CyberArk 詞彙表

網路資安領域的技術詞彙及行業流行用語多不勝數。《CyberArk詞彙表》供您查找各種複雜術語,定義簡單易懂,資源便於查詢,助您進一步探索研究。

A

Access Certification

Access Certification facilitates the review of a user’s access privileges and requires a third-party to certify that the access should continue to be granted for a designated period of time.

深入瞭解

Access Certification

Access Discovery

Access discovery provides administrators with a clear picture of who has access to what applications, resources or privileges across the organization.

深入瞭解

Access Discovery

Access Management

Access management solutions are used by businesses to authenticate, authorize and audit access to on-premises and cloud-based applications and IT systems.

深入瞭解

Access Management

ACME Protocol

The ACME Protocol (Automated Certificate Management Environment) automates the issuing and validating domain ownership of certificates, enabling the seamless deployment of PKI with no need for manual intervention.

深入瞭解

ACME Protocol

Active Directory (AD)

Active Directory (AD) is Microsoft’s directory and identity management service for Windows domain networks. AD is used for user authentication and authorization by a variety of Microsoft solutions like Exchange Server and SharePoint Server, as well as third-party applications and services.

深入瞭解

Active Directory (AD)

Adaptive Multi-Factor Authentication (MFA)

Adaptive MFA is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use Adaptive Authentication to balance security requirements with the user experience.

深入瞭解

Adaptive Multi-Factor Authentication (MFA)

Advanced Persistent Malware

Increasingly, malware is being designed specifically to steal SSL/TLS keys and certificates for use in communications fraud and data exfiltration.

深入瞭解

Advanced Persistent Malware

Agentic AI (and AI Agents)

Agentic AI systems perform advanced functions such as independently executing decisions and automating actions, accelerating innovation and driving efficiency. With complex architectures and autonomous applications having more human-like behaviors, Agentic AI demands clear process and robust security frameworks to ensure safe adoption.

深入瞭解

Agentic AI (and AI Agents)

Application (App) Gateway

An app gateway is an enterprise security solution that lets users access traditional web applications hosted in corporate data centers using the same logon credentials and methods they use to access mobile apps and cloud services.

深入瞭解

Application (App) Gateway

Attacker Encrypted Communications

Attackers use encrypted communications to bypass security, deliver malware, and steal data. Learn how to mitigate and protect against encrypted threats.

深入瞭解

Attacker Encrypted Communications

Authentication Authorization

Authentication and Authorization solutions positively validate a user’s identify and grant permission to access applications and IT systems once verified.

深入瞭解

Authentication Authorization

B

Bot Security

Bots automate and supplement human workflows helping organizations improve business agility, reduce costs and risks, and free up staff for higher value tasks.

深入瞭解

Bot Security

C

Cert-manager

cert-manager automates certificate issuance and renewal in Kubernetes, secures machine identities, reduces outages, and enables Zero Trust and DevSecOps.

深入瞭解

Cert-manager

Certificate Authority

Certificate Authorities help verify entities and manage the lifecycle of digital certificates to ensure secure communications and prevent identity fraud.

深入瞭解

Certificate Authority

Certificate Chain of Trust

What is a certificate chain, what are the 3 key components, and how do certificate chains work? Learn all this, plus how to troubleshoot common issues!

深入瞭解

Certificate Chain of Trust

Certificate Enrollment

Certificate enrollment refers to the process by which a user requests a digital certificate to use as a machine identity on a public-facing system, application, API, container or cluster.

深入瞭解

Certificate Enrollment

Certificate Management

Ensure security, prevent outages, and streamline SSL management with automated certificate management. Optimize your infrastructure today!

深入瞭解

Certificate Management

Certificate Pinning

Certificate pinning strengthens security by blocking unauthorized connections and preventing MITM attacks. Learn how it works and best practices today!

深入瞭解

Certificate Pinning

Certificate Validation

Certificate validation and verification is the process a web browser performs to ensure a certificate can be trusted.

深入瞭解

Certificate Validation

CI/CD Pipeline

A CI/CD pipeline is a collection of tools used by developers and test engineers throughout the continuous software development, delivery and deployment lifecycle.

深入瞭解

CI/CD Pipeline

CISA Secure Software Development Attestation Form (SSDA)

The Secure Software Development Attestation Form is a requirement introduced by the Cybersecurity and Infrastructure Security Agency with OMB collaboration.

深入瞭解

CISA Secure Software Development Attestation Form (SSDA)

Cloud IAM Permissions

Cloud identity and access management (IAM) permissions let IT and security organizations control access to the resources in their cloud environments.

深入瞭解

Cloud IAM Permissions

Cloud Identity Security

Cloud identity security is the practice of implementing identity security controls to secure human and machine identities in hybrid and multi-cloud environments. Cloud migration and digital transformation have become commonplace for many modern enterprises

深入瞭解

Cloud Identity Security

Cloud Infrastructure Entitlements Management (CIEM)

Sometimes referred to as Cloud Entitlements Management solutions or Cloud Permissions Management solutions, CIEM solutions apply the Principle of Least Privilege access to cloud infrastructure and services, helping organizations defend against data breaches, malicious attacks and other risks posed by excessive cloud permissions.

深入瞭解

Cloud Infrastructure Entitlements Management (CIEM)

Cloud Security 雲端安全

雲端安全是指保護以雲端為基礎的應用程式、資料及虛擬基礎設施之完整性的做法。雲端安全包括所有雲端部署模型(公共雲、私有雲、混合雲、多雲)以及各類以雲端為基礎的服務及隨選解決方案(IaaS、PaaS、SaaS)。

深入瞭解

Cloud Security 雲端安全

Code Signing

Discover what is code signing, how code signing works, and how machine identity security protects your code signing credentials from cybercriminals.

深入瞭解

Code Signing

Containers

From physical servers to virtualization and now containers, see how application deployment has evolved for better efficiency, scalability, and portability.

深入瞭解

Containers

Customer Identity and Access Management (CIAM)

CIAM solutions control access to public websites and digital properties, making it easy for customers to sign up and log on to online applications and services.

深入瞭解

Customer Identity and Access Management (CIAM)

Cyber Insurance

Businesses purchase cyber insurance (also known as cybersecurity insurance) to mitigate financial loss due to cyber attacks and data breaches.

深入瞭解

Cyber Insurance

D

Data Breach 資料外洩

資料外洩是一種安全事件,因惡意內部人員或外部攻擊者未經授權擅自存取機密資料或敏感資訊(例如病歷、財務資訊或個人識別資訊(PII))而引起。資料外洩是最常見且代價最高的網路資安事件之一。

深入瞭解

Data Breach 資料外洩

Data Sovereignty

Data sovereignty is the ability of enterprises to safeguard and have full control over the personally identifiable information (PII) of any citizen or permanent resident of the country in which it operates.

深入瞭解

Data Sovereignty

Defense-in-Depth

A defense-in-depth strategy, aka a security-in-depth strategy, refers to a cybersecurity approach that uses multiple layers of security for holistic protection.

深入瞭解

Defense-in-Depth

DevOps Security 開發維運安全

開發維運(DevOps)一詞形容將軟體開發(Dev)與IT營運(Ops)結合起來並提高組織快速交付應用程式與服務之能力的一系列文化概念、實踐做法及工具。開發維運會帶來新的風險及文化變化,進而產生傳統安全管理解決方案與實踐做法通常無法解決的安全挑戰。

深入瞭解

DevOps Security 開發維運安全

DevOps with AWS vs. Azure

Is AWS or Azure the best DevOps cloud solution for you? Compare pipelines as code, code building tools, and Azure vs. AWS code deploy to find out!

深入瞭解

DevOps with AWS vs. Azure

Digital Certificates

Discover the types, uses, and validity of digital certificates. Understand their role in authentication, security, and software trust across desktop and mobile.

深入瞭解

Digital Certificates

Digital Signature Algorithm (DSA)

The Digital Signature Algorithm is a Federal Information Processing Standard for digital signatures. It facilitates the authentication of digital messages or documents by ensuring that signatures are valid and unaltered.

深入瞭解

Digital Signature Algorithm (DSA)

Digital Transformation

Digital transformation refers to the process of integrating digital technology into various aspects of an organization to fundamentally change how it operates and delivers value to its customers or stakeholders.

深入瞭解

Digital Transformation

Directory Services

A directory service is a common data repository for maintaining information about network users and resources as part of their Identity Security strategy.

深入瞭解

Directory Services

DNS Traffic Blocking

DNS traffic blocking is a network management process that prevents access to specific websites or internet services based on their domain names.

深入瞭解

DNS Traffic Blocking

DORA Act

The Digital Operational Resilience Act (DORA) Act, is a regulatory framework established by the European Union to fortify the financial sector against ICT threats.

深入瞭解

DORA Act

Downgrade Attacks

A TLS downgrade attack tricks the client and server into using older protocols or insecure parameters for encrypting the information in transit.

深入瞭解

Downgrade Attacks

E

Endpoint Security 終端安全

終端安全是指保護企業網路免受來自本地端或遠端裝置之威脅的實踐做法。終端是可藉以進入公司資產及應用程式的裝置,這些裝置是潛在的網路資安漏洞。

深入瞭解

Endpoint Security 終端安全

Enterprise Browser

An enterprise browser is a dedicated, corporate web browser designed to give enterprises enhanced security and control over how the browser functions while ensuring a seamless browsing experience for employees

深入瞭解

Enterprise Browser

F

FedRAMP Authorization

Federal Risk and Authorization Management Program (FedRAMP) is a United States government-wide program that standardizes the security assessment, authorization and continuous monitoring of cloud products and services.

深入瞭解

FedRAMP Authorization

FIDO2

FIDO2 is an open authentication standard developed by the FIDO Alliance, an organization with the mission to develop open, scalable authentication standards.

深入瞭解

FIDO2

Field-Level Encryption

Field Level Encryption (FLE) allows a developer to selectively encrypt individual fields of a document on the client-side before it is sent to the server—keeping the encrypted data private from the providers hosting or anyone accessing the database. 

深入瞭解

Field-Level Encryption

G

H

Healthcare Cybersecurity

Healthcare cybersecurity protects organizations from cyber attacks and ensures availability of medical services, integrity of patient data, and compliance.

深入瞭解

Healthcare Cybersecurity

Homomorphic Encryption

Learn how homomorphic encryption enables computations on encrypted data, preserving privacy while allowing secure data analysis in cloud storage.

深入瞭解

Homomorphic Encryption

I

Identity and Access Management (IAM)

Identity and Access Management (IAM) solutions enable administration of user identities and control of access to enterprise resources. IAM solutions ensure the right individuals have access to the right IT resources, for the right reasons, at the right time.

深入瞭解

Identity and Access Management (IAM)

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is an Identity and Access Management solution delivered in the form of a cloud-based service hosted and managed by a trusted third party. An IDaaS offering combines all the functions and benefits of an enterprise-class IAM solution with all the economic and operational advantages of a cloud-based service.

深入瞭解

Identity as a Service (IDaaS)

Identity Governance and Administration (IGA)

Identity Governance and Administration (IGA) solutions efficiently manage digital identities and access rights across diverse systems and are used by corporate information security, risk management, compliance teams and IT organizations.

深入瞭解

Identity Governance and Administration (IGA)

Identity Lifecycle Management

Identity lifecycle management refers to the process of managing the user identities and evolving access privileges of employees and contractors throughout their tenure—from day one through separation.

深入瞭解

Identity Lifecycle Management

Identity Orchestration

Learn everything you need to know identity orchestration and how it automates identity management workflows without writing custom codes or scripts.

深入瞭解

Identity Orchestration

Identity Security

Identity Security is a comprehensive solution for securing all identities– human or machine – throughout the cycle of accessing critical assets.

深入瞭解

Identity Security

Identity Threat Detection and Response (ITDR)

Identity Threat Detection and Response (ITDR) is a security discipline consisting of cyber threat intelligence, behavior analysis, tools and structured processes to enhance identity infrastructure security and accelerate the remediation of identity-centric attacks.

深入瞭解

Identity Threat Detection and Response (ITDR)

Intelligent Privilege Controls

Intelligent privilege controls are security measures designed to manage access to enterprise resources based on real-time risk assessments and contextual factors.

深入瞭解

Intelligent Privilege Controls

ISO

ISO stands for the International Organization for Standardization that sets standards for quality, safety, efficiency and interoperability across industries.

深入瞭解

ISO

J

Just-In-Time Access 即時存取

利用即時(JIT)存取方法,組織可即時升級人類及非人類用戶的權限,針對某個應用程式或系統提供級別更高且分層分級的特權存取,以便執行必要的任務。資安產業分析師建議使用JIT存取,透過儘可能減少常規存取來提供安全的特權存取。

深入瞭解

Just-In-Time Access 即時存取

K

Kubernetes

Kubernetes, also known as K8s, is a popular open-source container orchestration platform designed for cloud portability across hybrid and multi-cloud infrastructure. 

深入瞭解

Kubernetes

L

Least Privilege 最小特權

最小特權原則(PoLP)是一種資訊安全概念,即僅提供用戶執行工作職能所需之最低級別存取權限(或許可)。最小特權原則被公認為網路安全的最佳實踐做法,也是保護特權存取高價值資料與資產的基本必要措施。

深入瞭解

Least Privilege 最小特權

M

Machine Identity

Machine identities secure trust and confidentiality with digital certificates, just as people do with usernames and passwords. Read on to learn more!

深入瞭解

Machine Identity

Machine Identity Security

Machine identity security safeguards digital trust by protecting machine identities, preventing breaches, securing cloud growth, and ensuring compliance.

深入瞭解

Machine Identity Security

Malware 惡意軟體

惡意軟體是所有類型惡意軟體的統稱,這類軟體企圖蒙蔽最終用戶而損害和破壞電腦、伺服器、客戶端或電腦網路及基礎設施。網路攻擊者出於多種目的設計、使用及出售惡意軟體,但最常用於竊取個人、財務或商業資訊。

深入瞭解

Malware 惡意軟體

Man-in-the-Middle Attacks (MITM)

Successful MITM attacks gain the trust of communicating parties by impersonating a trusted website and eavesdropping on secure conversations.

深入瞭解

Man-in-the-Middle Attacks (MITM)

MITRE ATT&CK Framework

Mitre Att&ck is an open framework for implementing cybersecurity detection and response programs that includes a global knowledge base of adversarial TTPs.

深入瞭解

MITRE ATT&CK Framework

Multi Domain SSL Certificates

Secure multiple domains with a single Multi Domain SSL certificate. Reduce costs, streamline management, and enhance security for all your web properties.

深入瞭解

Multi Domain SSL Certificates

Multi-cloud

Multi-cloud leverages two or more cloud services from more than one cloud provider. In the enterprise, multi-cloud typically refers to running enterprise applications on platform-as-a-service (PaaS) or infrastructure-as-a-service (IaaS) from multiple cloud service providers, such as Amazon Web Services (AWS), Google Cloud Platform (GCP), IBM cloud and Microsoft Azure.

深入瞭解

Multi-cloud

Multi-Factor Authentication (MFA)

Multi-Factor Authentication is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use MFA to balance security requirements with the user experience.

深入瞭解

Multi-Factor Authentication (MFA)

N

NIS2 Directive

The NIS2 (Network and Information Security) Directive is a regulatory framework established by the European Union(EU) to enhance the cybersecurity of critical infrastructure and digital service providers.

深入瞭解

NIS2 Directive

NIST CSF 2.0

NIST CSF 2.0 is a new version of the original National Institute of Standards and Technology Cybersecurity Framework, help to manage and mitigate cybersecurity risks.

深入瞭解

NIST CSF 2.0

NIST SP 800-207

NIST SP 800-207 is a guidance published by the National Institute of Standards and Technology. A part of NIST SP 800 series for information security and cybersecurity.

深入瞭解

NIST SP 800-207

Non-Human Identity

Non-human Identities are digital entities used to identify, authenticate and authorize machines, devices, and IT infrastructure that is not associated with a human.

深入瞭解

Non-Human Identity

O

Operational Technology (OT) Cybersecurity

Operational Technology (OT) cybersecurity is a key component of protecting the uptime, security and safety of industrial environments and critical infrastructure.

深入瞭解

Operational Technology (OT) Cybersecurity

Outages

See how CyberArk prevents devastating website outages, often caused by improperly managed machine identities and expired certificates, with automation!

深入瞭解

Outages

P

Passwordless Authentication

Passwordless Authentication is an authentication method that allows a user to gain access to an application or IT system without entering a password or answering security questions.

深入瞭解

Passwordless Authentication

PCI-DSS

The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of security practices to protect cardholder data and prevent credit card fraud.

深入瞭解

PCI-DSS

Phishing Attack

A phishing attack is a social engineering tactic commonly used to steal confidential data or deliver ransomware or some other form of malware.

深入瞭解

Phishing Attack

Phishing Scams

In phishing, malicious actors trick people into going to a website and entering private information into a form. They might impersonate a major company, like a bank or PayPal.

深入瞭解

Phishing Scams

PKI

PKI, or public key infrastructure, is the framework of encryption and cybersecurity. PKI secures client-server communications. How? Let's find out!

深入瞭解

PKI

PKI Mistakes

Your guide to the most common PKI management mistakes, and how your team can strategically avoid them to keep client-server communications secure.

深入瞭解

PKI Mistakes

Privileged Access Management 特權存取管理(PAM)

特權存取管理是一個結合人員、流程與技術的全方位網路安全策略,以控制、監測、保護及審核整個企業 IT 環境內的所有人類與非人類特權身份及活動。企業組織實施特權存取管理來預防憑證竊盜及特權濫用造成的威脅。

深入瞭解

Privileged Access Management 特權存取管理(PAM)

Privileged Entitlements Management (PEM)

Privileged entitlements management is the practice of securely managing high-risk entitlements (also known as permissions, access rights or privileges) to access sensitive data, resources and services.

深入瞭解

Privileged Entitlements Management (PEM)

Q

R

Ransomware 勒索軟體

勒索軟體是專為勒索受害者牟取經濟利益而設計的惡意軟體。勒索軟體一旦啟動,用戶即無法存取其檔案、應用程式或系統,直到支付贖金為止。通常要求以比特幣之類的貨幣交付贖金,以防追蹤。

深入瞭解

Ransomware 勒索軟體

Remote Access Security

Remote access security solutions authenticate users who are accessing business applications and IT systems from outside the private enterprise network.

深入瞭解

Remote Access Security

Remote Work Security

Remote work security safely extends business applications and services to teleworkers and nomadic users without impairing user experience or satisfaction.

深入瞭解

Remote Work Security

Robotic Process Automation 機器人流程自動化(RPA)

機器人流程自動化(RPA)技術,可協助組織將標準化的作業全部或部分自動化。機器人流程自動化軟體機器人或「網路機器人」可模仿人類執行工作的行為動作。

深入瞭解

Robotic Process Automation 機器人流程自動化(RPA)

Root Certificates

Understand how root certificates establish trust in code signing. Explore their role in verifying authenticity through a chain of trust to prevent fraud.

深入瞭解

Root Certificates

RSA Encryption

RSA encryption secures machine identities and prevents cyber threats with asymmetric cryptography. Strengthen your security strategy with the right tools today!

深入瞭解

RSA Encryption

S

SaaS

軟體即服務(SaaS)是一種軟體授權及分發模型,服務供應商利用該模型託管應用程式,並透過網際網路提供給客戶。SaaS也被稱為「隨選軟體」、「託管軟體」及「Web軟體」,是雲端運算三個主要組成部分之一,也是數位化轉型的基本元素之一。

深入瞭解

SaaS

SASE (Secure Access Service Edge)

SASE merges security and networking into a cloud-based framework for seamless, secure access. See how it strengthens your organization’s security today!

深入瞭解

SASE (Secure Access Service Edge)

SCP Protocol

Learn how SCP protocol securely transfers files over SSH, combining encryption and authentication to protect data in transit while the preserving file.

深入瞭解

SCP Protocol

Secrets Management 金鑰管理

金鑰管理可讓組織對非人類身份實施一致的安全政策。金鑰管理可確保跨越工具堆疊、平台與雲端環境的資源僅可由經過身份驗證及授權的實體存取。

深入瞭解

Secrets Management 金鑰管理

Security Assertion Markup Language (SAML)

Security Assertion Markup Language (SAML) provides a standard way for businesses and application providers to share user authentication and authorization data and federate identity management functionality.

深入瞭解

Security Assertion Markup Language (SAML)

Security Framework

A security framework is a set of documented standards, policies, procedures, and best practices intended to enhance an organization’s security and reduce risk.

深入瞭解

Security Framework

Security Operations (SecOps)

Security Operations (SecOps) is the practice of combining internal information security and IT operations practices to improve collaboration and reduce risks.

深入瞭解

Security Operations (SecOps)

Security Standards and Compliance

Strengthen key and certificate security with frameworks, audits, and best practices to prevent risks and ensure compliance. Enhance your security strategy now!

深入瞭解

Security Standards and Compliance

Self-Signed Certificates

Self-signed certificates offer flexibility, but they come with security and trust risks. See how to manage them effectively and strengthen your security!

深入瞭解

Self-Signed Certificates

Session Hijacking

Session hijacking lets attackers steal active sessions to impersonate users and access sensitive data. Learn key attack methods and how to stay safe!

深入瞭解

Session Hijacking

Single Sign-On (SSO)

Single Sign-On (SSO) is an authentication method that lets users access multiple applications and services using a single set of login credentials. SSO can help businesses improve user satisfaction and productivity, strengthen access security, and reduce IT operations expense and complexity.

深入瞭解

Single Sign-On (SSO)

SOC 2

SOC 2 is a security compliance framework developed by the American Institute of Certified Public Accountants (AICPA) to securely manage customer data within the cloud.

深入瞭解

SOC 2

Social Engineering

Social engineering is a manipulation technique aimed at tricking individuals into revealing sensitive information

深入瞭解

Social Engineering

SPIFFE

Learn how SPIFFE standardizes secure workload identity in dynamic environments, enables zero-trust authentication and solves the "bottom turtle" problem.

深入瞭解

SPIFFE

SSH (Secure Shell)

SSH (Secure Shell) encrypts remote access, secures file transfers, and protects network infrastructure. Explore how SSH keys strengthen authentication.

深入瞭解

SSH (Secure Shell)

SSL Certificate

An SSL Certificate encrypts data, ensures authentication, and boosts trust. See how it protects websites, prevents attacks, and enhances cybersecurity.

深入瞭解

SSL Certificate

SSL Cipher Suite

Explore how cipher suites secure network traffic with SSL/TLS, their key components, vulnerabilities, and best practices to enhance your organization's security.

深入瞭解

SSL Cipher Suite

SSL Stripping Attacks

SSL stripping attacks downgrade HTTPS to HTTP, exposing user data to interception. Learn how cybercriminals exploit this and how to protect against it.

深入瞭解

SSL Stripping Attacks

Strict SSL

Strict SSL enhances security by validating server authenticity and protecting against man-in-the-middle attacks, ensuring safe connections with valid certificates.

深入瞭解

Strict SSL

SWIFT Compliance

The Society of Worldwide Interbank Financial Telecommunication (SWIFT) is a cooperative founded in 1973 by members of the financial community with proprietary network.

深入瞭解

SWIFT Compliance

Symmetric vs. Asymmetric Encryption

Symmetric encryption uses a single secret key, while asymmetric encryption relies on a public-private key pair for secure communication. See how this impacts security!

深入瞭解

Symmetric vs. Asymmetric Encryption

Synthetic Identity

Synthetic identity refers to a counterfeit identity formed by combining a mix of genuine and false information, blurring the line between physical and digital characteristics that identify a human being.

深入瞭解

Synthetic Identity

T

TEA (Time, Entitlements and Approvals)

TEA is a security concept that enhances access control by managing when, how much, and under what conditions users or systems can access resources.

深入瞭解

TEA (Time, Entitlements and Approvals)

Temporary Elevated Access Management

Temporary elevated access management (TEAM) access methodology helps organizations elevate privileges for human and non-human users in real time to provide granular access to an application or system in order to perform a necessary task.

深入瞭解

Temporary Elevated Access Management

Third-Party Access

Third-party access is the process of granting external vendors and service providers secure access to IT assets for maintenance, administration and management.

深入瞭解

Third-Party Access

TLS Certificate Lifecycle

Learn all about certificate lifecycle management, why it matters, the 6 stages of the TLS certificate lifecycle, and the impact automation will have!

深入瞭解

TLS Certificate Lifecycle

TLS Certificate Renewal

Expired certificates can be dangerous for your network. Learn why they expire so easily without automation and the steps you can take if this happens.

深入瞭解

TLS Certificate Renewal

TLS Certificate Risks

Outdated protocols, weak ciphers, and expired certificates can expose TLS to attacks. See how to mitigate these risks and strengthen your cybersecurity!

深入瞭解

TLS Certificate Risks

TLS Certificates

TLS certificates authenticate websites and encrypt data to ensure secure connections. Learn how they protect online interactions to enhance security!

深入瞭解

TLS Certificates

TLS Decryption

See how TLS decryption enhances security visibility, threat detection, and compliance while mitigating risks. Learn methods, best practices, and more!

深入瞭解

TLS Decryption

TLS Handshake

Understand the TLS handshake process, common connection errors, and how to solve them. Learn how to prevent outages with better certificate management!

深入瞭解

TLS Handshake

TLS/SSL Offloading

TLS/SSL offloading reduces connection latency, improving page loading speeds and user experience as well as introducing additional security checks for malware.

深入瞭解

TLS/SSL Offloading

TLS/SSL Port

Understand how TLS/SSL ports secure data, their key roles in network communication, and why HTTPS is essential for security and compliance. Upgrade your defenses now!

深入瞭解

TLS/SSL Port

Trust Stores

A trust store is a collection of root certificates that are trusted by default and are maintained by the companies that make operating systems and web browsers.

深入瞭解

Trust Stores

U

User Behavior Analytics

User behavior analytics use AI and machine learning to analyze large datasets to identify security breaches, data exfiltration and other malicious activities.

深入瞭解

User Behavior Analytics

V

Virtual Directory

A virtual directory is an Identity and Access Management architectural component that gives identity consumers a consolidated and unified view of identity management information stored in multiple disparate data repositories.

深入瞭解

Virtual Directory

W

Wildcard Certificates

Wildcard certificates simplify management, but pose major risks if not properly secured. Learn about the benefits and dangers before implementing.

深入瞭解

Wildcard Certificates

Workload Identity

Workload identity enhances Kubernetes security, automates authentication, and strengthens zero trust compliance. Explore best practices now!

深入瞭解

Workload Identity

X

X.509 Certificates

An X.509 certificate is a type of TLS/SSL certificate which uses the X.509 standard and contains a public key and the identity of a hostname, organization or individual.

深入瞭解

X.509 Certificates

Y

Z

Zero Standing Privileges

Zero Standing Privileges (ZSP) is an identity security principle that advocates for the removal of all persistent privileges for users within an enterprise’s estate. Practically, Zero Standing Privileges is a progression from the concept of just-in-time access.

深入瞭解

Zero Standing Privileges

Zero Trust 零信任

零信任是用於保護現代數位業務環境的策略性網路安全模型。零信任理念認為,組織不應自動信任任何人事物,不計其位於網路邊界內或外。零信任模型要求,試圖連接至組織系統的人員及個體均須先經驗證,方可取得存取權。

深入瞭解

Zero Trust 零信任