Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z.

Perimeter 81 Network Security Glossary
Networking

Single Sign-On (SSO)

Learn how to prevent your credentials from being compromised by malicious actors using Single sign-on (SSO) authentication. Find out how SSO works.
7 min read
Networking

What Is SAML?

80% of data breaches are caused by stolen credentials. Learn how to prevent identity theft within your organization by integrating the SAML open standard for more secure authentication.
7 min read
Networking

What is a Managed Service Provider (MSP)?

An MSP or Managed Service Provider is a third-party company that provides IT outsourcing services to other businesses. Curious to see how much an MSP can save your business? Read on.
7 min read
Networking

What is an Endpoint?

68% of organizations experienced at least one or more endpoint attacks. Learn how to secure your endpoints from malicious attacks.
16 min read
Network Security

What is Remote Work Security?

Access controls are responsible for determining who can access certain resources in an organization. Failure to restrict access can have great repercussions.
8 min read
Networking

ZTNA vs VPN

Contrary to VPN, ZTNA helps prevent attacks such as credential stuffing as it leverages the principle of least privilege (PoLP).
11 min read
Networking

Authentication vs. Authorization

Authentication verifies a user’s identity while authorization grants permissions to access resources. So, how exactly do they differ? Let’s have a closer look at both.
7 min read
Networking

VPN Passthrough

A VPN passthrough is a router feature that enables any device connected to allow VPN traffic to pass through that specific router or access a remote network.
6 min read
Networking

DDoS

There are 16 DDoS attacks per minute. Are your network resources safe? Learn how DDoS attacks work and to protect against them.
18 min read
Networking

Data Breach

There were 3,950 confirmed data breaches in 2020. Is your data really that safe? Learn how to take preventive measures against data breaches.
29 min read
Networking

SCIM

SCIM is the best system for managing identities in cloud-based applications and services and can help preventing identity theft.
14 min read
Networking

Secure Web Gateway

A single malware attack can cost your organization up to $2.5 million. Learn how to filter out threats with Secure Web Gateway (SWG).
14 min read
Networking

VPN

From hiding your identity to improving your Business security, learn how a VPN works and how to choose one.
33 min read
Networking

VPN Split Tunneling

The average cost of downtime is $5,600 per minute. Leverage split tunneling with Perimeter 81’s NaaS and secure your traffic controls.
14 min read
Compliance

HITRUST

HITRUST is a healthcare-driven industry organization that created and maintains the certifiable Common Security Framework (CSF).
19 min read
Compliance

GDPR

GDPR fines can wind up costing your organization up to $24 million dollars. Learn how to prevent hefty GDPR penalties and remain GDPR compliant
20 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Ready to Get Started?

Simplify your network security today.

Font Resize