| CASB |
Cloud Access Security Broker |
Enforces security policies in cloud applications, detecting and preventing unauthorized or risky usage. |
| CSPM |
Cloud Security Posture Management |
Identifies misconfigurations and compliance risks in cloud environments to improve security. |
| DLP |
Data Loss Prevention |
Monitors and prevents unauthorized access, sharing, or exfiltration of sensitive data. |
| EDR |
Endpoint Detection and Response |
Monitors endpoints for threats using behavioral analysis and enables investigation, response, and automated mitigation. |
| IDS/IPS |
Intrusion Detection/Prevention System |
Monitors network traffic for malicious activity; IPS also blocks detected threats in real time. |
| ITDR |
Identity Threat Detection and Response |
Focuses on detecting and responding to identity-based attacks, such as compromised credentials or privilege abuse. |
| MFA |
Multi-Factor Authentication |
Requires multiple verification methods (e.g., password + token) to confirm user identity and prevent unauthorized access. |
| MDR |
Managed Detection and Response |
A service combining tools and expert analysts for 24/7 threat monitoring, detection, prioritization, and response. |
| NDR |
Network Detection and Response |
Detects threats within network traffic using behavioral analytics and enables investigation and response. |
| SIEM |
Security Information and Event Management |
Centralizes and correlates log data from multiple sources to detect threats, support compliance, and enable incident analysis. |
| SOAR |
Security Orchestration, Automation, and Response |
Automates incident response workflows by collecting threat data and executing playbooks to reduce manual effort. |
| SOC |
Security Operations Center |
A team or facility responsible for monitoring, analyzing, and responding to cybersecurity threats in real time. |
| UEBA |
User and Entity Behavior Analytics |
Uses machine learning to detect anomalies in user or device behavior that may indicate a security threat. |
| XDR |
Extended Detection and Response |
Integrates data across endpoints, networks, and cloud to provide holistic threat detection, investigation, and response. |
| ZTNA |
Zero Trust Network Access |
Grants secure, identity and context-based access to applications, following the Zero Trust security model. |