Skip to Content

Vendor Specific Terminology, Jargon and Acronyms


Cyber Security Acronyms and Jargon - What Clients See in Vendor Slide Decks


TermExpansionWhat it is / How it’s used
NGFWNext-Gen FirewallApp-aware firewalling with IPS, SSL/TLS inspection, and threat intelligence enforcement at the network edge.
SWGSecure Web GatewayWeb filtering, malware inspection, and policy enforcement for HTTP/HTTPS traffic, often cloud-delivered.
CASBCloud Access Security BrokerVisibility/control for SaaS usage (Shadow IT), DLP and policy enforcement for cloud apps.
ZTNAZero Trust Network AccessApp-level, identity-centric access instead of VPN; used for remote/hybrid access.
SASESecure Access Service EdgeConverges networking (SD-WAN) and security (SWG, CASB, ZTNA, FWaaS) as a cloud service.
SSESecurity Service EdgeThe security half of SASE (SWG, CASB, ZTNA, RBI, DLP) delivered from the cloud.
EDREndpoint Detection & ResponseTelemetry, detection, and response on endpoints; replaces/extends AV/EPP.
XDRExtended Detection & ResponseCorrelates signals across endpoints, network, identity, email, cloud to speed detection/response.
NDRNetwork Detection & ResponseEast–west and north–south traffic analytics to catch lateral movement and C2.
SIEMSecurity Information & Event ManagementCentral log analytics/correlation for detection, compliance and investigations.
SOARSecurity Orchestration, Automation & ResponsePlaybooks to automate triage and response actions across tools.
UEBAUser & Entity Behavior AnalyticsBaselines normal behaviour to detect anomalies and insider threats.
DLPData Loss PreventionFinds and controls sensitive data in motion/at rest/in use to stop leaks.
CNAPPCloud-Native App Protection PlatformUnifies CSPM, CWPP, CIEM, KSPM and runtime protection for cloud/K8s.
CSPMCloud Security Posture ManagementMisconfig detection and compliance for cloud accounts (AWS/Azure/GCP).
CWPPCloud Workload Protection PlatformRuntime protection for VMs, containers, and serverless.
CIEMCloud Infra Entitlement MgmtRights/role analysis in cloud to reduce excessive privileges.
KSPMKubernetes Security Posture MgmtMisconfigs and hardening guidance for clusters and workloads.
EASMExternal Attack Surface MgmtFinds internet-exposed assets and risks (shadow IT).
ASM/DRPAttack Surface Mgmt / Digital Risk ProtectionMonitors brand, domains, dark web, typosquats, credential leaks.
TIPThreat Intelligence PlatformAggregates/normalises IOCs, scoring and dissemination to controls.
BASBreach & Attack SimulationSafe, automated testing of controls vs ATT&CK techniques.
IAMIdentity & Access ManagementAuthN/Z, SSO, MFA, lifecycle; the control plane for Zero Trust.
PAMPrivileged Access ManagementVaults, rotates and brokers high-risk credentials/sessions.
IGAIdentity Governance & AdministrationJoiner/mover/leaver processes, certification, and SoD controls.
RASPRuntime App Self-ProtectionIn-process protection for web apps/APIs at runtime.
WAF/WAAPWeb App Firewall / Web App & API ProtectionBlocks OWASP Top 10, bot/DDoS for web and API traffic.
NACNetwork Access ControlDevice/user health and policy checks at connect time (802.1X, posture).
EPPEndpoint Protection PlatformPrevention-first (ML/AV/HIPS), usually feeding EDR.
MDRManaged Detection & Response24×7 monitoring/response delivered as a service.
MSSPManaged Security Service ProviderOperates/monitors customer security tech (firewalls, SIEM, etc.).
ZTAZero Trust Architecture“Never trust, always verify” across identity, device, network, data, apps.
FIDO2/WebAuthnPhishing-resistant MFA using passkeys/security keys.
EPP vs EDR vs XDRPrevention vs endpoint-centric detection vs multi-surface correlated detection.

Palo Alto Networks (PANW)

TermExpansionWhat it is / How it’s used
PAN-OSOS for PA-Series firewalls; App-ID/User-ID/Content-ID engines.
App-ID / User-IDApp/user identification for policy decisions in NGFW.
WildFireCloud sandbox + ML for malware analysis; feeds prevention.
AutoFocusThreat intel portal with campaign context from WildFire.
Cortex XDRXDR platform (endpoint + network + cloud telemetry).
Cortex XSOARSOAR/playbooks, case mgmt, threat intel mgmt.
Cortex XpanseEASM—discovers internet-exposed assets.
Prisma AccessSSE/SASE cloud security (SWG, ZTNA, FWaaS).
Prisma CloudCNAPP: CSPM, CWPP, CIEM, IaC scanning, runtime.
AIOps for NGFWHealth, drift and best-practice guidance for firewalls.

Fortinet

TermExpansionWhat it is / How it’s used
FortiGate / FortiOSNGFW platform and OS with ASIC acceleration (SPUs).
FortiManager / FortiAnalyzerCentralised management and analytics for Fortinet estate.
FortiGuardThreat intel services (IPS/AV/URL/DNS, etc.).
FortiEDREndpoint prevention/detection and response.
FortiNACNetwork Access Control and device profiling.
FortiWebWAF/WAAP for web apps and APIs.
FortiMailSecure email gateway with ATP and DLP.
FortiSandboxMalware detonation and analysis.
FortiSASECloud-delivered SSE/SASE.
FortiSIEMSIEM for multi-tenant SOC use.

Check Point

TermExpansionWhat it is / How it’s used
QuantumNGFW appliances and software blades.
R8xSecurity Gateway/Gaia releases (e.g., R81).
ThreatCloudGlobal threat intelligence backbone.
HarmonyUser/device suite (Endpoint, Mobile, Email, Browse).
CloudGuardCloud and workload security (CSPM/CWPP/WAF).
InfinityUnified architecture/licensing across portfolio.
MaestroHyperscale security (chassis-style clustering).

Cisco Security

TermExpansionWhat it is / How it’s used
FTD / FMCFirepower Threat Defense / Mgmt CenterNGFW software + central manager.
TalosCisco threat intelligence organisation.
DuoMFA/SSO and device trust (Zero Trust).
UmbrellaDNS-layer security + SWG + CASB.
ISEIdentity Services EngineNAC/802.1X, posture and segmentation policy.
Secure Endpoint(formerly AMP)EPP/EDR agent with cloud analytics.
SecureXIntegration/federated search and case mgmt across Cisco stack.
AnyConnect / Secure ClientVPN/agent bundle for remote access and posture.

Microsoft Security

TermExpansionWhat it is / How it’s used
MDEDefender for EndpointEPP/EDR with threat/attack surface reduction.
MDIDefender for IdentityAD/Azure AD identity threat detection.
MDODefender for Office 365Email/Teams/SharePoint threat protection.
MDCDefender for CloudCSPM/CNAPP across Azure/AWS/GCP.
Entra IDMicrosoft’s identity platform (formerly Azure AD).
SentinelCloud SIEM/SOAR with native connectors.
PurviewData governance/DLP/IRM and insider risk.

CrowdStrike

TermExpansionWhat it is / How it’s used
FalconCloud-native platform; modules licensed à la carte.
Falcon InsightEDR telemetry, detections, response.
Falcon PreventNGAV prevention engine.
Falcon DiscoverIT hygiene/asset/identity exposure visibility.
Falcon Identity ProtectionIdentity threat detection/SSO risk signals.
Falcon SpotlightVulnerability assessment.
Falcon OverWatch24×7 managed threat hunting.
Falcon LogScaleHigh-speed logging/observability (ex-Humio).
Falcon XThreat intel and malware analysis.

SentinelOne

TermExpansionWhat it is / How it’s used
Singularity PlatformEPP/EDR/XDR with autonomous agents.
RangerAsset discovery and network visibility.
RemoteOpsScalable remote scripting/response.
Singularity Data LakeTelemetry storage/analytics.

Sophos

TermExpansionWhat it is / How it’s used
Intercept XEPP/EDR with anti-exploit and CryptoGuard.
XDRCross-product detection/response.
Sophos Firewall (XGS)NGFW appliances.
CentralCloud management plane.
MTRManaged Threat ResponseSophos MDR service.

Trend Micro

TermExpansionWhat it is / How it’s used
Vision OneXDR across endpoint/email/cloud/network.
Apex OneEndpoint protection and EDR.
Cloud OneCNAPP modules (CSPM, CWPP, containers, files).

Email security:

Proofpoint | Mimecast | Microsoft | Google

Vendor TermExpansionWhat it is / How it’s used
Proofpoint TAPTargeted Attack ProtectionURL rewriting, sandboxing, BEC controls.
Proofpoint TRAPThreat Response Auto-PullAuto-removal of malicious emails post-delivery.
Mimecast TTPTargeted Threat ProtectionURL/attachment defence, impersonation protect.
DMARC AnalyzerHosted DMARC monitoring and enforcement tooling (Mimecast/others).
MDODefender for Office 365Microsoft email security stack.
Gmail ATP (Workspace)Google phishing/malware/URL defences.

Zero Trust - SSE leaders:

Zscaler | Netskope | Cloudflare

Vendor TermExpansionWhat it is / How it’s used
ZIAZscaler Internet AccessSWG/CASB/DLP to internet/SaaS.
ZPAZscaler Private AccessZTNA to private apps.
ZDXZscaler Digital ExperienceExperience and path monitoring.
Netskope NGSWGNext-Gen SWGInline SSE with CASB/DLP/ATP.
Netskope SSPMSaaS Security Posture MgmtHardening SaaS tenants.
Cloudflare Zero TrustSWG, ZTNA, CASB, DNS, RBI on Cloudflare network.
Magic TransitCloud DDoS/L3-4 protection for networks.

App/API & Edge Security:

Akamai | F5 | Imperva | Cloudflare

Vendor TermExpansionWhat it is / How it’s used
Akamai Kona / App & API ProtectorWAF/WAAP on Akamai edge.
Akamai ProlexicHigh-capacity DDoS mitigation.
F5 BIG-IP ASM/Adv WAFOn-prem/virtual WAF/WAAP with bot and API defence.
F5 BIG-IP AFML3-4 DDoS/network firewall.
Imperva WAF / DDoS / RASPWAAP suite incl. runtime protection.
Cloudflare WAF/Bot MgmtEdge WAF + bot controls + API Shield.

Identity:

Okta | Ping Identity | CyberArk | BeyondTrust | Delinea

Vendor TermExpansionWhat it is / How it’s used
Okta Workforce IdentitySSO/MFA/LLMNR? (core IdP for apps).
Okta ASAAdvanced Server AccessSSH/RDP access with short-lived certs.
PingFederate / PingIDEnterprise SSO/federation and MFA.
CyberArk PAMPrivileged vault, rotation, session isolation.
CyberArk EPMEndpoint Privilege ManagerLeast privilege on endpoints/servers.
BeyondTrust Password SafePAM vault and session management.
BeyondTrust Privilege MgmtEndpoint/server privilege controls.
Delinea Secret ServerPAM vault and workflow (ex-Thycotic).

SIEM | SOAR | Data-lake:

Splunk | IBM | Google | Elastic | Exabeam | Sumo

Vendor TermExpansionWhat it is / How it’s used
Splunk ESEnterprise SecuritySIEM content pack on Splunk platform.
Splunk SOARPlaybooks/automation (ex-Phantom).
IBM QRadar SIEM/SOARCorrelation + runbooks/case mgmt.
Google ChronicleHigh-scale cloud SIEM + rules/YARA-L.
Google SecOps SOARChronicle-integrated automation/cases.
Elastic SecuritySIEM + endpoint on Elastic Stack.
Exabeam FusionUEBA-driven SIEM with TDIR content.
Sumo Logic Cloud SIEMSaaS SIEM with detections/apps.

Vulnerability, Exposure & Pentest:

Tenable | Qualys | Rapid7 | AttackIQ

Vendor TermExpansionWhat it is / How it’s used
Tenable NessusScanner for vuln assessment.
Tenable.io / Tenable OneSaaS VM/cloud/EASM exposure mgmt.
Qualys VMDRVulnerability Mgmt, Detection & Response suite.
Qualys TruRiskNormalised risk scoring across assets/vulns.
Rapid7 InsightVMVulnerability mgmt with remediation analytics.
Rapid7 InsightIDRSIEM/XDR with UEBA.
Rapid7 InsightAppSecDAST for web applications.
Pentest/BAS (AttackIQ, Cymulate, SafeBreach)Continuous control validation and purple-team automation.

Cloud & Container Security:

Wiz | Lacework | Orca | Aqua | Sysdig | Snyk | Prisma

Vendor TermExpansionWhat it is / How it’s used
WizAgentless CNAPP (CSPM/CWPP/CIEM) with “toxic combo” risk.
LaceworkBehaviour-based CNAPP with polygraph analysis.
Orca SecuritySide-scanning CNAPP across cloud estates.
Aqua PlatformContainer/K8s runtime security, supply-chain controls.
Sysdig SecureFalco-based runtime/container threat detection.
SnykDev-first SCA/Code/Container/IaC scanning.
Prisma CloudPANW CNAPP (see section B).

OT/IoT & Network Detection:

Darktrace | Vectra | ExtraHop | Armis | Nozomi | Claroty | Dragos

Vendor TermExpansionWhat it is / How it’s used
Darktrace DETECT/RESPONDSelf-learning AI for NDR/email/OT with autonomous response.
Vectra NDR / Cognito DetectAI-driven NDR for network/IDP/M365.
ExtraHop Reveal(x)NDR via L7 analytics/Decryption-at-scale options.
ArmisAsset intelligence for IoT/IoMT/OT.
Nozomi GuardianOT visibility/threat detection.
Claroty xDome/EdgeOT/IoT/IIoT risk and segmentation.
Dragos PlatformICS/OT threat detection/intel.

Backup, DR & Data Security:

Rubrik | Cohesity | Veeam | Commvault | Skyhigh

Vendor TermExpansionWhat it is / How it’s used
Rubrik Security CloudImmutable backups, ransomware monitoring, data risk insights.
Cohesity DataProtectBackup with threat/PII discovery and rapid restore.
Veeam VBRBackup & ReplicationBackup/RPO-RTO orchestration; immutability options.
Commvault MetallicSaaS backup/data protection.
Skyhigh SecuritySSE/DLP (ex-McAfee Enterprise SSE).

Application Security:

Veracode | Checkmarx | GitHub | GitLab | HashiCorp

Vendor TermExpansionWhat it is / How it’s used
VeracodeSAST/DAST/SCA for SDLC governance.
Checkmarx OneUnified AppSec (SAST/IAST/SCA/KICS).
GitHub Advanced Security (GHAS)CodeQL, secret scanning, dependabot alerts.
GitLab Ultimate / SecureBuilt-in SAST/DAST/IAST/DA/Secret scanning.
HashiCorp VaultSecrets mgmt, KMS, dynamic creds and encryption.

Threat Intel, Phishing & Awareness

Vendor TermExpansionWhat it is / How it’s used
Recorded FutureTIP with risk scoring and intel modules.
Anomali ThreatStreamTIP and detection content.
Mandiant AdvantageIntel, validation and expertise (Google Cloud).
CofensePhishing simulations and reporting (Triage/Vision).
KnowBe4Awareness training and phishing tests.
IRONSCALESAI-assisted email threat detection and user reporting.

Legacy/Combined:

McAfee/Trellix | FireEye | Bitdefender | ESET | Trend Micro | Kaspersky

Vendor TermExpansionWhat it is / How it’s used
Trellix HelixXDR/SIEM-like analytics and response.
Trellix EDR/ENS/ePOEndpoint suite with central mgmt.
FireEye NX/EX/HXNetwork/email/endpoint detection (many now Trellix).
Bitdefender GravityZoneEPP/EDR/XDR and risk analytics.
ESET PROTECTEndpoint suite and management.
Kaspersky EDR OptimumEndpoint prevention and response.

More Everyday Acronyms Clients Ask About

TermExpansionWhat it is / How it’s used
MITRE ATT&CKCommon language of adversary TTPs; used to map detections/coverage.
IOC/IOAIndicators of Compromise/AttackAtomic signals and behavioural patterns for detection.
C2/C&CCommand & ControlAttacker’s remote control channel; NDR/EDR aim to disrupt.
BECBusiness Email CompromiseSocial-engineering wire fraud; email security + process controls mitigate.
APTAdvanced Persistent ThreatLong-dwell, well-resourced adversaries; layered controls needed.
DGADomain Generation AlgorithmMalware domain churn; DNS security detects/blocks.
LOLBinsLiving-Off-the-Land BinariesLegit tools abused by attackers; EDR detects misuse.
SBOMSoftware Bill of MaterialsInventory of components; used in AppSec and compliance.
NIST CSF / ISO 27001Security frameworks for governance and audit.
PCI DSS / HIPAA / GDPR / POPIARegulatory regimes driving control requirements and audits.