Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z

Networking

DDoS

There are 16 DDoS attacks per minute. Are your network resources safe? Learn how DDoS attacks work and to protect against them.
18 min read
Networking

Data Breach

There were 3,950 confirmed data breaches in 2020. Is your data really that safe? Learn how to take preventive measures against data breaches.
29 min read
Networking

SCIM

SCIM is the best system for managing identities in cloud-based applications and services and can help preventing identity theft.
14 min read
Networking

Secure Web Gateway

A single malware attack can cost your organization up to $2.5 million. Learn how to filter out threats with Secure Web Gateway (SWG).
14 min read
Networking

VPN

From hiding your identity to improving your Business security, learn how a VPN works and how to choose one.
33 min read
Networking

VPN Split Tunneling

The average cost of downtime is $5,600 per minute. Leverage split tunneling with Perimeter 81’s NaaS and secure your traffic controls.
14 min read
Compliance

HITRUST

HITRUST is a healthcare-driven industry organization that created and maintains the certifiable Common Security Framework (CSF).
19 min read
Compliance

GDPR

GDPR fines can wind up costing your organization up to $24 million dollars. Learn how to prevent hefty GDPR penalties and remain GDPR compliant
20 min read
Cybersecurity

SIEM

The average cost of a malware attack on a company is $2.4 million. Learn how to prevent it by implementing a SIEM security strategy.
16 min read
Cybersecurity

Phishing

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around
20 min read
Cybersecurity

Ransomware

Ransomware allows hackers to commit cyber blackmail and is currently one of the most sabotaging forms of malware around
21 min read
Cybersecurity

Malware

It is software designed to damage computer systems silently, the cost can be daunting (the record being $38 billion in damages).
23 min read
Cybersecurity

2FA

2FA adds an extra layer of security to online accounts by requiring you to verify your identity twice.
12 min read
Compliance

HIPAA

The HIPAA Act is a federal law that requires the creation of national standards in order to protect sensitive patient health information
15 min read
Network Security

SASE

With the SASE security model, organizations have the ability to identify users and devices and apply policy-based security.
20 min read
Network Security

WFH

WFH stands for “work from home,” or “working from home.” It is the new way of working post Covid-19 pandemic, leaving out the traditional office setting
14 min read
Network Security

OSI Model

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system.
15 min read
Network Security

SSL

Unify security for user traffic to your organization’s resources, whether in the cloud or locally, with an SSL VPN solution from Perimeter 81.
6 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Ready to Get Started?

Simplify your network security today.