Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

California Consumer Privacy Act of 2018 (CCPA)

A law that gives California consumers more control over the personal information businesses collect about them.

capacity management

Capacity management's goal is to ensure that information technology resources are sufficient to meet upcoming business requirements cost-effectively. Fortra’s Vityl product line delivers capacity management solutions.

cloud access security broker (CASB)

A layer of security policy enforcement between enterprise users and cloud service providers. CASBs provide security for devices and applications. Fortra doesn’t offer a CASB but some of our products are used with them. 

cloud computing

This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as “the cloud.” Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.

cloud workload protection platform (CWPP)

Provides the capabilities needed to secure workloads deployed in private, public, or hybrid clouds. CWPP solutions are designed to secure the application and any associated cloud resource.

clustering

Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together to handle varying workloads or to provide continued operation in case one fails.

command and control (C2)

Used in context of red teaming security.

Common Vulnerabilities and Exposures (CVE)

A list of publicly known security vulnerabilities and exposures.

computer incident response team (CIRT)

This group is responsible for responding to security breaches, viruses and other potentially catastrophic incidents in enterprises that face significant security risks.

computer misuse detection system (CMDS)

A real-time audit reduction and analysis system that detects and deters computer misuse.

confidentiality, integrity, availability (CIA)

At the core of information security is data assurance, also known as the CIA triad or the three pillars of data security - the balanced protection of confidentiality, integrity, and availability of data without hampering organizational productivity.

Configuration Management Database (CMDB)

A file that contains all relevant information about the hardware and software components used in an organization's IT services and the relationships between those components.

content management system (CMS)

Software used to manage the creation and modification of digital content.

content security policy (CSP)

A computer security standard introduced to prevent cross-site scripting (XSS), clickjacking and other code injection attacks resulting from execution of malicious content in the trusted web page context.

continuous integration & continuous delivery (CI/CD)

Redhat definition - CI/CD is a method to frequently deliver apps to customers by introducing automation into the stage of app development

controlled unclassified information (CUI)

A term that applies to U.S. federal agencies that routinely generate, use, store, and share information that, while not classified, still requires some level of protection from unauthorized access and release.

credential theft

When a cybercriminal steals usernames and passwords with the intent of accessing sensitive information for financial gain.

critical infrastructure protection (CIP)

A concept that relates to the preparedness and response to serious incidents that involve the critical infrastructure of a region or nation.

customer relationship management (CRM)

The software system used to manage customer orders (e.g., Microsoft Dynamics 365 or Salesforce).

cyberattack

An attempt by hackers to damage or destroy a computer network or system, typically for financial gain.

cybersecurity

The combination of people, policies, processes, and technologies employed by an enterprise to protect its cyber assets.

Cybersecurity Maturity Model Certification (CMMC)

The U.S. Department of Defense’s unified standard for implementing cybersecurity across the defense industrial base (DIB), which includes over 300,000 companies in the supply chain.

cyberthreat protection (CTP)

In general, the solutions that defend systems and networks from cyberattack.