Category: Device Trust

BYOD (Bring Your Own Device)

A policy that allows employees to use their personal devices to access web resources, necessitating SWG solutions ...

Continuous Authorization

As one of the core principles of zero trust, continuous authorization leverages real-time device posture and ...

Device Identity

Device Identity refers to the ability to uniquely identify a specific device, much as you would identify a user. ...

Device Inventory

A comprehensive list of devices within an organization's network, including details such as device types, serial ...

Device Manager

An Enterprise Device Manager (abbreviated EDM, and sometimes referred to as MDM or UEM) enables IT administrators ...

Device Posture Assessment

The process of evaluating and determining the security posture of a device, such as a computer, mobile device, or ...

Device Trust Scoring

Trust Scoring: The calculation of a device’s Trust Level by evaluating the Effect of each Trust Factor.

Endpoint Detection and Response (EDR)

EDR is endpoint security technology that continuously monitors end-user devices to detect and respond to cyber ...

Endpoint Protection

Security solutions and measures implemented to secure endpoints, such as computers, laptops, and mobile devices, ...

Endpoint Security

Security measures and tools implemented on individual devices, such as laptops, smartphones, or tablets, to ...

Firewall

A Firewall is a security mechanism that monitors and controls incoming and outgoing network traffic. It's often ...

Granular Trust Scoring

Granular Trust Scoring is a feature that allows Trust Factors to be assigned an Effect, used to evaluate ...