CyberArk-Glossar
Cybersecurity ist eine Flut von Fachbegriffen und Schlagwörtern der Branche. Das CyberArk-Glossar ist Ihr Wegweiser durch das Meer der komplizierten Terminologie und bietet leicht verständliche Definitionen und Ressourcen für weitere Erkundungen.
Access Certification
Access Certification facilitates the review of a user’s access privileges and requires a third-party to certify that the access should continue to be granted for a designated period of time.
Mehr erfahren
Access Discovery
Access discovery provides administrators with a clear picture of who has access to what applications, resources or privileges across the organization.
Mehr erfahren
Access Management
Access management solutions are used by businesses to authenticate, authorize and audit access to on-premises and cloud-based applications and IT systems.
Mehr erfahren
ACME Protocol
The ACME Protocol (Automated Certificate Management Environment) automates the issuing and validating domain ownership of certificates, enabling the seamless deployment of PKI with no need for manual intervention.
Mehr erfahren
Active Directory (AD)
Active Directory (AD) is Microsoft’s directory and identity management service for Windows domain networks. AD is used for user authentication and authorization by a variety of Microsoft solutions like Exchange Server and SharePoint Server, as well as third-party applications and services.
Mehr erfahren
Adaptive Multi-Factor Authentication (MFA)
Adaptive MFA is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use Adaptive Authentication to balance security requirements with the user experience.
Mehr erfahren
Advanced Persistent Malware
Increasingly, malware is being designed specifically to steal SSL/TLS keys and certificates for use in communications fraud and data exfiltration.
Mehr erfahren
Agentic AI (and AI Agents)
Agentic AI systems perform advanced functions such as independently executing decisions and automating actions, accelerating innovation and driving efficiency. With complex architectures and autonomous applications having more human-like behaviors, Agentic AI demands clear process and robust security frameworks to ensure safe adoption.
Mehr erfahren
Application (App) Gateway
An app gateway is an enterprise security solution that lets users access traditional web applications hosted in corporate data centers using the same logon credentials and methods they use to access mobile apps and cloud services.
Mehr erfahren
Attacker Encrypted Communications
Attackers use encrypted communications to bypass security, deliver malware, and steal data. Learn how to mitigate and protect against encrypted threats.
Mehr erfahren
Authentication Authorization
Authentication and Authorization solutions positively validate a user’s identify and grant permission to access applications and IT systems once verified.
Mehr erfahren
Bot Security
Bots automate and supplement human workflows helping organizations improve business agility, reduce costs and risks, and free up staff for higher value tasks.
Mehr erfahren
Certificate Authority
Certificate Authorities help verify entities and manage the lifecycle of digital certificates to ensure secure communications and prevent identity fraud.
Mehr erfahren
Certificate Chain of Trust
What is a certificate chain, what are the 3 key components, and how do certificate chains work? Learn all this, plus how to troubleshoot common issues!
Mehr erfahren
Certificate Enrollment
Certificate enrollment refers to the process by which a user requests a digital certificate to use as a machine identity on a public-facing system, application, API, container or cluster.
Mehr erfahren
Certificate Management
Ensure security, prevent outages, and streamline SSL management with automated certificate management. Optimize your infrastructure today!
Mehr erfahren
Certificate Pinning
Certificate pinning strengthens security by blocking unauthorized connections and preventing MITM attacks. Learn how it works and best practices today!
Mehr erfahren
Certificate Validation
Certificate validation and verification is the process a web browser performs to ensure a certificate can be trusted.
Mehr erfahren
CI/CD Pipeline
A CI/CD pipeline is a collection of tools used by developers and test engineers throughout the continuous software development, delivery and deployment lifecycle.
Mehr erfahren
CISA Secure Software Development Attestation Form (SSDA)
The Secure Software Development Attestation Form is a requirement introduced by the Cybersecurity and Infrastructure Security Agency with OMB collaboration.
Mehr erfahren
Cloud IAM Permissions
Cloud identity and access management (IAM) permissions let IT and security organizations control access to the resources in their cloud environments.
Mehr erfahren
Cloud Identity Security
Cloud identity security is the practice of implementing identity security controls to secure human and machine identities in hybrid and multi-cloud environments. Cloud migration and digital transformation have become commonplace for many modern enterprises
Mehr erfahren
Cloud Infrastructure Entitlements Management (CIEM)
Sometimes referred to as Cloud Entitlements Management solutions or Cloud Permissions Management solutions, CIEM solutions apply the Principle of Least Privilege access to cloud infrastructure and services, helping organizations defend against data breaches, malicious attacks and other risks posed by excessive cloud permissions.
Mehr erfahren
Cloud-Sicherheit
Cloud-Sicherheit bezieht sich auf den Schutz der Integrität von Cloud-basierten Anwendungen, Daten und virtuellen Infrastrukturen. Der Begriff gilt für alle Cloud-Bereitstellungsmodelle (Public Cloud, Private Cloud, Hybrid-Cloud, Multi-Cloud) und alle Arten von Cloud-basierten Diensten und On-Demand-Lösungen (IaaS, PaaS, SaaS).
Mehr erfahren
Code Signing
Discover what is code signing, how code signing works, and how machine identity security protects your code signing credentials from cybercriminals.
Mehr erfahren
Containers
From physical servers to virtualization and now containers, see how application deployment has evolved for better efficiency, scalability, and portability.
Mehr erfahren
Customer Identity and Access Management (CIAM)
CIAM solutions control access to public websites and digital properties, making it easy for customers to sign up and log on to online applications and services.
Mehr erfahren
Cyber Insurance
Businesses purchase cyber insurance (also known as cybersecurity insurance) to mitigate financial loss due to cyber attacks and data breaches.
Mehr erfahren
Data Sovereignty
Data sovereignty is the ability of enterprises to safeguard and have full control over the personally identifiable information (PII) of any citizen or permanent resident of the country in which it operates.
Mehr erfahren
Datenschutzverletzung
Eine Datenschutzverletzung ist ein Sicherheitsvorfall, bei dem sich böswillige Insider oder externe Angreifer unbefugt Zugang zu vertraulichen Daten oder sensiblen Informationen wie medizinischen Aufzeichnungen, Finanzinformationen oder personenbezogenen Daten verschaffen. Datenschutzverletzungen zählen zu den häufigsten und teuersten Arten von Cyber-Sicherheitsvorfällen.
Mehr erfahren
Defense-in-Depth
A defense-in-depth strategy, aka a security-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.
Mehr erfahren
DevOps with AWS vs. Azure
Is AWS or Azure the best DevOps cloud solution for you? Compare pipelines as code, code building tools, and Azure vs. AWS code deploy to find out!
Mehr erfahren
DevOps-Sicherheit
DevOps ist ein Begriff, der eine Reihe kultureller Philosophien, Praktiken und Instrumente beschreibt, die Softwareentwicklung (Dev) und IT-Betrieb (Ops) zusammenbringen und eine schnellere Bereitstellung von Anwendungen und Dienstleistungen ermöglichen. DevOps bringt neue Risiken und kulturelle Veränderungen mit sich, die wiederum Sicherheitsprobleme schaffen, die mit herkömmlichen Security-Management-Lösungen und -Verfahren in der Regel nicht bewältigt werden können.
Mehr erfahren
Digital Certificates
Discover the types, uses, and validity of digital certificates. Understand their role in authentication, security, and software trust across desktop and mobile.
Mehr erfahren
Digital Signature Algorithm (DSA)
The Digital Signature Algorithm is a Federal Information Processing Standard for digital signatures. It facilitates the authentication of digital messages or documents by ensuring that signatures are valid and unaltered.
Mehr erfahren
Digital Transformation
Digital transformation refers to the process of integrating digital technology into various aspects of an organization to fundamentally change how it operates and delivers value to its customers or stakeholders.
Mehr erfahren
Directory Services
A directory service is a common data repository for maintaining information about network users and resources as part of their Identity Security strategy.
Mehr erfahren
DNS Traffic Blocking
DNS traffic blocking is a network management process that prevents access to specific websites or internet services based on their domain names.
Mehr erfahren
DORA Act
The Digital Operational Resilience Act (DORA) Act, is a regulatory framework established by the European Union to fortify the financial sector against ICT threats.
Mehr erfahren
Downgrade Attacks
A TLS downgrade attack tricks the client and server into using older protocols or insecure parameters for encrypting the information in transit.
Mehr erfahren
Endpunktsicherheit
Endpunktsicherheit bezeichnet den Schutz von Unternehmensnetzwerken vor Bedrohungen, die von On-Premise- oder Remote-Geräten ausgehen. Ein Endpunkt ist ein Gerät, das einen Zugangspunkt zu Ressourcen und Anwendungen eines Unternehmens bietet und dadurch eine potenzielle Cyber-Sicherheitslücke darstellt.
Mehr erfahren
Enterprise Browser
An enterprise browser is a dedicated, corporate web browser designed to give enterprises enhanced security and control over how the browser functions while ensuring a seamless browsing experience for employees
Mehr erfahren
FedRAMP Authorization
Federal Risk and Authorization Management Program (FedRAMP) is a United States government-wide program that standardizes the security assessment, authorization and continuous monitoring of cloud products and services.
Mehr erfahren
FIDO2
FIDO2 is an open authentication standard developed by the FIDO Alliance, an organization with the mission to develop open, scalable authentication standards.
Mehr erfahren
Field-Level Encryption
Field Level Encryption (FLE) allows a developer to selectively encrypt individual fields of a document on the client-side before it is sent to the server—keeping the encrypted data private from the providers hosting or anyone accessing the database.
Mehr erfahren
Healthcare Cybersecurity
Healthcare cybersecurity protects organizations from cyber attacks and ensures availability of medical services, integrity of patient data, and compliance.
Mehr erfahren
Identity and Access Management (IAM)
Identity and Access Management (IAM) solutions enable administration of user identities and control of access to enterprise resources. IAM solutions ensure the right individuals have access to the right IT resources, for the right reasons, at the right time.
Mehr erfahren
Identity as a Service (IDaaS)
Identity as a Service (IDaaS) is an Identity and Access Management solution delivered in the form of a cloud-based service hosted and managed by a trusted third party. An IDaaS offering combines all the functions and benefits of an enterprise-class IAM solution with all the economic and operational advantages of a cloud-based service.
Mehr erfahren
Identity Governance and Administration (IGA)
Identity Governance and Administration (IGA) solutions efficiently manage digital identities and access rights across diverse systems and are used by corporate information security, risk management, compliance teams and IT organizations.
Mehr erfahren
Identity Lifecycle Management
Identity lifecycle management refers to the process of managing the user identities and evolving access privileges of employees and contractors throughout their tenure—from day one through separation.
Mehr erfahren
Identity Orchestration
Learn everything you need to know identity orchestration and how it automates identity management workflows without writing custom codes or scripts.
Mehr erfahren
Identity Security
Identity Security is a comprehensive solution for securing all identities– human or machine – throughout the cycle of accessing critical assets.
Mehr erfahren
Identity Threat Detection and Response (ITDR)
Identity Threat Detection and Response (ITDR) is a security discipline consisting of cyber threat intelligence, behavior analysis, tools and structured processes to enhance identity infrastructure security and accelerate the remediation of identity-centric attacks.
Mehr erfahren
Intelligent Privilege Controls
Intelligent privilege controls are security measures designed to manage access to enterprise resources based on real-time risk assessments and contextual factors.
Mehr erfahren
ISO
ISO stands for the International Organization for Standardization that sets standards for quality, safety, efficiency and interoperability across industries.
Mehr erfahren
Just-in-Time-Zugriff
Mit der Zugriffsmethode Just-in-Time (JIT) können Unternehmen menschlichen und nicht menschlichen Benutzern in Echtzeit erhöhten und granularen privilegierten Zugriff auf eine Anwendung oder ein System gewähren, um eine notwendige Aufgabe auszuführen. Branchenanalysten empfehlen das JIT-Konzept als Möglichkeit, dauerhaften Zugriff zugunsten eines sicheren privilegierten Zugriffs zu minimieren.
Mehr erfahren
Kubernetes
Kubernetes, also known as K8s, is a popular open-source container orchestration platform designed for cloud portability across hybrid and multi-cloud infrastructure.
Mehr erfahren
Least Privilege
Das Least-Privilege-Prinzip (PoLP) ist ein Konzept für Informationssicherheit, bei dem einem Benutzer nur die für seine Tätigkeit mindestens erforderliche Zugriffs- bzw. Berechtigungsebene gewährt wird. Das Least-Privilege-Prinzip gilt als Best Practice in der Cyber-Sicherheitsbranche und ist ein wesentlicher Schritt zum Schutz privilegierter Zugriffe auf hochwertige Daten und Ressourcen.
Mehr erfahren
Machine Identity
Machine identities secure trust and confidentiality with digital certificates, just as people do with usernames and passwords. Read on to learn more!
Mehr erfahren
Machine Identity Security
Machine identity security safeguards digital trust by protecting machine identities, preventing breaches, securing cloud growth, and ensuring compliance.
Mehr erfahren
Malware
Malware ist eine allgemeine Bezeichnung für jede Art von schädlicher Software, die ohne Wissen des Endbenutzers einem Computer, Server, Client oder Netzwerk und/oder der Infrastruktur Schaden zufügen soll. Cyber-Angreifer entwickeln, nutzen und verkaufen Malware aus vielen verschiedenen Gründen. Am häufigsten kommt sie jedoch zum Einsatz, um personenbezogene, finanzielle oder geschäftliche Daten abzugreifen.
Mehr erfahren
Man-in-the-Middle Attacks (MITM)
Successful MITM attacks gain the trust of communicating parties by impersonating a trusted website and eavesdropping on secure conversations.
Mehr erfahren
MITRE ATT&CK Framework
Mitre Att&ck is an open framework for implementing cybersecurity detection and response programs that includes a global knowledge base of adversarial TTPs.
Mehr erfahren
Multi Domain SSL Certificates
Secure multiple domains with a single Multi Domain SSL certificate. Reduce costs, streamline management, and enhance security for all your web properties.
Mehr erfahren
Multi-cloud
Multi-cloud leverages two or more cloud services from more than one cloud provider. In the enterprise, multi-cloud typically refers to running enterprise applications on platform-as-a-service (PaaS) or infrastructure-as-a-service (IaaS) from multiple cloud service providers, such as Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM cloud and Microsoft Azure.
Mehr erfahren
Multi-Factor Authentication (MFA)
Multi-Factor Authentication is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use MFA to balance security requirements with the user experience.
Mehr erfahren
NIS2 Directive
The NIS2 (Network and Information Security) Directive is a regulatory framework established by the European Union(EU) to enhance the cybersecurity of critical infrastructure and digital service providers.
Mehr erfahren
NIST CSF 2.0
NIST CSF 2.0 is a new version of the original National Institute of Standards and Technology Cybersecurity Framework, help to manage and mitigate cybersecurity risks.
Mehr erfahren
NIST SP 800-207
NIST SP 800-207 is a guidance published by the National Institute of Standards and Technology. A part of NIST SP 800 series for information security and cybersecurity.
Mehr erfahren
Non-Human Identity
Non-human Identities are digital entities used to identify, authenticate and authorize machines, devices, and IT infrastructure that is not associated with a human.
Mehr erfahren
Operational Technology (OT) Cybersecurity
Operational Technology (OT) cybersecurity is a key component of protecting the uptime, security and safety of industrial environments and critical infrastructure.
Mehr erfahren
Outages
See how CyberArk prevents devastating website outages, often caused by improperly managed machine identities and expired certificates, with automation!
Mehr erfahren
Passwordless Authentication
Passwordless Authentication is an authentication method that allows a user to gain access to an application or IT system without entering a password or answering security questions.
Mehr erfahren
PCI-DSS
The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of security practices to protect cardholder data and prevent credit card fraud.
Mehr erfahren
Phishing Attack
A phishing attack is a social engineering tactic commonly used to steal confidential data or deliver ransomware or some other form of malware.
Mehr erfahren
Phishing Scams
In phishing, malicious actors trick people into going to a website and entering private information into a form. They might impersonate a major company, like a bank or PayPal.
Mehr erfahren
PKI
PKI, or public key infrastructure, is the framework of encryption and cybersecurity. PKI secures client-server communications. How? Let's find out!
Mehr erfahren
PKI Mistakes
Your guide to the most common PKI management mistakes, and how your team can strategically avoid them to keep client-server communications secure.
Mehr erfahren
Privileged Access Management (PAM)
Privilege Access Management (PAM) ist eine umfassende Cyber-Sicherheitsstrategie – rund um Mitarbeiter, Prozesse und Technologie – zur Kontrolle, Überwachung, Sicherung und Prüfung aller menschlichen und nicht menschlichen privilegierten Identitäten und Aktivitäten in einer geschäftlichen IT-Umgebung. Unternehmen setzen auf Privileged Access Management, um sich vor Gefahren im Zusammenhang mit dem Diebstahl von Anmeldedaten und Missbrauch von Privilegien zu schützen.
Mehr erfahren
Privileged Entitlements Management (PEM)
Privileged entitlements management is the practice of securely managing high-risk entitlements (also known as permissions, access rights or privileges) to access sensitive data, resources and services.
Mehr erfahren
Ransomware
Ransomware ist eine Art Malware, die darauf abzielt, das Opfer finanziell zu erpressen. Einmal aktiv, macht Ransomware die Interaktion mit den betroffenen Dateien, Anwendungen oder Systemen so lange unmöglich, bis ein Lösegeld gezahlt wird, üblicherweise in Form einer nicht rückverfolgbaren Währung wie Bitcoin.
Mehr erfahren
Remote Access Security
Remote access security solutions authenticate users who are accessing business applications and IT systems from outside the private enterprise network.
Mehr erfahren
Remote Work Security
Remote work security safely extends business applications and services to teleworkers and nomadic users without impairing user experience or satisfaction.
Mehr erfahren
Robotergesteuerte Prozessautomatisierung (RPA)
Robotergesteuerte Prozessautomatisierung (RPA) ist eine Technologie, die Unternehmen hilft, standardisierte Aufgaben teilweise oder vollständig zu automatisieren. Im Rahmen der robotergesteuerten Prozessautomatisierung können Softwareroboter bzw. „Bots“ die Handlungen von Menschen nachahmen, um Aufgaben auszuführen.
Mehr erfahren
Root Certificates
Understand how root certificates establish trust in code signing. Explore their role in verifying authenticity through a chain of trust to prevent fraud.
Mehr erfahren
RSA Encryption
RSA encryption secures machine identities and prevents cyber threats with asymmetric cryptography. Strengthen your security strategy with the right tools today!
Mehr erfahren
SaaS
Software-as-a-Service (SaaS) ist ein Modell für Software-Lizenzierung und -Vertrieb, bei dem ein Dienstleister Anwendungen hostet und dem Kunden über das Internet zur Verfügung stellt. SaaS wird auch als „On-Demand-Software“, „gehostete Software“ und „webbasierte Software“ bezeichnet und ist eine der drei Hauptkomponenten des Cloud Computing – eines der grundlegenden Elemente der digitalen Transformation.
Mehr erfahren
SASE (Secure Access Service Edge)
SASE merges security and networking into a cloud-based framework for seamless, secure access. See how it strengthens your organization’s security today!
Mehr erfahren
Secrets-Management
Secrets-Management ermöglicht Unternehmen die konsequente Durchsetzung von Sicherheitsrichtlinien für nicht menschliche Identitäten. Secrets Management bietet die Gewissheit, dass Ressourcen über sämtliche Tool-Stacks, Plattformen und Cloud-Umgebungen hinweg nur authentifizierten und autorisierten Benutzern zugänglich sind.
Mehr erfahren
Security Assertion Markup Language (SAML)
Security Assertion Markup Language (SAML) provides a standard way for businesses and application providers to share user authentication and authorization data and federate identity management functionality.
Mehr erfahren
Security Framework
A security framework is a set of documented standards, policies, procedures, and best practices intended to enhance an organization’s security and reduce risk.
Mehr erfahren
Security Operations (SecOps)
Security Operations (SecOps) is the practice of combining internal information security and IT operations practices to improve collaboration and reduce risks.
Mehr erfahren
Security Standards and Compliance
Strengthen key and certificate security with frameworks, audits, and best practices to prevent risks and ensure compliance. Enhance your security strategy now!
Mehr erfahren
Self-Signed Certificates
Self-signed certificates offer flexibility, but they come with security and trust risks. See how to manage them effectively and strengthen your security!
Mehr erfahren
Session Hijacking
Session hijacking lets attackers steal active sessions to impersonate users and access sensitive data. Learn key attack methods and how to stay safe!
Mehr erfahren
Single Sign-On (SSO)
Single Sign-On (SSO) is an authentication method that lets users access multiple applications and services using a single set of login credentials. SSO can help businesses improve user satisfaction and productivity, strengthen access security, and reduce IT operations expense and complexity.
Mehr erfahren
SOC 2
SOC 2 is a security compliance framework developed by the American Institute of Certified Public Accountants (AICPA) to securely manage customer data within the cloud.
Mehr erfahren
Social Engineering
Social engineering is a manipulation technique aimed at tricking individuals into revealing sensitive information
Mehr erfahren
SPIFFE
Learn how SPIFFE standardizes secure workload identity in dynamic environments, enables zero-trust authentication and solves the "bottom turtle" problem.
Mehr erfahren
SSH (Secure Shell)
SSH (Secure Shell) encrypts remote access, secures file transfers, and protects network infrastructure. Explore how SSH keys strengthen authentication.
Mehr erfahren
SSL Certificate
An SSL Certificate encrypts data, ensures authentication, and boosts trust. See how it protects websites, prevents attacks, and enhances cybersecurity.
Mehr erfahren
SSL Stripping Attacks
SSL stripping attacks downgrade HTTPS to HTTP, exposing user data to interception. Learn how cybercriminals exploit this and how to protect against it.
Mehr erfahren
Strict SSL
Strict SSL enhances security by validating server authenticity and protecting against man-in-the-middle attacks, ensuring safe connections with valid certificates.
Mehr erfahren
SWIFT Compliance
The Society of Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative founded in 1973 by members of the financial community with proprietary network.
Mehr erfahren
Symmetric vs. Asymmetric Encryption
Symmetric encryption uses a single secret key, while asymmetric encryption relies on a public-private key pair for secure communication. See how this impacts security!
Mehr erfahren
Synthetic Identity
Synthetic identity refers to a counterfeit identity formed by combining a mix of genuine and false information, blurring the line between physical and digital characteristics that identify a human being.
Mehr erfahren
TEA (Time, Entitlements and Approvals)
TEA is a security concept that enhances access control by managing when, how much, and under what conditions users or systems can access resources.
Mehr erfahren
Temporary Elevated Access Management
Temporary elevated access management (TEAM) access methodology helps organizations elevate privileges for human and non-human users in real time to provide granular access to an application or system in order to perform a necessary task.
Mehr erfahren
Third-Party Access
Third-party access is the process of granting external vendors and service providers secure access to IT assets for maintenance, administration and management.
Mehr erfahren
TLS Certificate Lifecycle
Learn all about certificate lifecycle management, why it matters, the 6 stages of the TLS certificate lifecycle, and the impact automation will have!
Mehr erfahren
TLS Certificate Renewal
Expired certificates can be dangerous for your network. Learn why they expire so easily without automation and the steps you can take if this happens.
Mehr erfahren
TLS Certificate Risks
Outdated protocols, weak ciphers, and expired certificates can expose TLS to attacks. See how to mitigate these risks and strengthen your cybersecurity!
Mehr erfahren
TLS Certificates
TLS certificates authenticate websites and encrypt data to ensure secure connections. Learn how they protect online interactions to enhance security!
Mehr erfahren
TLS Decryption
See how TLS decryption enhances security visibility, threat detection, and compliance while mitigating risks. Learn methods, best practices, and more!
Mehr erfahren
TLS Handshake
Understand the TLS handshake process, common connection errors, and how to solve them. Learn how to prevent outages with better certificate management!
Mehr erfahren
TLS/SSL Offloading
TLS/SSL offloading reduces connection latency, improving page loading speeds and user experience as well as introducing additional security checks for malware.
Mehr erfahren
TLS/SSL Port
Understand how TLS/SSL ports secure data, their key roles in network communication, and why HTTPS is essential for security and compliance. Upgrade your defenses now!
Mehr erfahren
Trust Stores
A trust store is a collection of root certificates that are trusted by default and are maintained by the companies that make operating systems and web browsers.
Mehr erfahren
User Behavior Analytics
User behavior analytics use AI and machine learning to analyze large datasets to identify security breaches, data exfiltration and other malicious activities.
Mehr erfahren
Virtual Directory
A virtual directory is an Identity and Access Management architectural component that gives identity consumers a consolidated and unified view of identity management information stored in multiple disparate data repositories.
Mehr erfahren
Wildcard Certificates
Wildcard certificates simplify management, but pose major risks if not properly secured. Learn about the benefits and dangers before implementing.
Mehr erfahren
Workload Identity
Workload identity enhances Kubernetes security, automates authentication, and strengthens zero trust compliance. Explore best practices now!
Mehr erfahren
X.509 Certificates
An X.509 certificate is a type of TLS/SSL certificate which uses the X.509 standard and contains a public key and the identity of a hostname, organization or individual.
Mehr erfahren
Zero Standing Privileges
Zero Standing Privileges (ZSP) is an identity security principle that advocates for the removal of all persistent privileges for users within an enterprise’s estate. Practically, Zero Standing Privileges is a progression from the concept of just-in-time access.
Mehr erfahren
Zero Trust
Zero Trust ist ein strategisches Cyber-Sicherheitsmodell, das zum Schutz moderner digitaler Geschäftsumgebungen entwickelt wurde. Zero Trust basiert auf der Überzeugung, dass ein gewisses Misstrauen sowohl innerhalb als auch außerhalb des Netzwerk-Perimeters sinnvoll ist. Zero-Trust-Modelle setzen voraus, dass alle Benutzer und Prozesse, die sich mit den Systemen eines Unternehmens verbinden wollen, verifiziert werden müssen, bevor der Zugriff gewährt wird.
Mehr erfahren