Glosario de CyberArk

La ciberseguridad está repleta de términos técnicos y palabras de moda en el sector. El glosario de CyberArk será su guía a través de un mar de terminología complicada, con definiciones fáciles de entender y recursos adicionales para un análisis más exhaustivo.

A

Access Certification

Access Certification facilitates the review of a user’s access privileges and requires a third-party to certify that the access should continue to be granted for a designated period of time.

Aprender más sobre

Access Certification

Access Discovery

Access discovery provides administrators with a clear picture of who has access to what applications, resources or privileges across the organization.

Aprender más sobre

Access Discovery

Access Management

Access management solutions are used by businesses to authenticate, authorize and audit access to on-premises and cloud-based applications and IT systems.

Aprender más sobre

Access Management

Active Directory (AD)

Active Directory (AD) is Microsoft’s directory and identity management service for Windows domain networks. AD is used for user authentication and authorization by a variety of Microsoft solutions like Exchange Server and SharePoint Server, as well as third-party applications and services.

Aprender más sobre

Active Directory (AD)

Adaptive Multi-Factor Authentication (MFA)

Adaptive MFA is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use Adaptive Authentication to balance security requirements with the user experience.

Aprender más sobre

Adaptive Multi-Factor Authentication (MFA)

Application (App) Gateway

An app gateway is an enterprise security solution that lets users access traditional web applications hosted in corporate data centers using the same logon credentials and methods they use to access mobile apps and cloud services.

Aprender más sobre

Application (App) Gateway

Authentication Authorization

Authentication and Authorization solutions positively validate a user’s identify and grant permission to access applications and IT systems once verified.

Aprender más sobre

Authentication Authorization

B

Bot Security

Bots automate and supplement human workflows helping organizations improve business agility, reduce costs and risks, and free up staff for higher value tasks.

Aprender más sobre

Bot Security

C

CI/CD Pipeline

A CI/CD pipeline is a collection of tools used by developers and test engineers throughout the continuous software development, delivery and deployment lifecycle.

Aprender más sobre

CI/CD Pipeline

CISA Secure Software Development Attestation Form (SSDA)

The Secure Software Development Attestation Form is a requirement introduced by the Cybersecurity and Infrastructure Security Agency with OMB collaboration.

Aprender más sobre

CISA Secure Software Development Attestation Form (SSDA)

Cloud IAM Permissions

Cloud identity and access management (IAM) permissions let IT and security organizations control access to the resources in their cloud environments.

Aprender más sobre

Cloud IAM Permissions

Cloud Identity Security

Cloud identity security is the practice of implementing identity security controls to secure human and machine identities in hybrid and multi-cloud environments. Cloud migration and digital transformation have become commonplace for many modern enterprises

Aprender más sobre

Cloud Identity Security

Cloud Infrastructure Entitlements Management (CIEM)

Sometimes referred to as Cloud Entitlements Management solutions or Cloud Permissions Management solutions, CIEM solutions apply the Principle of Least Privilege access to cloud infrastructure and services, helping organizations defend against data breaches, malicious attacks and other risks posed by excessive cloud permissions.

Aprender más sobre

Cloud Infrastructure Entitlements Management (CIEM)

Customer Identity and Access Management (CIAM)

CIAM solutions control access to public websites and digital properties, making it easy for customers to sign up and log on to online applications and services.

Aprender más sobre

Customer Identity and Access Management (CIAM)

Cyber Insurance

Businesses purchase cyber insurance (also known as cybersecurity insurance) to mitigate financial loss due to cyber attacks and data breaches.

Aprender más sobre

Cyber Insurance

Seguridad en la Nube

La seguridad en la nube hace referencia a la práctica de proteger la integridad de las aplicaciones, los datos y la infraestructura virtual basados en la nube.  El término se aplica a todos los modelos de despliegue en la nube (nube pública, nube privada, nube híbrida, multinube) y a todos los tipos de servicios y soluciones a la carta basados en la nube (IaaS, PaaS, SaaS).

Aprender más sobre

Seguridad en la Nube

D

Data Sovereignty

Data sovereignty is the ability of enterprises to safeguard and have full control over the personally identifiable information (PII) of any citizen or permanent resident of the country in which it operates.

Aprender más sobre

Data Sovereignty

Defense-in-Depth

A defense-in-depth strategy, aka a security-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.

Aprender más sobre

Defense-in-Depth

Digital Transformation

Digital transformation refers to the process of integrating digital technology into various aspects of an organization to fundamentally change how it operates and delivers value to its customers or stakeholders.

Aprender más sobre

Digital Transformation

Directory Services

A directory service is a common data repository for maintaining information about network users and resources as part of their Identity Security strategy.

Aprender más sobre

Directory Services

DORA Act

The Digital Operational Resilience Act (DORA) Act, is a regulatory framework established by the European Union to fortify the financial sector against ICT threats.

Aprender más sobre

DORA Act

Filtración de Datos

Una filtración de datos es un incidente de seguridad en que usuarios internos malintencionados o atacantes externos obtienen acceso no autorizado a datos confidenciales o información sensible como historias clínicas, información financiera o información de identificación personal (PII). Las filtraciones de datos son uno de los tipos de incidentes de ciberseguridad más comunes y costosos.

Aprender más sobre

Filtración de Datos

Seguridad para las Operaciones de Desarrollo

DevOps es un término utilizado para describir un conjunto de prácticas, herramientas y filosofías culturales que unen el desarrollo de software (Dev) y las operaciones de TI (Ops) y aumentan la capacidad de una organización para ofrecer aplicaciones y servicios a alta velocidad. DevOps presenta nuevos riesgos y cambios culturales que crean retos de seguridad que, por lo general, no pueden afrontarse mediante las soluciones y prácticas de gestión de seguridad convencionales.

Aprender más sobre

Seguridad para las Operaciones de Desarrollo

E

Enterprise Browser

An enterprise browser is a dedicated, corporate web browser designed to give enterprises enhanced security and control over how the browser functions while ensuring a seamless browsing experience for employees

Aprender más sobre

Enterprise Browser

Seguridad para Endpoints

La seguridad para endpoints hace referencia a la práctica de proteger las redes empresariales contra las amenazas que se originan en los dispositivos remotos o locales. Un endpoint es cualquier dispositivo que proporciona un punto de entrada a los activos y aplicaciones de la empresa y representa una posible vulnerabilidad de ciberseguridad.

Aprender más sobre

Seguridad para Endpoints

F

FedRAMP Authorization

Federal Risk and Authorization Management Program (FedRAMP) is a United States government-wide program that standardizes the security assessment, authorization and continuous monitoring of cloud products and services.

Aprender más sobre

FedRAMP Authorization

FIDO2

FIDO2 is an open authentication standard developed by the FIDO Alliance, an organization with the mission to develop open, scalable authentication standards.

Aprender más sobre

FIDO2

G

H

Healthcare Cybersecurity

Healthcare cybersecurity protects organizations from cyber attacks and ensures availability of medical services, integrity of patient data, and compliance.

Aprender más sobre

Healthcare Cybersecurity

I

Identity and Access Management (IAM)

Identity and Access Management (IAM) solutions enable administration of user identities and control of access to enterprise resources. IAM solutions ensure the right individuals have access to the right IT resources, for the right reasons, at the right time.

Aprender más sobre

Identity and Access Management (IAM)

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is an Identity and Access Management solution delivered in the form of a cloud-based service hosted and managed by a trusted third party. An IDaaS offering combines all the functions and benefits of an enterprise-class IAM solution with all the economic and operational advantages of a cloud-based service.

Aprender más sobre

Identity as a Service (IDaaS)

Identity Governance and Administration (IGA)

Identity Governance and Administration (IGA) solutions efficiently manage digital identities and access rights across diverse systems and are used by corporate information security, risk management, compliance teams and IT organizations.

Aprender más sobre

Identity Governance and Administration (IGA)

Identity Lifecycle Management

Identity lifecycle management refers to the process of managing the user identities and evolving access privileges of employees and contractors throughout their tenure—from day one through separation.

Aprender más sobre

Identity Lifecycle Management

Identity Orchestration

Learn everything you need to know identity orchestration and how it automates identity management workflows without writing custom codes or scripts.

Aprender más sobre

Identity Orchestration

Identity Security

Identity Security is a comprehensive solution for securing all identities– human or machine – throughout the cycle of accessing critical assets.

Aprender más sobre

Identity Security

Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) is a security discipline consisting of cyber threat intelligence, behavior analysis, tools and structured processes to enhance identity infrastructure security and accelerate the remediation of identity-centric attacks.

Aprender más sobre

Identity Threat Detection and Response (ITDR)

Intelligent Privilege Controls

Intelligent privilege controls are security measures designed to manage access to enterprise resources based on real-time risk assessments and contextual factors.

Aprender más sobre

Intelligent Privilege Controls

ISO

ISO stands for the International Organization for Standardization that sets standards for quality, safety, efficiency and interoperability across industries.

Aprender más sobre

ISO

J

Acceso Just-In-Time

Mediante la metodología de acceso Just-in-time (JIT), las organizaciones pueden elevar los usuarios humanos y no humanos en tiempo real para proporcionar un acceso con privilegios elevado y granular a una aplicación o sistema a fin de realizar una tarea necesaria. Los analistas de la industria de la ciberseguridad recomiendan el acceso JIT como una forma de proporcionar un acceso con privilegios seguro al minimizar el acceso permanente.

Aprender más sobre

Acceso Just-In-Time

K

Kubernetes

Kubernetes, also known as K8s, is a popular open-source container orchestration platform designed for cloud portability across hybrid and multi-cloud infrastructure. 

Aprender más sobre

Kubernetes

L

Mínimo Privilegio

El principio del mínimo privilegio (PoLP) hace referencia a un concepto de seguridad de la información en que se da a un usuario los niveles (o permisos) de acceso mínimos necesarios para desempeñar sus funciones laborales. En general, el principio del mínimo privilegio se considera una práctica óptima de ciberseguridad y es un paso fundamental para proteger el acceso con privilegios a datos y activos de gran valor.

Aprender más sobre

Mínimo Privilegio

M

Machine Identity

Machine identities are digital entities used to identify, authenticate and authorize machines, devices, and IT infrastructure that is not associated with a human.

Aprender más sobre

Machine Identity

Malware

Malware es un término amplio que designa cualquier tipo de software malicioso diseñado para causar daños o perjuicios a un ordenador, servidor, red de cliente o de equipos o infraestructura sin el conocimiento del usuario final. Los ciberatacantes crean, utilizan y venden malware por muchas razones diferentes, pero la mayoría de las veces se utiliza para robar información personal, financiera o corporativa.

Aprender más sobre

Malware

MITRE ATT&CK Framework

Mitre Att&ck is an open framework for implementing cybersecurity detection and response programs that includes a global knowledge base of adversarial TTPs.

Aprender más sobre

MITRE ATT&CK Framework

Multi-cloud

Multi-cloud leverages two or more cloud services from more than one cloud provider. In the enterprise, multi-cloud typically refers to running enterprise applications on platform-as-a-service (PaaS) or infrastructure-as-a-service (IaaS) from multiple cloud service providers, such as Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM cloud and Microsoft Azure.

Aprender más sobre

Multi-cloud

Multi-Factor Authentication (MFA)

Multi-Factor Authentication is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use MFA to balance security requirements with the user experience.

Aprender más sobre

Multi-Factor Authentication (MFA)

N

NIS2 Directive

The NIS2 (Network and Information Security) Directive is a regulatory framework established by the European Union(EU) to enhance the cybersecurity of critical infrastructure and digital service providers.

Aprender más sobre

NIS2 Directive

NIST CSF 2.0

NIST CSF 2.0 is a new version of the original National Institute of Standards and Technology Cybersecurity Framework, help to manage and mitigate cybersecurity risks.

Aprender más sobre

NIST CSF 2.0

NIST SP 800-207

NIST SP 800-207 is a guidance published by the National Institute of Standards and Technology. A part of NIST SP 800 series for information security and cybersecurity.

Aprender más sobre

NIST SP 800-207

Non-Human Identity

Non-human Identities are digital entities used to identify, authenticate and authorize machines, devices, and IT infrastructure that is not associated with a human.

Aprender más sobre

Non-Human Identity

O

Operational Technology (OT) Cybersecurity

Operational Technology (OT) cybersecurity is a key component of protecting the uptime, security and safety of industrial environments and critical infrastructure.

Aprender más sobre

Operational Technology (OT) Cybersecurity

P

Gestión del Acceso con Privilegios (PAM)

La gestión del acceso con privilegios (PAM) hace referencia a una estrategia integral de ciberseguridad — que comprende personas, procesos y tecnología— para controlar, supervisar, proteger y auditar todas las identidades y actividades con privilegios humanas y no humanas en todo el entorno informático de una empresa. Las organizaciones aplican la gestión del acceso con privilegios para protegerse contra las amenazas que suponen el robo de credenciales y el uso indebido de privilegios.

Aprender más sobre

Gestión del Acceso con Privilegios (PAM)

Passwordless Authentication

Passwordless Authentication is an authentication method that allows a user to gain access to an application or IT system without entering a password or answering security questions.

Aprender más sobre

Passwordless Authentication

PCI-DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of security practices to protect cardholder data and prevent credit card fraud.

Aprender más sobre

PCI-DSS

Phishing Attack

A phishing attack is a social engineering tactic commonly used to steal confidential data or deliver ransomware or some other form of malware.

Aprender más sobre

Phishing Attack

Q

R

Automatización Robótica de Procesos (RPA)

La automatización robótica de procesos (RPA) es una tecnología de automatización que ayuda a las organizaciones a automatizar parcial o totalmente las tareas estandarizadas. Los robots de software de automatización robótica de procesos, o "bots", pueden imitar las acciones de los humanos para realizar el trabajo.

Aprender más sobre

Automatización Robótica de Procesos (RPA)

Ransomware

El ransomware es un tipo de malware diseñado para extorsionar a las víctimas para obtener un beneficio financiero. Una vez activado, el ransomware impide que los usuarios interactúen con sus archivos, aplicaciones o sistemas hasta que se pague un rescate, normalmente en forma de moneda indetectable como el bitcoin.

Aprender más sobre

Ransomware

Remote Access Security

Remote access security solutions authenticate users who are accessing business applications and IT systems from outside the private enterprise network.

Aprender más sobre

Remote Access Security

Remote Work Security

Remote work security safely extends business applications and services to teleworkers and nomadic users without impairing user experience or satisfaction.

Aprender más sobre

Remote Work Security

S

Gestión de Secretos

La gestión de secretos permite a las organizaciones aplicar sistemáticamente políticas de seguridad para las identidades no humanas. La gestión de secretos garantiza que solo las entidades autenticadas y autorizadas puedan acceder a los recursos de las pilas de herramientas, plataformas y entornos en la nube.

Aprender más sobre

Gestión de Secretos

SaaS

El software como servicio (SaaS) es un modelo de concesión de licencias y distribución de software en el que un proveedor de servicios aloja aplicaciones y las pone a disposición de los clientes a través de Internet. El SaaS, también conocido como "software a la carta", "software alojado" y "software basado en web", es uno de los tres componentes principales de la informática en la nube, uno de los elementos fundamentales de la transformación digital.

Aprender más sobre

SaaS

Security Assertion Markup Language (SAML)

Security Assertion Markup Language (SAML) provides a standard way for businesses and application providers to share user authentication and authorization data and federate identity management functionality.

Aprender más sobre

Security Assertion Markup Language (SAML)

Security Framework

A security framework is a set of documented standards, policies, procedures, and best practices intended to enhance an organization’s security and reduce risk.

Aprender más sobre

Security Framework

Security Operations (SecOps)

Security Operations (SecOps) is the practice of combining internal information security and IT operations practices to improve collaboration and reduce risks.

Aprender más sobre

Security Operations (SecOps)

Single Sign-On (SSO)

Single Sign-On (SSO) is an authentication method that lets users access multiple applications and services using a single set of login credentials. SSO can help businesses improve user satisfaction and productivity, strengthen access security, and reduce IT operations expense and complexity.

Aprender más sobre

Single Sign-On (SSO)

SOC 2

SOC 2 is a security compliance framework developed by the American Institute of Certified Public Accountants (AICPA) to securely manage customer data within the cloud.

Aprender más sobre

SOC 2

Social Engineering

Social engineering is a manipulation technique aimed at tricking individuals into revealing sensitive information

Aprender más sobre

Social Engineering

SWIFT Compliance

The Society of Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative founded in 1973 by members of the financial community with proprietary network.

Aprender más sobre

SWIFT Compliance

Synthetic Identity

Synthetic identity refers to a counterfeit identity formed by combining a mix of genuine and false information, blurring the line between physical and digital characteristics that identify a human being.

Aprender más sobre

Synthetic Identity

T

TEA (Time, Entitlements and Approvals)

TEA is a security concept that enhances access control by managing when, how much, and under what conditions users or systems can access resources.

Aprender más sobre

TEA (Time, Entitlements and Approvals)

Temporary Elevated Access Management

Temporary elevated access management (TEAM) access methodology helps organizations elevate privileges for human and non-human users in real time to provide granular access to an application or system in order to perform a necessary task.

Aprender más sobre

Temporary Elevated Access Management

Third-Party Access

Third-party access is the process of granting external vendors and service providers secure access to IT assets for maintenance, administration and management.

Aprender más sobre

Third-Party Access

U

User Behavior Analytics

User behavior analytics use AI and machine learning to analyze large datasets to identify security breaches, data exfiltration and other malicious activities.

Aprender más sobre

User Behavior Analytics

V

Virtual Directory

A virtual directory is an Identity and Access Management architectural component that gives identity consumers a consolidated and unified view of identity management information stored in multiple disparate data repositories.

Aprender más sobre

Virtual Directory

W

X

Y

Z

Confianza Cero

La confianza cero es un modelo estratégico de ciberseguridad diseñado para proteger los entornos de negocios digitales modernos. La confianza cero se basa en la creencia de que las organizaciones no deben confiar automáticamente en nada, ya sea fuera o dentro del perímetro de su red. Los modelos de confianza cero exigen que todo lo que intente conectarse a los sistemas de una organización debe verificarse para que se le conceda acceso.

Aprender más sobre

Confianza Cero

Zero Standing Privileges

Zero Standing Privileges (ZSP) is an identity security principle that advocates for the removal of all persistent privileges for users within an enterprise’s estate. Practically, Zero Standing Privileges is a progression from the concept of just-in-time access.

Aprender más sobre

Zero Standing Privileges