CybersecurityData Protection

End-to-End Encryption

Overview

A communication system where only the communicating users can read the messages, with encryption at both endpoints.

Cross-References(1)

Cybersecurity

More in Cybersecurity

Security Orchestration Automation and Response

Defensive Security

Technology that automates security operations by orchestrating tools and processes for incident response.

Extended Detection and Response

Defensive Security

A unified security platform that integrates data from endpoints, networks, cloud workloads, and email to provide holistic threat detection, investigation, and automated response.

Security Audit

Security Governance

A systematic evaluation of an organisation's information system security by measuring compliance with established criteria.

Breach and Attack Simulation

Offensive Security

Automated security testing that continuously simulates real-world attack scenarios against production environments to validate defensive controls and identify security gaps.

Certificate Authority

Network Security

An entity that issues digital certificates, verifying the identity of organisations and encrypting communications.

Cloud Security Posture Management

Security Governance

Automated tools that continuously assess cloud infrastructure configurations against security best practices and compliance requirements, identifying and remediating misconfigurations.

Security by Design

Security Governance

An approach that integrates security considerations into every stage of the software development lifecycle.

Attack Surface Management

Offensive Security

The continuous discovery, inventory, classification, and monitoring of all external-facing digital assets to identify and reduce an organisation's exposure to cyber threats.