The more you know, the safer you are - with our glossary you can easily gain full understanding of cybersecurity and our service.
Advanced Persistent Threats
Advanced Persistent Threats (APT) are targeted cyber attacks on selected institutions and facilities in which an attacker obtains persistent access to a network and subsequently extends it to other systems. The attacks are characterized by a very high use of resources, as well as considerable technical capabilities on the part of the attackers; they are usually difficult to detect.
An attack vector is a combination of attack path and technique used by an attacker to gain access to IT systems.
An application, or app for short, is a piece of software dedicated for end users. The term app is often used in connection with applications for smartphones or tablets.
Advanced device protection against exploits
Advanced protection of endpoint devices against attacks that exploit vulnerabilities in applications. Secures against incidents, in which attackers try to take control of your system or steal data stored on your network.
Advanced device protection against malware
Advanced protection on the device layer against zero-day malware attacks, which may lead to theft of personal data, passwords and funds, as well as blocking access to devices.
Application visibility and control
Full visibility and control - applications are enabled through policies, based on users and groups. Attacks that try to evade detection are seen and stopped.
Veronym Customer Portal
Amount of data scanned
Amount of data sent to/received from the Internet by the users and scanned by Veronym Cloud for traces of malicious/dangerous codes.
Application layer attacks
Blocked attempts of attacks against vulnerable applications (or applications containing security bugs).
Average number of applications used per user
Knowledge about applications utilized by each user in the company - important especially for GDPR compliance.