Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

electronic data interchange (EDI)

A flat file format that B2B trading partners use to send and receive business transactions. Both parties must agree on a transaction set before files are exchanged. Each transaction set corresponds with a number and type of document.

email security

Solutions that comprise all the technology and policies designed to protect email content and communications against cyberattacks. Fortra’s Agari, PhishLabs, and Clearswift product lines deliver email security solutions.  

email spam

Unsolicited junk mail sent in bulk to mass audiences, often with the purpose of spreading viruses or getting recipients to take an action that is harmful.

email spoofing

When a fraudster forges an email header ‘From’ address to make it appear as if it was sent by someone else, usually a known contact like a high-level executive or trusted outside vendor.

encryption

A method of encoding data to make it unusable or unreadable until it’s decrypted by an authorized party with keys (symmetric or asymmetric) which can read or access the data.

end user (n.) end-user (adj.)

The person using a software application as part of their daily job.

endpoint detection and response (EDR)

An integrated endpoint security solution that combines real-time continuous monitoring and collection of endpoint data with rules-based automated response and analysis capabilities.

endpoint protection platform (EPP)

A solution deployed on endpoint devices to prevent file-based malware attacks, detect malicious activity, and provide the investigation and remediation capabilities needed to respond to dynamic security incidents and alerts.

extended detection & response (XDR)

SaaS capabilities that integrate and simplify security solutions into a holistic approach to protect endpoints, servers, email, and other corporate IT infrastructure.

external penetration testing

Also known as an external network pen test, it is designed to test the effectiveness of perimeter security controls to prevent and detect attacks as well as identifying weaknesses in internet-facing assets such as web, mail and FTP servers.