Glossary

The more you know, the safer you are - with our glossary you can easily gain full understanding of cybersecurity and our service.

wave

General terms

Advanced Persistent Threats

Advanced Persistent Threats (APT) are targeted cyber attacks on selected institutions and facilities in which an attacker obtains persistent access to a network and subsequently extends it to other systems. The attacks are characterized by a very high use of resources, as well as considerable technical capabilities on the part of the attackers; they are usually difficult to detect.

Attack vector

An attack vector is a combination of attack path and technique used by an attacker to gain access to IT systems.

Application/App

An application, or app for short, is a piece of software dedicated for end users. The term app is often used in connection with applications for smartphones or tablets.

Service features

Advanced device protection against exploits

Advanced protection of endpoint devices against attacks that exploit vulnerabilities in applications. Secures against incidents, in which attackers try to take control of your system or steal data stored on your network.

Advanced device protection against malware

Advanced protection on the device layer against zero-day malware attacks, which may lead to theft of personal data, passwords and funds, as well as blocking access to devices.

Application visibility and control

Full visibility and control - applications are enabled through policies, based on users and groups. Attacks that try to evade detection are seen and stopped.

Veronym Customer Portal

Amount of data scanned

Amount of data sent to/received from the Internet by the users and scanned by Veronym for traces of malicious/dangerous codes.

Average number of applications used per user

Knowledge about applications utilized by each user in the company - important especially for GDPR compliance.

Blocked application layer attacks

Blocked attempts of attacks against vulnerable applications (or applications containing security bugs).