Glossary

glossary

Welcome to the Elemental Security glossary, where you will find useful definitions of current security-related terms, and updated information on Elemental Security – a world-class solution provider for your network security needs.


a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Access Control Software

Access control software allows computer network administrators to limit access from network resources to certain Web sites or files. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Bank Compliance Management System

Bank compliance management refers to processes and systems that help financial institutions adhere to laws and regulations related to their IT systems. A bank compliance management system provides a means by which banks can maintain their databases of accounts and transactions in compliance with all relevant financial accountability laws. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Centralized Policy Management

Centralized policy management is implemented by using a single set of security policies dispersed from a central server to multiple computers throughout the network, which allows for a single focal point of management. Read More

Compliance Management

Compliance management refers to a set of systems, protocols and/or software put into place by IT managers to make sure computers on the network are maintained and operated in compliance with the enterprise's security policies. Read More

Compliance Software

Compliance software is a technology that helps network administrators to manage a company's network resources in a manner that is compliant with its computer network security policies. Read More

Computer Access Security

Computer access security is the practice of protecting computer networks, as well as the individual computers on these networks and the data they contain, from access by unauthorized users. Read More

Computer Security Audits

Computer security audits take inventory of the resources on a network and measure how compliant those resources are with an enterprise's security policies. Read More

Computer Security Policy

Computer security policy refers to a compilation of standards, rules, and expectations that govern the use of an enterprise's computer resources. Read More

Computer Security Products

A computer security product can be any device, piece of software, or consulting service that addresses a computer networking security concern. Read More

Corporate Compliance Policies

In the context of enterprise computer networks, corporate compliance refers to compliance with an enterprise's network security policies. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Endpoint Security

Endpoint security entails management of the individual devices used to access a computer network, especially from remote locations, over a VPN (virtual private network), for example. Read More

Enterprise Policy and Risk Management

Enterprise policy and risk management refers to establishing a set of rules governing access to and use of an enterprise's computer network resources in order to minimize opportunities for security breaches. Read More

Enterprise Network Security

Enterprise network security refers to the systems and programs put into place by computer network administrators to prevent the breach of an enterprise-wide computer network's security. Read More

Enterprise Security Policy

An enterprise security policy is a set of rules that enables system-wide management of the protection of information, and which defines permission levels and sets of controls governing who can see and use this information. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Financial Reporting Security

A financial reporting security policy puts in place certain computer network rules and regulations that minimize the risk of financial information becoming misappropriated and, therefore, compromised. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Healthcare Information Security

Healthcare information security consists of the rules and policy statements put into place by an enterprise in order to ensure that the personal information of patients remains private and inaccessible to unauthorized persons. Read More

HIPAA Compliance

The United States federal Health Insurance Portability and Accountability Act (HIPAA) represents a complex body of rules governing how healthcare data is stored and used. A formal HIPPA compliance plan can ensure that a healthcare entity maintains HIPAA compliance. Read More

HIPAA Security

HIPAA security is a requirement enacted by congress that mandates an extremely high degree of protection for any healthcare-related information. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Information Security

Three widely accepted elements of information security are confidentiality, integrity and availability. These tenets are commonly called "CIA," and are often referred to as the CIA triad. A further generally accepted element is accountability. Read More

Information Security Management

Information security management refers to a set of computer networking best practices whose purpose is to ensure that data is stored securely while still being made available to the proper users in an efficient and timely manner. Read More

Information Security Planning

Computer networks are changing constantly, with machines coming on and off line, configurations being changed, users moving from machine to machine, and individual departmental strategies changing almost daily. At the same time, threats to the integrity and viability of stored information are accelerating in frequency and scope, from both internal and external sources. The Elemental Security Platform provides a continually updated window into the network, with detailed information reports on every device observed. Read More

Information Security Policy

An information security policy should provide, in advance, the principles needed for addressing any contingencies that may arise within the context of managing data on an enterprise's computer network. Read More

Information Technology Security

An information technology security audit is an exercise intended to measure the vulnerability of an organization's IT security structure. Read More

Information IT Management Policy

An IT change management policy should limit unauthorized changes to the computer network, identify the source of such changes, and minimize errors and disruption from any changes to a network's structure. Read More

IT Security Audits

An IT security audit requires a full scan of the configuration of all resources on a network to identify strengths and weaknesses of the security of the system. Read More

IT Security Convergence

IT security convergence involves bringing physical and electronic security under one umbrella, thereby reducing operational costs. Read More

IT Security

An IT security plan is a set of rules and regulations that govern actions and systematic reactions to any change or adjustment to IT infrastructure. Read More

IT Security Policies

An IT security policy is an enterprise-wide set of rules, regulations, and systems that govern how data and network protection will be handled. Read More

IT Security Software

IT security software monitors and enforces compliance with computer network security policies. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

LDAP Security

Lightweight Directory Access Protocol, or LDAP, is a networking protocol for querying and modifying directory services running over TCP/IP; LDAP security is a means of protecting LDAP servers from unauthorized access. Read More

Linux Security

With the continuing rapid proliferation of open-source Linux operating system in enterprise IT environments, a comprehensive Linux network security plan is an essential component of an IT management strategy. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Network Security Management

Network security management is the practice of protecting corporate computer networks from assault, either from internal or external threats. Read More

Network Security Policies

A network security policy defines acceptable usage of an enterprise's computer network resources. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Patch Management

Patch management involves managing the acquisition and installation of software updates for the many applications installed throughout an enterprise's computer network. Read More

Payment Card Industry

To keep cardholder information private, Visa, MasterCard, and other leading companies in the payment card industry (PCI) have collaborated on a set of industry-wide guidelines for securing computer networks that store cardholder data. Read More

Policy Management

Policy management software enables security professionals to define and deploy security policies that control the configuration of and access to computer network resources, monitor the network for compliance with your policies, and optionally enforce compliance with the rules. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Regulatory Compliance Management

Regulatory compliance management refers to the process of ensuring that computer network resources are maintained in a manner that is compliant with regulatory requirements, such as those imposed by laws or industry standards. Read More

Rogue Computers

The term 'rogue computers' (or rogue hosts, or rogue network devices) refers to computer devices that gain unauthorized access to a computer network. Read More

a . b . c . d . e . f . g . h . i . j . k . l . m . n . o . p . q . r . s . t . u . v . w . x . y . z

Sarbanes Oxley Compliance

Sarbanes Oxley compliance refers to the strict financial reporting requirements placed on companies whose stock is publicly traded by the Sarbanes-Oxley (SOX) Act, which was passed by the United States Congress. Read More

Security Access Control

Security access control refers to the authentication of users attempting to log onto a computer network and authorization of users attempting to access certain specific resources and perform certain activities on the network. Read More

Security Baselines

A security baseline represents the state of a network security before the implementation and deployment of a comprehensive computer security policy. It represents a compliance benchmark against which future information can be compared. Read More

Security Compliance

Security compliance refers to a process or system that ensures computer assets are used in compliance with the organization's computer network security policies. Read More

Security Information Management

Security information management systems centralize, correlate, and prioritize log data from various devices so that security administrators are able to identify security vulnerabilities and evolving attacks. Read More

Security Management Solutions

Security management solutions are a set of technology products and services that allow IT staff to maintain the integrity of the information on a computer network. Read More

Security Policy Automation

Security policy automation refers to the practice of using software platforms to define, implement and monitor compliance with computer network security policies. Read More

SOX 404 Compliance

SOX 404 compliance refers to adhering to the requirements of section 404 of the United States federal Sarbanes-Oxley Act, which regulates financial accounting procedures of publicly owned companies. Section 404 requires the company's annual report to include information about the effectiveness of controls the company has adopted in order to achieve complete SOX regulatory compliance. Read More