Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

IBM i

IBM operating system (also known as iSeries, AS/400). For more details on IBM i terms visit the IBM online glossary.

identity and access management (IAM)

The policies, programs, and technologies that reduce identity-related access risks within a business by managing digital identities and user access to data, systems, and resources. 

identity management (IDM)

Identity management involves handling the characteristics of a user, a group of users, or another identity that might need access sometimes. Access management is about looking at these characteristics using the rules in place and deciding whether they should be allowed access. Identity management is also commonly known as IDM.

incident response plan (IRP)

An Incident Response Plan is a written document, formally approved by the senior leadership team, that helps your organization before, during, and after a confirmed or suspected security incident.

indicators of compromise (IOC)

Pieces of forensic data, such as data found in system log entries or files, that identify potentially malicious activity on a system or network.

information rights management (IRM)

Information rights management is a subset of digital rights management technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or enterprise digital rights.

information security management system (ISMS)

An information security management system (ISMS) is a bunch of rules and steps an organization follows to take care of its essential information. An information security management system’s main aim is to ensure that risks are kept low and that the business keeps running smoothly, even if there’s a security problem. It is also commonly known as ISMS.

information technology (IT)

The general term for the use of systems (especially computers and telecommunications) for storing, retrieving, and sending information.

infrastructure as a service (IaaS)

A form of cloud computing that provides virtual computing resources such as storage, networking, and other capabilities over the internet.

infrastructure protection (IP)

Infrastructure protection pertains to the security of critical business application infrastructure and protecting technology, systems, and business assets. Infrastructure protection (IP) is also used internally in Fortra to define the IT Infrastructure Protection business unit encompassing Fortra's Core Security, Cobalt Strike, Digital Defense, Beyond Security, and Outflank product lines.

intellectual property (IP)

A work or invention that is the result of creativity, such as a manuscript or a design, to which one has rights and for which one may apply for a patent, copyright, trademark, etc.

internal penetration testing (IPT)

An internal network pen test is performed to help gauge what an attacker could achieve with initial access to a network. An internal network pen test can mirror insider threats, such as employees intentionally or unintentionally performing malicious actions.

International Organization for Standardization (ISO)

A voluntary, nontreaty organization established in 1949, as a technical agency of the United Nations, to promote international standardization in a broad range of industries.

International Traffic in Arms Regulations (ITAR)

The U.S. regulation that requires companies that manufacture, sell, or distribute defense articles or services to comply with the regulations as defined in the United States Munitions List (USML). The goal is to restrict and control the export of military technologies.

internet content adaption protocol (ICAP)

A lightweight protocol Fortra uses to enable organizations to inspect content for sensitive information, malware, or even high-risk executables that pose a threat to data in Managed File Transfer or Secure ICAP Gateway (SIG) scenarios.

internet of things (IoT)

The network of physical objects that contain embedded technology to communicate and sense or interact with their internal states or the external environment.

intrusion detection and prevention

Intrusion detection and intrusion prevention. Intrusion detection and prevention are two broad terms describing application security practices used to mitigate attacks and block new threats. The first is a reactive measure that identifies and mitigates ongoing attacks using an intrusion detection system.

intrusion detection system (IDS)

An IDS, also known as an intrusion detection system, is a software or physical device that monitors activity to detect any signs of unauthorized access. When it detects a potential intrusion, it alerts a central security system that keeps track of security events and information.

intrusion prevention system (IPS)

Intrusion prevention systems are network security solutions that examine a network for illegitimate access. If it discovers a possible intrusion, it prevents the intruder from moving further into the network or removes them completely. Intrusion prevention systems can come in the form of physical devices or software applications. They are also referred to as IPS.