Cyber nyms

Acronym Meaning Description
CASB Cloud Access Security Broker Enforces security policies in cloud applications, detecting and preventing unauthorized or risky usage.
CSPM Cloud Security Posture Management Identifies misconfigurations and compliance risks in cloud environments to improve security.
DLP Data Loss Prevention Monitors and prevents unauthorized access, sharing, or exfiltration of sensitive data.
EDR Endpoint Detection and Response Monitors endpoints for threats using behavioral analysis and enables investigation, response, and automated mitigation.
IDS/IPS Intrusion Detection/Prevention System Monitors network traffic for malicious activity; IPS also blocks detected threats in real time.
ITDR Identity Threat Detection and Response Focuses on detecting and responding to identity-based attacks, such as compromised credentials or privilege abuse.
MFA Multi-Factor Authentication Requires multiple verification methods (e.g., password + token) to confirm user identity and prevent unauthorized access.
MDR Managed Detection and Response A service combining tools and expert analysts for 24/7 threat monitoring, detection, prioritization, and response.
NDR Network Detection and Response Detects threats within network traffic using behavioral analytics and enables investigation and response.
SIEM Security Information and Event Management Centralizes and correlates log data from multiple sources to detect threats, support compliance, and enable incident analysis.
SOAR Security Orchestration, Automation, and Response Automates incident response workflows by collecting threat data and executing playbooks to reduce manual effort.
SOC Security Operations Center A team or facility responsible for monitoring, analyzing, and responding to cybersecurity threats in real time.
UEBA User and Entity Behavior Analytics Uses machine learning to detect anomalies in user or device behavior that may indicate a security threat.
XDR Extended Detection and Response Integrates data across endpoints, networks, and cloud to provide holistic threat detection, investigation, and response.
ZTNA Zero Trust Network Access Grants secure, identity and context-based access to applications, following the Zero Trust security model.