Category: Network Security

Banyan Threat Protection

Banyan Threat Protection is a section within the ITP Policy page, in which an admin can block threats from end ...

Baseline Configuration

A predefined and standardized set of configuration settings that represents a secure and compliant state for a ...

Bastion Host

Bastion Host is a special-purpose internet-accessible server that accepts SSH connections for the purpose of ...

Breach

An impermissible use, access, acquisition, or disclosure of PHI, as defined by HIPAA. Breaches must be reported ...

Brute Force Attack

A method of gaining unauthorized access to a system or account by systematically attempting all possible password ...

Buffer Overflow

A vulnerability that occurs when a program writes data beyond the boundaries of a buffer, allowing an attacker to ...

Business Associate

A person or organization that performs certain functions or activities on behalf of a covered entity, involving ...

BYOD (Bring Your Own Device)

A policy that allows employees to use their personal devices to access web resources, necessitating SWG solutions ...

Cardholder Data

Any personally identifiable information associated with a payment cardholder, including the primary account number ...

Cardholder Data Environment (CDE)

The network or systems that store, process, or transmit cardholder data during payment card transactions.

Chain of Custody

The chronological documentation of the custody, control, and handling of digital evidence from the time of ...

Cloud Migration

Cloud Migration refers to the process of moving an organization's data, applications, workloads, and IT resources ...