Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z

Networking

VPN

From hiding your identity to improving your Business security, learn how a VPN works and how to choose one.

33 min read
Networking

VPN Split Tunneling

The average cost of downtime is $5,600 per minute. Leverage split tunneling with Perimeter 81’s NaaS and secure your traffic controls.

14 min read
Compliance

HITRUST

HITRUST is a healthcare-driven industry organization that created and maintains the certifiable Common Security Framework (CSF).

19 min read
Compliance

GDPR

GDPR fines can wind up costing your organization up to $24 million dollars. Learn how to prevent hefty GDPR penalties and remain GDPR compliant

20 min read
Cybersecurity

SIEM

The average cost of a malware attack on a company is $2.4 million. Learn how to prevent it by implementing a SIEM security strategy.

16 min read
Cybersecurity

Phishing

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around

20 min read
Cybersecurity

Ransomware

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around

21 min read
Cybersecurity

Malware

It is software designed to damage computer systems silently, the cost can be daunting (the record being $38 billion in damages).

23 min read
Cybersecurity

2FA

2FA adds an extra layer of security to online accounts by requiring you to verify your identity twice.

12 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Compliance

HIPAA

The HIPAA Act is a federal law that requires the creation of national standards in order to protect sensitive patient health information

15 min read
Network Security

SASE

With the SASE security model, organizations have the ability to identify users and devices and apply policy-based security.

20 min read
Network Security

WFH

WFH stands for “work from home,” or “working from home.” It is the new way of working post Covid-19 pandemic, leaving out the traditional office setting

14 min read
Network Security

OSI Model

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.

15 min read
Network Security

SSL

Unify security for user traffic to your organization’s resources, whether in the cloud or locally, with an SSL VPN solution from Perimeter 81.

6 min read
Network Security

IPSEC

An IPSec VPN solution is ideal for easily managing and customizing network access across cloud and local resources.

4 min read
Network Security

Business VPN

A Next-gen Business VPN simplifies the secure access to all your internal and cloud-based resources such as staging servers and company databases.

14 min read
Network Security

CASB

Cloud access security brokers (CASBs) are security policy enforcement points that ensure compliance and policies between cloud service customers and cloud service providers.

14 min read
Network Security

Zero Trust

Zero Trust provides employees with more secure access to resources, network, and applications based on user permissions, and authentication.

11 min read

Ready to Get Started?

Simplify your network security today.