Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

data access governance (DAG)

An auditing, compliance, and governance framework for unstructured data and critical applications that provides comprehensive data collection, analysis, categorization and remediation workflows, and reporting.

data classification (DC)

This industry term refers to securing sensitive data against accidental and inadvertent loss. Fortra’s Titus and Boldon James product lines deliver data classification solutions.    

data exfiltration

The unauthorized removal of data from a dataset. Fortra’s Clearswift product line delivers Data Loss Prevention solutions. See also DLP.

data loss prevention (DLP)

A set of tools and processes used to ensure sensitive data is not lost, misused, or accessed by unauthorized users. Fortra’s Clearswift and Digital Guardian product lines deliver Data Loss Prevention solutions.

decryption

The process of taking encoded or encrypted text or other data and converting it back into text that a human or the computer can read and understand.

demilitarized zone (DMZ)

In IT, this is the neutral network that resides between a company’s private network and the internet containing potential dangers.

deprovisioning (DEPO)

Deprovisioning means removing a user’s ability to use programs, systems, and information in a network. It is the opposite of provisioning, which gives access to these things. Both actions are part of managing the cycle of a user’s time in a system, like when they start or stop using it or when their job changes in a company. Deprovisioning is essential for security because it helps keep important data safe within the organization. It is also commonly known as DEPO.

DevOps

A change in IT culture, focusing on rapid IT service delivery through the adoption of Agile, lean practices in the context of a system-oriented approach.

digital rights management (DRM)

A broad term that describes how organizations control the publication and use of digital assets. Fortra’s Vera provides a digital rights management solution.

digital risk protection (DRP)

An operational process that combines intelligence, detection, and response to mitigate attacks across the external digital risk landscape.

distributed denial of service (DDoS)

A common form of cyberattack that disrupts the normal functioning of a website, often targeting government, retail, financial, or media organizations.

document management (DM)

The process of electronically capturing, managing, and distributing documents and forms on-premises or in the cloud. Fortra’s Document Management product line helps organizations go paperless with document solutions that automate key business processes.

domain-based message authentication, reporting, and conformance (DMARC)

An email authentication protocol used to prevent spoofing. 

domainkeys identified mail (DKIM)

A technique that uses a domain name to digitally “sign” emails, so recipients are confident in the sender and know the message hasn’t been altered in transit.

dynamic application security testing (DAST)

A procedure that actively investigates running applications with penetration tests to detect possible security vulnerabilities.