Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z

Cybersecurity

Phishing

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around

20 min read
Cybersecurity

Ransomware

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around

21 min read
Cybersecurity

Malware

It is software designed to damage computer systems silently, the cost can be daunting (the record being $38 billion in damages).

23 min read
Cybersecurity

2FA

2FA adds an extra layer of security to online accounts by requiring you to verify your identity twice.

12 min read
Compliance

HIPAA

The HIPAA Act is a federal law that requires the creation of national standards in order to protect sensitive patient health information

15 min read
Network Security

SASE

With the SASE security model, organizations have the ability to identify users and devices and apply policy-based security.

20 min read
Network Security

WFH

WFH stands for “work from home,” or “working from home.” It is the new way of working post Covid-19 pandemic, leaving out the traditional office setting

14 min read
Network Security

OSI Model

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.

15 min read
Network Security

SSL

Unify security for user traffic to your organization’s resources, whether in the cloud or locally, with an SSL VPN solution from Perimeter 81.

6 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Network Security

IPSEC

An IPSec VPN solution is ideal for easily managing and customizing network access across cloud and local resources.

4 min read
Network Security

Business VPN

A Next-gen Business VPN simplifies the secure access to all your internal and cloud-based resources such as staging servers and company databases.

14 min read
Network Security

CASB

Cloud access security brokers (CASBs) are security policy enforcement points that ensure compliance and policies between cloud service customers and cloud service providers.

3 min read
Network Security

Zero Trust

Zero Trust provides employees with more secure access to resources, network, and applications based on user permissions, and authentication.

11 min read
Network Security

DevSecOps

DevSecOps addresses security issues early on in the development life cycle by adding the missing security and team collaboration components.

16 min read
Networking

Virtual Desktop Infrastructure

Virtual desktop infrastructure is crucial for enabling on-demand remote resource access, and Perimeter 81 helps make this idea safer and faster than ever.

9 min read
Network Security

Always On VPN

Easily integrate a unified security solution across your organization’s cloud-hybrid network, with the Perimeter 81’s Always On VPN solution.

5 min read
Network Security

IT Infrastructure Security

The components of your organization’s IT infrastructure, including software, facilities and other network pieces, are more easily managed and secured with Perimeter 81.

9 min read
Networking

Remote Desktop Protocol

Easily integrate a Remote Desktop Protocol solution across your organization’s cloud-hybrid network, with the Perimeter 81 RDP.

10 min read

Ready to Get Started?

Simplify your network security today.