Security
Glossary of

  • a
  • stomach
  • cormorant
  • picture
  • oh
  • mosquito
  • tree
  • nine
  • hair
  • child
  • na
  • To
  • Nu
  • hey
  • of
  • teeth
  • fire
  • debt
  • fart
  • Ho
  • devil
  • fruit
  • nothing
  • eye
  • and
  • or
  • hot water
  • world
  • circle
  • of

A

ASM(Attack Surface Management)

Manage risks by regularly examining attack surfaces (vulnerabilities) of IT systems and applications owned by companies

B

BAS(Breach and Attack Simulation)

Technology that enables enterprises to continuously and consistently simulate attack cycles against their security infrastructure

C

CASB (Cloud Access Security Broker)

A tool that provides visualization/control of access status to cloud services and a service risk database

CDR(Cloud Detection and Response)

Detect and respond to security threats for various workloads on the cloud

CIAM(Customer Identity Access Management)

IAM technology for customer identity management, security, and providing a superior experience

CIEM(Cloud Infrastructure Entitlement Management)

Services and software for managing permissions in public clouds (AWS, GCP, Azure, etc.)

CSPM (Cloud Security Posture Management)

A security solution that automatically evaluates whether various settings are made in accordance with security policies in a cloud environment and monitors for any deficiencies.

CTEM(Continuous Threat Exposure Management)

Methods for companies to continuously monitor and manage cybersecurity risks

CWPP(Cloud Workload Protection Platform)

A security platform to protect your workloads in the cloud

E

EDR(Endpoint Detection and Response)

A security solution that appropriately detects and responds to cyberattacks on endpoints

H

HSM(Hardware Security Module)

A dedicated hardware security device used to protect sensitive data such as cryptographic keys and biometrics

I

IDaaS(Identity as a Service)

A cloud service that aggregates and manages logins for various services

IGA(Identity Governance and Administration)

A system that manages access rights within a company and realizes safe and efficient access

ITDR(Identity Threat Detection and Response)

From a security point of view, a system for detecting threats and fraudulent acts in the misuse of IDs such as credentials and responding quickly

M

MDR(Managed Detection and Response)

A service where security experts monitor, detect, and quickly respond to threats

N

NDR(Network Detection and Response)

Security technology that monitors traffic within a network, detects potential threats, and responds quickly

NGAV(Next-Generation Antivirus)

A new generation of antivirus that uses techniques like machine learning and AI to detect unknown malware

P

PAM(Privileged Access Management)

Solution for controlling access by privileged users

S

SASE(Secure Access Service Edge)

A service that comprehensively provides network and security functions on the cloud

SIEM (Security Information and Event Management)

A tool for integrated management of alerts and event logs output by endpoint products

SOAR (Security Orchestration, Automation and Response)

A tool that automates various tasks during security incident response

SSE(Secure Service Edge)

A service that provides security features for secure access to cloud applications and resources

SSPM (SaaS Security Posture Management)

A solution to manage the security posture of SaaS applications on the cloud

T

TDR(Threat Detection and Response)

How to prepare for security threats by comprehensively monitoring the attack surface

U

UEBA (User and Entity Behavior Analytics)

A tool that analyzes system behavior using machine learning technology, detects abnormal behavior, and issues warnings

V

VBOS(Vulnerability below the OS)

Vulnerabilities in layers below the OS that pose threats that are difficult to visualize and countermeasures for

X

XDR (eXtended Detection and Response)

A concept that cross-sectionally analyzes information from various sensors, improves visibility and detection, and protects organizations and companies

picture

enterprise browser

Web browser specialized for businesses

difference

Cyber Hygiene

Security measures to maintain the soundness of the IT environment by grasping the IT assets in the organization, visualizing and dealing with vulnerabilities

vinegar

Threat Hunting

A cybersecurity technique that seeks, tracks, and detects unknown threats that have bypassed known solutions and entered an organization's network.

debt

Anti-phishing

Protect your organization from phishing attacks, including employee training and technical measures

Unauthorized login countermeasures

A series of measures taken to enhance the security of online services and systems