Protecting Data Together
ProLion Glossary
A list of terms and definitions related to storage, security and the ProLion product range. You can use this glossary to understand the most common technical terms in the industry as well as some of the features unique to ProLion.
SORT ALPHABETICAL
123
123
Learn more4th Layer of Storage Protection
4th Layer of Storage Protection
The 4th layer of storage protection is directly integrated with storage systems for fast ransomware exploit blocking.
Learn moreActive Directory
Active Directory
Active directory is a directory service developed by Microsoft for Windows networks.
Learn moreActive Monitoring
Active Monitoring
Active monitoring uses the simulation of user behavior to analyze the potential performance of the network.
Learn moreAlways-on-Availability
Always-on-Availability
For most businesses, it is crucial that their IT services are available all the time.
Learn moreAttack vector
Attack vector
The term attack vector describes the method, path, or scenario that is used to achieve unauthorized access to the target.
Learn moreBackup (Data Backup)
Backup (Data Backup)
A backup is a copy of files or databases to a secondary location for safety reasons in case of hardware failure or similar.
Learn moreBehavioral Analysis
Behavioral Analysis
As the name says, behavioral analysis is the process of analyzing someone’s behavior.
Learn moreBlocklist
Blocklist
A blocklist is a list of specific entities that do not have access to a particular system or network or that are even blocked.
Learn moreBrute Force Attack
CEE (Common Event Enabler)
CEE (Common Event Enabler)
The Dell CEE (Common Event Enabler) provides an interface for CEPA (Common Event Publishing Agent).
Learn moreCVE
CVE
CVE is a standardized list that contains publicly known information-security vulnerabilities and exposures.
Learn moreCyberattack
Cyberattack
A cyberattack is any malicious attempt to steal, expose, alter, disable, or destroy data, applications, or other assets.
Learn moreDDOS Attack
DDOS Attack
A DDoS Attack is a malicious attempt to cause delays or failures on websites or data centers by overloading the IT-systems.
Learn moreData Access Transparancy
Data Access Transparancy
Data access transparency is the ability to keep an eye on anything that happens to your data.
Learn moreData Compliance
Data Compliance
Data compliance is the formal governance structure in place for data protection, security, storage.
Learn moreData Leak
Data Leak
A data leak is an event, where unauthorized people get access to information due to internal errors.
Learn moreData Recovery
Data Recovery
Data recovery is the process of restoring lost, deleted, corrupted or inaccessible data from storage media.
Learn moreDefense in Depth
Defense in Depth
Defense in depth is a strategy where multiple layers of security controls are deployed to protect an organization’s IT systems and data.
Learn moreDowntime Prevention
Downtime Prevention
Solutions for downtime prevention ensure the availability of a system, even if an error occurs.
Learn moreEndpoint Protection
Endpoint Protection
Endpoint protection is the securing of endpoints of end-user devices like desktops, laptops, or mobile devices from cybersecurity threats.
Learn moreEthical Hacker
Ethical Hacker
Ethical hackers are security experts who are authorized to attempt gaining unauthorized access to a computer system, application, or data.
Learn moreExploits & Vulnerabilities
Exploits & Vulnerabilities
Exploits and vulnerabilities are two terms to describe common cyber risks.
Learn moreFPolicy
File Activity Blocking
File Activity Blocking
File activity blocking is an IT security measure aimed at safeguarding data and systems by controlling and limiting actions performed.
Learn moreFile Activity Monitoring
File Activity Monitoring
File activity monitoring is a crucial IT security practice that involves the continuous tracking, recording, and analysis of actions.
Learn moreFile Encryption
File Extension
File Extension
A file extension is the identifier of a file that comes at the end of a file name after the period.
Learn moreFirewall
Firewall
A firewall is a network security device or software that acts as a barrier between a private internal network and external networks.
Learn moreIncident Response
Incident Response
Incident response is a structured approach to manage and mitigate the impact of security incidents and data breaches.
Learn moreInsider Threat
Insider Threat
Insider threats are cyberthreats coming from inside a company, means from current or former employees.
Learn moreKeylogger
Keylogger
A keylogger is a hard- or software that tracks a user’s every keystroke on a computer to monitor and reconstruct everything that is typed.
Learn moreMalware
Malware
Malware, the short form of “malicious software”, is any software or computer program that should harm a computer system or its users.
Learn moreNetwork Attached Storage (NAS)
Network Attached Storage (NAS)
A network attached storage (NAS) system is a file-dedicated storage device which is attached to a network.
Learn moreONTAP
Passive Monitoring
Passive Monitoring
Passive (network) monitoring is a passive analysis of the data the users of a network generate.
Learn morePassword Manager
Pattern Recognition
Pattern Recognition
Pattern recognition in IT security refers to the process of identifying recurring and significant patterns within data or network traffic.
Learn morePenetration Testing
Penetration Testing
Penetration testing is a type of a cybersecurity check for individual computers or complete networks.
Learn moreRansomware
Ransomware
Ransomware is a type of malware that steals or encrypts valuable data on the targeted device to demand a ransom payment to recover the data.
Learn moreRansomware as a Service
Ransomware as a Service
Ransomware as a service (RaaS) is a malicious version of the SaaS (Software-as-a-Service) model.
Learn moreSMB/CIFS
SMB/CIFS
SMB or CIFS is a file sharing protocol that allows computers to read and write files to a remote host over a local area network.
Learn moreSnapshot
Snapshot
In computer systems, a snapshot is like a picture of a storage system at a particular point in time.
Learn moreSocial Engineering
Social Engineering
Social engineering aims to exploit human error to reveal specific information for illegal reasons by manipulating a person.
Learn moreSplit-Brain
Split-Brain
Split-brain can occur when there is a failure in the communication between the redundant nodes of servers.
Learn moreStorage System
Storage System
A storage system is a hardware and software infrastructure designed to store, manage, and retrieve digital data.
Learn moreSwitchover
Switchover
A switchover refers to the process of transitioning from one system, component, or resource to another.
Learn moreSystem Monitoring
System Monitoring
System monitoring is the continuous observation and analysis of computer systems or networks to identify and respond to security threats.
Learn moreTrojan Horse
Trojan Horse
A trojan horse is a type of malware, that tricks users by disguising itself as a normal program.
Learn moreUnstructured Data
Unstructured Data
Unstructured data refers to digital information that does not have a predefined data model or organized structure.
Learn moreVM Ware
VM Ware
VMware is a software company that specializes in virtualization and cloud computing technology.
Learn moreVulnerability Scanner
Vulnerability Scanner
A vulnerability scanner is used to detect vulnerabilities in an IT environment.
Learn moreZero Trust
Zero Trust
Zero trust describes a security model where no user or device should be trusted by default.
Learn more