways block harmful content, protect against data leaks, and ensure safe web browsing for users.
The process of establishing, implementing, and maintaining secure configurations for systems, applications, and networks. Security configuration management ensures that systems are set up in a secure manner to reduce vulnerabilities and potential attack surfaces.
The practice of identifying, responding to, and recovering from security incidents or breaches. Security incident management ensures that an organization can quickly detect, contain, and mitigate threats, minimizing damage and restoring normal operations.
A system that provides real-time monitoring and analysis of security events and logs across an organization’s IT infrastructure. SIEM solutions help detect threats, generate alerts, and provide insights into security incidents to facilitate faster response and investigation.
The use of technology to automate and streamline security operations and incident response. Automation and orchestration help improve efficiency by enabling faster detection, response, and recovery from security threats and incidents.
A system that evaluates and scores an organization’s security posture based on factors such as compliance, risk management, and cybersecurity practices. Security ratings help organizations assess their vulnerability to cyber threats and benchmark their performance against industry standards.
Security measures and technologies specifically designed to protect digital payment systems. This includes encryption, tokenization, and fraud detection tools to safeguard financial transactions and prevent payment fraud.
Tools and platforms designed to educate employees on cybersecurity best practices and the latest threat landscape. Security training software helps organizations reduce the risk of human error by improving employee awareness and knowledge of security protocols.
SSL (Secure Sockets Layer) ensures secure communication over the internet through encryption. A digital certificate authority (CA) issues certificates that validate the identity of websites and organizations, enabling secure communications. Certificate management ensures certificates are properly issued, renewed, and revoked.
A high-speed network that provides access to consolidated, block-level data storage. Storage Area Networks (SANs) enable efficient data storage management and provide increased data availability, security, and backup capabilities for enterprise environments.
The protection of data stored on physical or virtual storage devices. Storage security includes measures like encryption, access control, and data redundancy to prevent unauthorized access, loss, or corruption of stored data.
The process of connecting various IT systems, applications, and hardware to work together within an organization. System integration ensures smooth data flow, enhances operational efficiency, and enables the implementation of cohesive security measures across platforms.
Identity and access management method that requires 2 unique forms of identification to successfully authenticate. Common authentication factors include something you know (password or passcode), something you have (hardware token or cell phone for SMS or OTC), and something you are (fingerprint, face ID). Combine 2 unique factors to create a more secure login such as a password and OTC or face ID and a passcode.
Security measures designed to prevent the theft of physical assets, such as hardware, equipment, or data. Theft security includes physical security measures like alarms, access control systems, and surveillance, as well as digital protection for sensitive data.
Threat intelligence involves the collection and analysis of information about emerging or ongoing cyber threats to help organizations proactively defend against attacks. Signature feeds provide predefined patterns (signatures) of known threats to help security systems identify and block malicious activities.
A unified audit combines multiple logs into a single location. The ThreatLocker® Unified Audit is the central location within the ThreatLocker® portal to view all logged application, storage, and network activity for your organization.
An integrated security solution that combines multiple security technologies, such as firewalls, intrusion prevention systems (IPS), and antivirus protection, into a single platform. Unified threat management simplifies security management and improves efficiency by providing a comprehensive defense against various threats.
The process of managing user access to systems, applications, and data based on their role and responsibility within the organization. User rights management ensures that users have appropriate access to resources while minimizing the risk of unauthorized access or data breaches.
VDIs are virtual desktops that are centrally hosted and managed. End users can log into the VDI from any location via a secure connection to further protect business data while permitting access to their work data. Physical hardware need not be supplied to employees, and businesses can easily maintain the security of the VDIs using the virtualization platform. The ThreatLocker® Testing Environment uses a VDI where admins can test untrusted applications without risking their critical business production environment.
Devices designed to encrypt voice communications, ensuring that sensitive voice data remains secure during transmission. Voice encryption helps prevent eavesdropping and unauthorized access to private conversations, particularly in industries with high-security requirements.
The process of identifying and evaluating vulnerabilities in a system, application, or network. Vulnerability assessments help organizations understand security weaknesses, prioritize risks, and take action to reduce the potential for exploitation by cybercriminals.
Weaponization is the act of using something that by itself is not harmful in a malicious manner to inflict harm, I.e., using a Word document to embed a macro that attempts to contact a command and control center on the internet.
Security measures designed to protect wireless networks and mobile devices from cyber threats. Wireless and mobile security systems include encryption, access controls, VPNs, and threat detection tools to prevent unauthorized access and ensure data privacy.
A zero-day attack occurs when the developers are unaware of a vulnerability within a software, device, or network that becomes exploited by threat actors. The vulnerability, in this case, is known as a zero-day vulnerability. These "zero-day" vulnerabilities get their name from developers having zero days to implement responses and solutions for the exploited vulnerability.
Zero Trust is a cybersecurity philosophy in which nothing (no users, no devices, etc.) is trusted by default, and everything is verified. Instead, all users, applications, network connections will be blocked by default until verified and expressly permitted. Once permitted, users, applications and network connections will only be allowed what is needed to carry out business, and nothing more.
Leading transformative technology solutions and services company.