Zero Trust Network Access (ZTNA)

ZTNA is a service involving the creation of an identity and context-based, logical access boundary around an application or set of applications.

Web Application Firewall (WAF)

WAF is a type of network, host, or cloud-based firewall placed between an application and the Internet to protect against malicious traffic, and other common web attacks that typically target sensitive application data.

URL Filtering or Web Filtering

URL Filtering or Web Filtering is technology that restricts which websites a user or browser can visit on their computer, typically filtering out known malicious or vulnerable websites.

Threat Intelligence

Threat Intelligence is information on current security threats, vulnerabilities, targets, bad-actors, and implications that can be used to inform security decisions.

Single Sign On (SSO)

SSO is a method of authentication that enables users to authenticate securely with multiple applications and websites without logging into each one individually. This involves a trust relationship set up between an application, known as the service provider, and an identity provider.

Sender Policy Framework (SPF)

SPF is an email authentication method that is used to prevent unauthorised individuals from sending email messages from your domain, and generally helps to protect email users and recipients from spam and other potentially dangerous emails.

Security Orchestration, Automation, and Response (SOAR)

SOAR is technology used to automatically streamline and prioritise cyber security alerts from a collection of sources, including endpoints and applications (similar to a Security Information andEvent Monitoring solution) but offers enhanced automated response and improved prediction techniques.

Security Operations Centre (SOC)

SOC is a centralised function involving people, processes, and technology designed to continuously monitor, detect, prevent, analyse, and respond to cyber security incidents.

Security Information and Event Monitoring (SIEM)

SIEM is technology and related services that provide realtime analysis of cyber security alerts from a collection of sources, including endpoints and applications to allow for improved detection, compliance enforcement, and incident management.