Protecting Data Together

ProLion Glossary

A list of terms and definitions related to storage, security and the ProLion product range. You can use this glossary to understand the most common technical terms in the industry as well as some of the features unique to ProLion.

Visit prolion.com
SORT ALPHABETICAL

4th Layer of Storage Protection

4th Layer of Storage Protection

The 4th layer of storage protection is directly integrated with storage systems for fast ransomware exploit blocking.
Learn more

Active Directory

Active Directory

Active directory is a directory service developed by Microsoft for Windows networks.
Learn more

Active Monitoring

Active Monitoring

Active monitoring uses the simulation of user behavior to analyze the potential performance of the network.
Learn more

Always-on-Availability

Always-on-Availability

For most businesses, it is crucial that their IT services are available all the time.
Learn more

Attack vector

Attack vector

The term attack vector describes the method, path, or scenario that is used to achieve unauthorized access to the target.
Learn more

Backup (Data Backup)

Backup (Data Backup)

A backup is a copy of files or databases to a secondary location for safety reasons in case of hardware failure or similar.
Learn more

Behavioral Analysis

Behavioral Analysis

As the name says, behavioral analysis is the process of analyzing someone’s behavior.
Learn more

Blocklist

Blocklist

A blocklist is a list of specific entities that do not have access to a particular system or network or that are even blocked.
Learn more

Brute Force Attack

Brute Force Attack

A brute force attack is a type of malicious cyberattack.
Learn more

CEE (Common Event Enabler)

CEE (Common Event Enabler)

The Dell CEE (Common Event Enabler) provides an interface for CEPA (Common Event Publishing Agent).
Learn more

CVE

CVE

CVE is a standardized list that contains publicly known information-security vulnerabilities and exposures.
Learn more

Cyberattack

Cyberattack

A cyberattack is any malicious attempt to steal, expose, alter, disable, or destroy data, applications, or other assets.
Learn more

DDOS Attack

DDOS Attack

A DDoS Attack is a malicious attempt to cause delays or failures on websites or data centers by overloading the IT-systems.
Learn more

Data Access Transparancy

Data Access Transparancy

Data access transparency is the ability to keep an eye on anything that happens to your data.
Learn more

Data Compliance

Data Compliance

Data compliance is the formal governance structure in place for data protection, security, storage.
Learn more

Data Leak

Data Leak

A data leak is an event, where unauthorized people get access to information due to internal errors.
Learn more

Data Recovery

Data Recovery

Data recovery is the process of restoring lost, deleted, corrupted or inaccessible data from storage media.
Learn more

Defense in Depth

Defense in Depth

Defense in depth is a strategy where multiple layers of security controls are deployed to protect an organization’s IT systems and data.
Learn more

Downtime Prevention

Downtime Prevention

Solutions for downtime prevention ensure the availability of a system, even if an error occurs.
Learn more

Endpoint Protection

Endpoint Protection

Endpoint protection is the securing of endpoints of end-user devices like desktops, laptops, or mobile devices from cybersecurity threats.
Learn more

Ethical Hacker

Ethical Hacker

Ethical hackers are security experts who are authorized to attempt gaining unauthorized access to a computer system, application, or data.
Learn more

Exploits & Vulnerabilities

Exploits & Vulnerabilities

Exploits and vulnerabilities are two terms to describe common cyber risks.
Learn more

FPolicy

FPolicy

FPolicy is a file access notification framework from NetApp.
Learn more

File Activity Blocking

File Activity Blocking

File activity blocking is an IT security measure aimed at safeguarding data and systems by controlling and limiting actions performed.
Learn more

File Activity Monitoring

File Activity Monitoring

File activity monitoring is a crucial IT security practice that involves the continuous tracking, recording, and analysis of actions.
Learn more

File Encryption

File Encryption

File encryption is a way of protecting data.
Learn more

File Extension

File Extension

A file extension is the identifier of a file that comes at the end of a file name after the period.
Learn more

Firewall

Firewall

A firewall is a network security device or software that acts as a barrier between a private internal network and external networks.
Learn more

Incident Response

Incident Response

Incident response is a structured approach to manage and mitigate the impact of security incidents and data breaches.
Learn more

Insider Threat

Insider Threat

Insider threats are cyberthreats coming from inside a company, means from current or former employees.
Learn more

Keylogger

Keylogger

A keylogger is a hard- or software that tracks a user’s every keystroke on a computer to monitor and reconstruct everything that is typed.
Learn more

Malware

Malware

Malware, the short form of “malicious software”, is any software or computer program that should harm a computer system or its users.
Learn more

Network Attached Storage (NAS)

Network Attached Storage (NAS)

A network attached storage (NAS) system is a file-dedicated storage device which is attached to a network.
Learn more

ONTAP

ONTAP

ONTAP is NetApp’s most widely used storage operating system for storage disk arrays.
Learn more

Passive Monitoring

Passive Monitoring

Passive (network) monitoring is a passive analysis of the data the users of a network generate.
Learn more

Password Manager

Password Manager

A password manager stores all kinds of login credentials safely.
Learn more

Pattern Recognition

Pattern Recognition

Pattern recognition in IT security refers to the process of identifying recurring and significant patterns within data or network traffic.
Learn more

Penetration Testing

Penetration Testing

Penetration testing is a type of a cybersecurity check for individual computers or complete networks.
Learn more

Ransomware

Ransomware

Ransomware is a type of malware that steals or encrypts valuable data on the targeted device to demand a ransom payment to recover the data.
Learn more

Ransomware as a Service

Ransomware as a Service

Ransomware as a service (RaaS) is a malicious version of the SaaS (Software-as-a-Service) model.
Learn more

SMB/CIFS

SMB/CIFS

SMB or CIFS is a file sharing protocol that allows computers to read and write files to a remote host over a local area network.
Learn more

Snapshot

Snapshot

In computer systems, a snapshot is like a picture of a storage system at a particular point in time.
Learn more

Social Engineering

Social Engineering

Social engineering aims to exploit human error to reveal specific information for illegal reasons by manipulating a person.
Learn more

Split-Brain

Split-Brain

Split-brain can occur when there is a failure in the communication between the redundant nodes of servers.
Learn more

Storage System

Storage System

A storage system is a hardware and software infrastructure designed to store, manage, and retrieve digital data.
Learn more

Switchover

Switchover

A switchover refers to the process of transitioning from one system, component, or resource to another.
Learn more

System Monitoring

System Monitoring

System monitoring is the continuous observation and analysis of computer systems or networks to identify and respond to security threats.
Learn more

Trojan Horse

Trojan Horse

A trojan horse is a type of malware, that tricks users by disguising itself as a normal program.
Learn more

Unstructured Data

Unstructured Data

Unstructured data refers to digital information that does not have a predefined data model or organized structure.
Learn more

VM Ware

VM Ware

VMware is a software company that specializes in virtualization and cloud computing technology.
Learn more

Vulnerability Scanner

Vulnerability Scanner

A vulnerability scanner is used to detect vulnerabilities in an IT environment.
Learn more

Zero Trust

Zero Trust

Zero trust describes a security model where no user or device should be trusted by default.
Learn more