Glossary

Access Management

practice of controlling access to specific assets. In order to secure an asset against attack/breach/exposure, limiting access to only...

Read more

Account Takeover

A type of cyber security attack where a bad actor steals the login credentials of an account. In some cases, the bad actor locks the...

Read more

Authentication

the act of verifying the identity of a user or SaaS app. In contrast with identification, the act of indicating a person or thing's...

Read more

Authorization

the function of specifying access rights and/or privileges to resources, such as SaaS apps, infrastructure, data, or devices and is...

Read more

BYOA

Bring your own application (BYOA) is the growing trend of employees using the application of their choice to perform their jobs...

Read more

BYOD

Bring Your Own Device. Employees using their personal devices to perform the duties of their job. In some cases this is approved by...

Read more

Business-led IT

Technology, software, or SaaS acquired and used by employees that is outside the purview of the central IT or security departments. In some

Read more

Cloud Access Security Broker (CASB)

CASB is an enforcement point for accessing cloud services and applications, generally deployed via a collection of services and...

Read more

Cloud Security Posture Management (CSPM)

Cloud security posture management (CSPM) is the continuous proactive process of enterprise-wide asset visibility, risk assessment, and...

Read more

Cloud environment vs SaaS environment

cloud refers to any asset or set of assets supporting digital workloads outside the physical corporate network. SaaS refers to cloud base...

Read more

Dirty Environments

Enterprise IT environments with a lot of shadow SaaS, poor configurations, and lack of control...

Read more

Identity Provider

Identity Provider (IdP) or Providers are security systems that are used to manage a central identity for users and employees, to define...

Read more

MFA

Multi factor authentication. One of the highest impact controls available to reduce likelihood of breach, but how can you ensure MFA is...

Read more

OIDC

Open ID Connect (IODC), often called “Social Login”, is a standard defined to allow users to use existing authentication method/vehicle...

Read more

On-premises

Refers to software deployed within the organization's internal system along with the hardware and other infrastructure necessary for...

Read more

Password Manager

An application that helps users store and manage their online credentials.

Read more

RBAC

Role Based Access Controls. Used to define who can access different types of assets based on their job type and role; often RBAC is used...

Read more

Remote Browser Isolation

Remote browser isolation (RBI) is a security technique designed to protect users from browser-based attacks including browser vulnerabili...

Read more

SAML

Security Assertion Markup Language (SAML) is a standard for user authentication to platforms that allows SaaS applications to easily...

Read more

SASE

Secure access service edge is a security framework aimed at guiding practitioners through a series of controls needed to enable the “work...

Read more

SSO

Single sign on (SSO) is an authentication framework that allows users to log in to multiple, unrelated applications with a single ID and...

Read more

SaaS Security Control Plane (SSCP)

A SaaS Security Control Plane (SSCP) is an essential element of modern security architectures—identifying risks and threats within...

Read more

SaaS Sprawl

SaaS publishers are marketing directly to their end user, and end users are adopting without following corporate policy around vendor sec...

Read more

SaaS application lifecycle

govern application onboarding, control sanctioned use and access, secure sensitive data, and revoke access when users no longer need acc...

Read more

Secure Web Gateway (SWG)

Technology deployed to restrict web and internet activity, relationships, and connections to enforce security policy...

Read more

Shadow IT

The use of technology, software, or SaaS used by employees to do their job without the knowledge of IT or security. Shadow IT is acquired

Read more

Shadow SaaS

SaaS applications in-use without the knowledge of IT or security. Often referred to as "business-led SaaS", shadow SaaS happens when...

Read more

Software-as-a-Service (SaaS)

Applications owned, delivered, and managed by a provider whether via licensing or consumption. SaaS creates security gaps with limited...

Read more

Vulnerability Assessment

The process and outcome of identifying, enumerating, and evaluating of exposures and vulnerabilities in the SaaS attack surface....

Read more

Zombie Accounts

digital accounts that are no longer in use, but remain available creating risk exposure. Also known as abandoned accounts, zombie account...

Read more

Don’t compromise

secure SaaS across 100% of applications across devices and users

Make it simple

don’t require incremental expertise or resourcing

Make it cost effective

self explanatory

No marketing fluff

hopefully even more self explanatory

Back arrow
01
/06
Next arrow

To learn more, contact us

Your request has been sent
Oops! Something went wrong while submitting the form.