General terms
Advanced Persistent ThreatsAdvanced Persistent Threats (APT) are targeted cyber attacks on selected institutions and facilities in which an attacker obtains persistent access to a network and subsequently extends it to other systems. The attacks are characterized by a very high use of resources, as well as considerable technical capabilities on the part of the attackers; they are usually difficult to detect. Advanced Persistent Threats
Advanced Persistent Threats (APT) are targeted cyber attacks on selected institutions and facilities in which an attacker obtains persistent access to a network and subsequently extends it to other systems. The attacks are characterized by a very high use of resources, as well as considerable technical capabilities on the part of the attackers; they are usually difficult to detect.
Attack vectorAn attack vector is a combination of attack path and technique used by an attacker to gain access to IT systems. Attack vector
An attack vector is a combination of attack path and technique used by an attacker to gain access to IT systems.
Application/AppAn application, or app for short, is a piece of software dedicated for end users. The term app is often used in connection with applications for smartphones or tablets. Application/App
An application, or app for short, is a piece of software dedicated for end users. The term app is often used in connection with applications for smartphones or tablets.
Bot/BotnetA botnet is a network of computers (systems) that are infected by a remotely controllable malicious program (bot). The affected systems are monitored and controlled by the botnet operator using a command and control server (C&C server). Bot/Botnet
A botnet is a network of computers (systems) that are infected by a remotely controllable malicious program (bot). The affected systems are monitored and controlled by the botnet operator using a command and control server (C&C server).
Cloud/Cloud computingCloud computing refers to the dynamic provision, use and billing of IT services via a network, adapted to demand. These services are offered and used exclusively via defined technical interfaces and protocols. The services offered as part of cloud computing cover the entire spectrum of information technology and include infrastructures (computing power, storage space), platforms and software. Cloud/Cloud computing
Cloud computing refers to the dynamic provision, use and billing of IT services via a network, adapted to demand. These services are offered and used exclusively via defined technical interfaces and protocols. The services offered as part of cloud computing cover the entire spectrum of information technology and include infrastructures (computing power, storage space), platforms and software.
Digital privacy protectionDigital privacy protection is the protection of the activities of important personalities in digital space. In addition to protecting private e-mail accounts, this also includes measures such as verification of Twitter and Facebook accounts. Digital privacy protection
Digital privacy protection is the protection of the activities of important personalities in digital space. In addition to protecting private e-mail accounts, this also includes measures such as verification of Twitter and Facebook accounts.
DNSThe Domain Name System (DNS) assigns the corresponding IP address to the addresses and names used on the Internet, such as www.veronym.com, for example. DNS
The Domain Name System (DNS) assigns the corresponding IP address to the addresses and names used on the Internet, such as www.veronym.com, for example.
DoS/DDoS attacksDenial-of-Service (DoS) attacks are directed against the availability of services, websites, individual systems or entire networks. If such an attack is executed in parallel by several systems, it is referred to as Distributed Denial of Service (DDoS) attack. A very large number of computers or servers is often used in DDoS attacks. DoS/DDoS attacks
Denial-of-Service (DoS) attacks are directed against the availability of services, websites, individual systems or entire networks. If such an attack is executed in parallel by several systems, it is referred to as Distributed Denial of Service (DDoS) attack. A very large number of computers or servers is often used in DDoS attacks.
Drive-by-Download/ Drive-by-ExploitsDrive-by exploits describe the automated exploitation of security gaps on a PC. When viewing a website without further user interaction, vulnerabilities in the web browser, in additional programs of the browser (plug-ins) or in the operating system are exploited in order to install malware on the PC unnoticed. Drive-by-Download/ Drive-by-Exploits
Drive-by exploits describe the automated exploitation of security gaps on a PC. When viewing a website without further user interaction, vulnerabilities in the web browser, in additional programs of the browser (plug-ins) or in the operating system are exploited in order to install malware on the PC unnoticed.
ExploitAn exploit is a method or code that can be used to execute unintended commands or functions via a vulnerability in hardware or software. Depending on the nature of the vulnerability, an exploit can be used, for example, to crash a program, extend user rights, or execute arbitrary program code. Exploit
An exploit is a method or code that can be used to execute unintended commands or functions via a vulnerability in hardware or software. Depending on the nature of the vulnerability, an exploit can be used, for example, to crash a program, extend user rights, or execute arbitrary program code.
Exploit kitExploit kits are tools for cyber attacks and are placed on legitimate websites. Various exploits automatically attempt to find a vulnerability in the web browser or its plug-ins and use it to install malware. Exploit kit
Exploit kits are tools for cyber attacks and are placed on legitimate websites. Various exploits automatically attempt to find a vulnerability in the web browser or its plug-ins and use it to install malware.
FirmwareFirmware is software that is embedded in electronic devices. Depending on the device, firmware can contain the functional scope of e.g. BIOS, operating system or application software. Firmware is specially tailored to the respective hardware and cannot be exchanged at will. Firmware
Firmware is software that is embedded in electronic devices. Depending on the device, firmware can contain the functional scope of e.g. BIOS, operating system or application software. Firmware is specially tailored to the respective hardware and cannot be exchanged at will.
MalwareMalware is a word derived from "malicious software" and refers to software developed with the aim of performing undesirable and mostly harmful functions. Examples are computer viruses, worms and Trojan horses. Malware is usually designed for a specific operating system variant and is therefore mostly written for common systems and applications. Malware
Malware is a word derived from "malicious software" and refers to software developed with the aim of performing undesirable and mostly harmful functions. Examples are computer viruses, worms and Trojan horses. Malware is usually designed for a specific operating system variant and is therefore mostly written for common systems and applications.
PaddingPadding is used in cryptography in encryption procedures to fill data areas. With a block cipher, for example, the data to be encrypted is stored in blocks of fixed size. Padding can be used to fill the last bytes so that the last block also becomes "full". Padding
Padding is used in cryptography in encryption procedures to fill data areas. With a block cipher, for example, the data to be encrypted is stored in blocks of fixed size. Padding can be used to fill the last bytes so that the last block also becomes "full".
Patch/Patch managementA patch is a software package used by software vendors to close security holes in their programs or integrate other improvements. Many programs facilitate the installation of these updates through automatic update functions. Patch management is the term used to describe processes and procedures that help to obtain, manage and install available patches for the IT environment as quickly as possible. Patch/Patch management
A patch is a software package used by software vendors to close security holes in their programs or integrate other improvements. Many programs facilitate the installation of these updates through automatic update functions. Patch management is the term used to describe processes and procedures that help to obtain, manage and install available patches for the IT environment as quickly as possible.
PhishingThe word consists of "password" and "fishing", which means "fishing for passwords". The attacker uses fake websites, e-mails or short messages in attempt to gain access to the personal data of an Internet user and to misuse it for his own purposes, usually at the victim's expense. Phishing
The word consists of "password" and "fishing", which means "fishing for passwords". The attacker uses fake websites, e-mails or short messages in attempt to gain access to the personal data of an Internet user and to misuse it for his own purposes, usually at the victim's expense.
Plug-inA plug-in is an additional software or a software module that can be integrated into a computer program to extend its functionality. Plug-in
A plug-in is an additional software or a software module that can be integrated into a computer program to extend its functionality.
RansomwareRansomware is a malware that restricts or prevents access to data and systems; and only releases these resources after a ransom has been paid. This is an attack on the security objective of availability and a form of digital blackmail. Ransomware
Ransomware is a malware that restricts or prevents access to data and systems; and only releases these resources after a ransom has been paid. This is an attack on the security objective of availability and a form of digital blackmail.
SinkholeA sinkhole is a computer system to which requests from botnet infected systems are redirected. Sinkhole systems are typically operated by security researchers to detect botnet infections and inform affected users. Sinkhole
A sinkhole is a computer system to which requests from botnet infected systems are redirected. Sinkhole systems are typically operated by security researchers to detect botnet infections and inform affected users.
Social EngineeringIn cyber attacks through social engineering, criminals try to trick their victims into disclosing data, bypassing protective measures or installing malware on their own systems. Both in the area of cybercrime and espionage, the perpetrators proceed cleverly to exploit human weaknesses such as curiosity or fear and thus gain access to sensitive data and information. Social Engineering
In cyber attacks through social engineering, criminals try to trick their victims into disclosing data, bypassing protective measures or installing malware on their own systems. Both in the area of cybercrime and espionage, the perpetrators proceed cleverly to exploit human weaknesses such as curiosity or fear and thus gain access to sensitive data and information.
SpamSpam is the term used to describe unwanted messages that are sent in bulk via e-mail or other communication services. In the harmless variant, spam messages usually contain unwanted advertising. However, spam often also contains malware attachments, links to infected websites or is used for phishing attacks (so-called malware spam). Spam
Spam is the term used to describe unwanted messages that are sent in bulk via e-mail or other communication services. In the harmless variant, spam messages usually contain unwanted advertising. However, spam often also contains malware attachments, links to infected websites or is used for phishing attacks (so-called malware spam).
SSL/TLSTLS stands for Transport Layer Security and is an encryption protocol for the secure transmission of data on the Internet. The previous version SSL (Secure Sockets Layer) is also known. SSL/TLS
TLS stands for Transport Layer Security and is an encryption protocol for the secure transmission of data on the Internet. The previous version SSL (Secure Sockets Layer) is also known.
Service features
Advanced device protection against exploitsAdvanced protection of endpoint devices against attacks that exploit vulnerabilities in applications. Secures against incidents, in which attackers try to take control of your system or steal data stored on your network. Advanced device protection against exploits
Advanced protection of endpoint devices against attacks that exploit vulnerabilities in applications. Secures against incidents, in which attackers try to take control of your system or steal data stored on your network.
Advanced device protection against malwareAdvanced protection on the device layer against zero-day malware attacks, which may lead to theft of personal data, passwords and funds, as well as blocking access to devices. Advanced device protection against malware
Advanced protection on the device layer against zero-day malware attacks, which may lead to theft of personal data, passwords and funds, as well as blocking access to devices.
Application visibility and controlFull visibility and control - applications are enabled through policies, based on users and groups. Attacks that try to evade detection are seen and stopped. Application visibility and control
Full visibility and control - applications are enabled through policies, based on users and groups. Attacks that try to evade detection are seen and stopped.
Cloud application security and visibilityBlocks known malware, identifies and blocks unknown malware, with advanced threat protection of cloud applications. Cloud application security and visibility
Blocks known malware, identifies and blocks unknown malware, with advanced threat protection of cloud applications.
Command and control preventionStops malware outbound communications, as well as passively analyzes DNS queries, and identifies the unique patterns of botnets. This reveals infected users, prevents secondary downloads and company data breaches. Command and control prevention
Stops malware outbound communications, as well as passively analyzes DNS queries, and identifies the unique patterns of botnets. This reveals infected users, prevents secondary downloads and company data breaches.
Device-based threat prevention with machine learning algorithmAdvanced protection against exploit and malware attacks, as well as dangerous content at the level of the endpoint device. Device-based threat prevention with machine learning algorithm
Advanced protection against exploit and malware attacks, as well as dangerous content at the level of the endpoint device.
Device behavioral analyticsThe service effectively and automatically recognizes unusual activity on the device, stops it and then isolates the threat before it can cause damage. Device behavioral analytics
The service effectively and automatically recognizes unusual activity on the device, stops it and then isolates the threat before it can cause damage.
Endpoint Detection and ResponseContinuous monitoring of endpoint devices activity. Automatically detects suspicious activity and helps investigate and respond to attacks. Endpoint Detection and Response
Continuous monitoring of endpoint devices activity. Automatically detects suspicious activity and helps investigate and respond to attacks.
IPSec encrypted VPNSecure network protocol suite that authenticates and encrypts the packets of data sent over the Internet. It uses cryptographic security services to protect your communications. IPSec encrypted VPN
Secure network protocol suite that authenticates and encrypts the packets of data sent over the Internet. It uses cryptographic security services to protect your communications.
Network-based Protocol Anomaly detectionThe service effectively and automatically recognizes unusual network protocol usage, at the same time providing accurate information that allows quick estimation of the potential threats; then isolates and removes these threats from your network before they can cause damage. Network-based Protocol Anomaly detection
The service effectively and automatically recognizes unusual network protocol usage, at the same time providing accurate information that allows quick estimation of the potential threats; then isolates and removes these threats from your network before they can cause damage.
Network-based threat prevention with machine learning algorithmControlling threat vectors through the management of all application types to reduce the network attack surface. Allowed traffic is analysed for exploits, malware, malicious URLs, dangerous or restricted files and content. Network-based threat prevention with machine learning algorithm
Controlling threat vectors through the management of all application types to reduce the network attack surface. Allowed traffic is analysed for exploits, malware, malicious URLs, dangerous or restricted files and content.
Network-based zero-day attacks prevention and analysisOnline cloud analysis and prevention of zero-day malware attacks at the network layer level. Recognizes and blocks unknown malware and exploits, as well as automatically creates and shares new protection policies. Network-based zero-day attacks prevention and analysis
Online cloud analysis and prevention of zero-day malware attacks at the network layer level. Recognizes and blocks unknown malware and exploits, as well as automatically creates and shares new protection policies.
Offline device protectionProtection for devices, which is active even when they are not connected to the Internet. A necessary element in the case when malware or exploit is delivered by other methods than through the network. Offline device protection
Protection for devices, which is active even when they are not connected to the Internet. A necessary element in the case when malware or exploit is delivered by other methods than through the network.
Prevention of various attack vectors on devices (other than network connection)Recognition and prevention at the device level of threats originated from different than network connection sources. Prevention of various attack vectors on devices (other than network connection)
Recognition and prevention at the device level of threats originated from different than network connection sources.
Remote access / SD-WanSecure site to site (branch to branch) connection for accessing customer internal resources and/or remote users' access. Remote access / SD-Wan
Secure site to site (branch to branch) connection for accessing customer internal resources and/or remote users' access.
Threat HuntingAn elite team of security experts who proactively hunt, investigate and advise on threat activity in your environment. Threat Hunting
An elite team of security experts who proactively hunt, investigate and advise on threat activity in your environment.
USB Device ManagementMonitoring and control required for safe usage of USB devices across your organization - visibility into kinds of USB devices and how they are used. USB Device Management
Monitoring and control required for safe usage of USB devices across your organization - visibility into kinds of USB devices and how they are used.
VPN streamingA secure Internet gateway to connect to company local resources, assets or streaming. VPN streaming
A secure Internet gateway to connect to company local resources, assets or streaming.
Web filteringFully integrated URL filtering powered by market-leading URL database to enforce policies for Web browsing and reduce malware incidents by blocking access to known phishing and malware download sites. Web filtering
Fully integrated URL filtering powered by market-leading URL database to enforce policies for Web browsing and reduce malware incidents by blocking access to known phishing and malware download sites.
Veronym Customer Portal
Amount of data scannedAmount of data sent to/received from the Internet by the users and scanned by Veronym for traces of malicious/dangerous codes. Amount of data scanned
Amount of data sent to/received from the Internet by the users and scanned by Veronym for traces of malicious/dangerous codes.
Average number of applications used per userKnowledge about applications utilized by each user in the company - important especially for GDPR compliance. Average number of applications used per user
Knowledge about applications utilized by each user in the company - important especially for GDPR compliance.
Blocked application layer attacksBlocked attempts of attacks against vulnerable applications (or applications containing security bugs). Blocked application layer attacks
Blocked attempts of attacks against vulnerable applications (or applications containing security bugs).
Incidents of suspected exploitsSee: Exploit Incidents of suspected exploits
See: Exploit
Inspected sessionsVeronym inspects all your connections to Internet resources for traces of non-legitimate activity. Inspected sessions
Veronym inspects all your connections to Internet resources for traces of non-legitimate activity.
Number of applications usedInformation about the use of distinct applications in the company. Knowledge about applications and their risk scores is vital for making informed decisions about their use inside any organization. Number of applications used
Information about the use of distinct applications in the company. Knowledge about applications and their risk scores is vital for making informed decisions about their use inside any organization.
Number of scanned filesAll files accessed in the company are inspected for malicious traces. At the same time, Veronym doesn't have insight into the file contents. Number of scanned files
All files accessed in the company are inspected for malicious traces. At the same time, Veronym doesn't have insight into the file contents.
Scanned URLsEach visited website is checked against always up-to-date database of website addresses, to prevent users from entering malicious, low-reputation pages, as well as those blocked according to the company's policies. Scanned URLs
Each visited website is checked against always up-to-date database of website addresses, to prevent users from entering malicious, low-reputation pages, as well as those blocked according to the company's policies.
Suspected malwareSee: Malware Suspected malware
See: Malware
Unauthorized access attempts blockedAttempts of accessing company resources and network by unauthorized entities are blocked, as well as unauthorized outgoing connections from the company network. Unauthorized access attempts blocked
Attempts of accessing company resources and network by unauthorized entities are blocked, as well as unauthorized outgoing connections from the company network.
URL categories detectedInformation about categories of websites accessed in the company - giving insight into network use and possible threat vectors. URL categories detected
Information about categories of websites accessed in the company - giving insight into network use and possible threat vectors.