Security
Glossary of
A
ASM(Attack Surface Management)
Manage risks by regularly examining attack surfaces (vulnerabilities) of IT systems and applications owned by companies
B
BAS(Breach and Attack Simulation)
Technology that enables enterprises to continuously and consistently simulate attack cycles against their security infrastructure
C
CASB (Cloud Access Security Broker)
A tool that provides visualization/control of access status to cloud services and a service risk database
CDR(Cloud Detection and Response)
Detect and respond to security threats for various workloads on the cloud
CIAM(Customer Identity Access Management)
IAM technology for customer identity management, security, and providing a superior experience
CIEM(Cloud Infrastructure Entitlement Management)
Services and software for managing permissions in public clouds (AWS, GCP, Azure, etc.)
CSPM (Cloud Security Posture Management)
A security solution that automatically evaluates whether various settings are made in accordance with security policies in a cloud environment and monitors for any deficiencies.
CTEM(Continuous Threat Exposure Management)
Methods for companies to continuously monitor and manage cybersecurity risks
CWPP(Cloud Workload Protection Platform)
A security platform to protect your workloads in the cloud
E
EDR(Endpoint Detection and Response)
A security solution that appropriately detects and responds to cyberattacks on endpoints
H
HSM(Hardware Security Module)
A dedicated hardware security device used to protect sensitive data such as cryptographic keys and biometrics
I
IDaaS(Identity as a Service)
A cloud service that aggregates and manages logins for various services
IGA(Identity Governance and Administration)
A system that manages access rights within a company and realizes safe and efficient access
ITDR(Identity Threat Detection and Response)
From a security point of view, a system for detecting threats and fraudulent acts in the misuse of IDs such as credentials and responding quickly
M
MDR(Managed Detection and Response)
A service where security experts monitor, detect, and quickly respond to threats
N
NDR(Network Detection and Response)
Security technology that monitors traffic within a network, detects potential threats, and responds quickly
NGAV(Next-Generation Antivirus)
A new generation of antivirus that uses techniques like machine learning and AI to detect unknown malware
P
PAM(Privileged Access Management)
Solution for controlling access by privileged users
S
SASE(Secure Access Service Edge)
A service that comprehensively provides network and security functions on the cloud
SIEM (Security Information and Event Management)
A tool for integrated management of alerts and event logs output by endpoint products
SOAR (Security Orchestration, Automation and Response)
A tool that automates various tasks during security incident response
SSE(Secure Service Edge)
A service that provides security features for secure access to cloud applications and resources
SSPM (SaaS Security Posture Management)
A solution to manage the security posture of SaaS applications on the cloud
T
TDR(Threat Detection and Response)
How to prepare for security threats by comprehensively monitoring the attack surface
U
UEBA (User and Entity Behavior Analytics)
A tool that analyzes system behavior using machine learning technology, detects abnormal behavior, and issues warnings
V
VBOS(Vulnerability below the OS)
Vulnerabilities in layers below the OS that pose threats that are difficult to visualize and countermeasures for
X
XDR (eXtended Detection and Response)
A concept that cross-sectionally analyzes information from various sensors, improves visibility and detection, and protects organizations and companies
picture
enterprise browser
Web browser specialized for businesses
difference
Cyber Hygiene
Security measures to maintain the soundness of the IT environment by grasping the IT assets in the organization, visualizing and dealing with vulnerabilities
vinegar
Threat Hunting
A cybersecurity technique that seeks, tracks, and detects unknown threats that have bypassed known solutions and entered an organization's network.
debt
Anti-phishing
Protect your organization from phishing attacks, including employee training and technical measures
Unauthorized login countermeasures
A series of measures taken to enhance the security of online services and systems