A secure web gateway (SWG) is a security solution that prevents unsecured internet traffic from entering an organization’s internal network. It’s used by enterprises to protect employees and users from accessing or being infected by malicious websites and web traffic, internet-borne viruses, malware, and other cyberthreats. It also helps to ensure regulatory compliance.
Network security is the strategic combination of hardware and software designed to protect sensitive data in a computer network. Network access controls, intrusion detection, and many other types of network security functions work together to secure the environment against unauthorized access, data breaches, malware delivery, and other cyberattacks.
A denial-of-service (DoS) attack is a cyberattack in which cybercriminals disrupt the service of an internet-connected host to its intended users. This is done by sending the targeted network or server a constant flood of traffic, such as fraudulent requests, which overwhelms the system and prevents it from processing legitimate traffic.
Multiprotocol label switching (MPLS) is a method of wide area networking (WAN) that routes traffic using labels—not network addresses—to determine the shortest possible path for packet forwarding. It labels each data packet and controls the path it follows rather than sending it from router to router through packet switching. It’s intended to minimize downtime, improve quality of service (QoS), and ensure traffic moves as quickly as possible.
Software-defined perimeter (SDP) is a security methodology that distributes access to internal applications based on a user’s identity, with trust that adapts based on context. Where traditional security is centralized in the data center, SDP is everywhere, delivered by the cloud. It uses business policy to determine user authentication to resources, making it an important part of securing cloud- and mobile-first organizations.
A reverse proxy is a server, app, or cloud service that sits in front of one or more web servers to intercept and inspect incoming client requests before forwarding them to the web server and subsequently returning the server’s response to the client. This supports security, scalability, and performance for websites, cloud services, and content delivery networks (CDNs). A reverse proxy offered as a cloud service is one of the deployment modes of a cloud access security broker (CASB).
OT security is the measures and controls in place to protect OT systems—which use purpose-built software to automate industrial processes—against cybersecurity threats. As the convergence of information technology and OT drives greater automation and efficiency in industrial systems, OT security has become a requirement of critical infrastructure management.
Lateral movement is a set of techniques cybercriminals use to access other devices, apps, or assets on a network after they first compromise an endpoint. Using stolen login credentials or other methods of privilege escalation, threat actors move through the network as they close in on sensitive data. With their activities disguised as permitted network traffic, attackers can avoid detection and prolong their attacks.