Glossary

We frequently update our glossary with terms that may be used in our products and in our industry in general.

 

  • Anomaly Detection

    Anomaly detection identifies network intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous.

  • Attack Signature

    These signatures reflect patterns in system or network activity that signal a possible virus or hacker attack. IPS and firewalls use these signatures to distinguish between legitimate and potentially malicious activity.

Log in