Category: InfoSec

Privilege Access Management (PAM)

Privileged Access Management (PAM) is a cybersecurity strategy to control, monitor, audit and safeguard all ...

Ransomware

Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s ...

REST API

A REST API (Representational State Transfer Application Progamming Interface and also known as a RESTful API) is ...

SaaS Application

A SaaS Application is a special type of Service that is NOT hosted in the customer environment. Instead, SaaS ...

Security Assertion Markup Language (SAML)

SAML (Security Assertion Markup Language) is an open standard for exchanging authentication and authorization data ...

Security Information & Event Management (SIEM)

Security Information & Event Management (SIEM) technology supports threat detection, compliance and security ...

Security Token

A Security Token is a peripheral device used to gain access to an electronically restricted resource. The token is ...

Software as a Service (SaaS)

Software as a service (SaaS) allows users to connect to and use cloud-based apps over the Internet. A cloud ...

SSL Certificates

Secure Sockets Layer (SSL) Certificates are small data files that digitally bind a cryptographic key to an ...