Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z.

Perimeter 81 Network Security Glossary
Network Security

What is URL Filtering?

With Perimeter 81’s Malware Protection you can protect your users and resources from Internet-borne threats.
8 min read
Network Security

What is Web Filtering?

With Perimeter 81’s Malware Protection you can protect your users and resources from Internet-borne threats.
7 min read
Network Security

Malware Protection

With Perimeter 81’s Malware Protection you can protect your users and resources from Internet-borne threats.
3 min read
Networking

What is Lateral Movement?

Discover the 3 main stages of a lateral movement and how you can detect lateral movement techniques within your network.
4 min read
Networking

What is MFA?

Learn how Multi-Factor Authentication (MFA) can prevent compromised credentials that lead to massive data breaches.
6 min read
Networking

What is ZTNA?

Discover the benefits of Zero Trust Network Access (ZTNA) and how it outperforms legacy VPNs in securing the new hybrid workplace.
6 min read
Networking

Agent vs Agentless Security

Deciding between agent or agentless security? Discover the advantages and disadvantages of both agent types and which is the right fit for your business.
3 min read
Networking

What Is Encryption?

Are your apps and cloud resources as secure as you think? Learn how encryption works and how it can help prevent phishing attacks within your organization.
11 min read
Networking

Single Sign-On (SSO)

Learn how to prevent your credentials from being compromised by malicious actors using Single sign-on (SSO) authentication. Find out how SSO works.
7 min read
Networking

What Is SAML?

80% of data breaches are caused by stolen credentials. Learn how to prevent identity theft within your organization by integrating the SAML open standard for more secure authentication.
7 min read
Networking

What is a Managed Service Provider (MSP)?

An MSP or Managed Service Provider is a third-party company that provides IT outsourcing services to other businesses. Curious to see how much an MSP can save your business? Read on.
7 min read
Networking

What is an Endpoint?

68% of organizations experienced at least one or more endpoint attacks. Learn how to secure your endpoints from malicious attacks.
16 min read
Network Security

What is Remote Work Security?

Access controls are responsible for determining who can access certain resources in an organization. Failure to restrict access can have great repercussions.
8 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Ready to Get Started?

Simplify your network security today.