Perimeter 81 Network Security Glossary

From Application Access to Zero Trust, our glossary has your network and information security terms covered from A-Z.

Perimeter 81 Network Security Glossary
Networking

What is Lateral Movement?

Discover the 3 main stages of a lateral movement and how you can detect lateral movement techniques within your network.
4 min read
Networking

What is MFA?

Learn how Multi-Factor Authentication (MFA) can prevent compromised credentials that lead to massive data breaches.
6 min read
Networking

What is ZTNA?

Discover the benefits of Zero Trust Network Access (ZTNA) and how it outperforms legacy VPNs in securing the new hybrid workplace.
6 min read
Networking

Agent vs Agentless Security

Deciding between agent or agentless security? Discover the advantages and disadvantages of both agent types and which is the right fit for your business.
3 min read
Networking

What Is Encryption?

Are your apps and cloud resources as secure as you think? Learn how encryption works and how it can help prevent phishing attacks within your organization.
11 min read
Networking

Single Sign-On (SSO)

Learn how to prevent your credentials from being compromised by malicious actors using Single sign-on (SSO) authentication. Find out how SSO works.
7 min read
Networking

What Is SAML?

80% of data breaches are caused by stolen credentials. Learn how to prevent identity theft within your organization by integrating the SAML open standard for more secure authentication.
7 min read
Networking

What is a Managed Service Provider (MSP)?

An MSP or Managed Service Provider is a third-party company that provides IT outsourcing services to other businesses. Curious to see how much an MSP can save your business? Read on.
7 min read
Networking

What is an Endpoint?

68% of organizations experienced at least one or more endpoint attacks. Learn how to secure your endpoints from malicious attacks.
16 min read
Network Security

What is Remote Work Security?

Access controls are responsible for determining who can access certain resources in an organization. Failure to restrict access can have great repercussions.
8 min read
Networking

ZTNA vs VPN

Contrary to VPN, ZTNA helps prevent attacks such as credential stuffing as it leverages the principle of least privilege (PoLP).
11 min read
Networking

Authentication vs. Authorization

Authentication verifies a user’s identity while authorization grants permissions to access resources. So, how exactly do they differ? Let’s have a closer look at both.
7 min read
Networking

VPN Passthrough

A VPN passthrough is a router feature that enables any device connected to allow VPN traffic to pass through that specific router or access a remote network.
6 min read
Networking

DDoS

There are 16 DDoS attacks per minute. Are your network resources safe? Learn how DDoS attacks work and to protect against them.
18 min read

Amit Bakeret

CEO and Founder

What is SASE (Secure Access Service Edge)?

The Secure Access Service Edge (SASE) model allows IT security teams to easily connect and secure all of their organization’s networks and users in an agile, cost-effective and scalable way.

6 min watch

Ready to Get Started?

Simplify your network security today.