Find definitions and learn about the general application of common industry terms as they are used on this website.
The California Consumer Privacy Act (CCPA) is a privacy law solidifies consumers’ rights to data privacy, and creates new obligations for businesses that handle personal data.
Cloud Data Security
Cloud data security refers to the measures taken to protect data stored or processed in a cloud computing environment from unauthorized access, theft, or loss.
Cloud Security Posture Management
Cloud Security Posture Management (CSPM) identifies and fixes potential risks in diverse cloud infrastructures. CSPM tools provide a unified view of the security posture of cloud assets and cloud services. A robust CSPM solution and a solid Data Security and Posture Management (DSPM) solution will uplevel any company’s security posture.
Data Detection and Response (DDR) describes a technology-enabled solution for dynamically protecting data stored in the cloud.
Data Security Posture Management (DSPM) is an emerging cybersecurity practice, and set of related technologies, used to protect sensitive data stored in cloud environments.
A data breach is a security incident, in which an unauthorized actor gets access to sensitive or confidential information.
Data classification is the process of categorizing and labeling data based on its level of importance and sensitivity. It is a critical step in data security.
Data governance is the set of practices that ensure an organization’s effective management of data.
A data inventory is a comprehensive list of all the data assets that an organization has and where they are located.
The data lifecycle describes the stages involved in a data project – from generating the data records to interpreting the results.
Data Loss Prevention
Data Loss Prevention (DLP) is a set of technologies, processes, and policies used to prevent sensitive or confidential data from being lost, leaked, or accessed by unauthorized parties.
Data Movement / Data Flow
Data movement (sometimes referred to as data flow) is the transfer of data between cloud or on-premise data stores.
A data owner is a stakeholder responsible for the classification, protection, use, and quality of a dataset.
Data processing describes the actions required to transform raw data into meaningful information, as well as interpreting the results to uncover patterns and draw meaningful conclusions.
Data security is a general term for measures used to protect the data an organization collects and stores.
Data sprawl refers to the growing volumes of data produced by organizations, and the difficulties this creates in effectively managing and monitoring this data.
In the context of cloud infrastructure, a data store is a repository or container for storing data in the cloud – such as a database or object storage.
Data at Rest
Data at rest refers to data that is stored in a persistent state – typically on a hard drive, a server, a database, or in blob storage.
Data in Motion
Data in motion refers to data that is actively being transmitted or transferred over a network or through some other communication channel.
Data in Use
Data in use refers to data that is actively stored in computer memory, such as RAM, CPU caches, or CPU registers.
Data-centric security is an approach to data security that focuses on protecting the data itself – rather than the security of networks, servers, or applications that store the data.
Database as a Service
Database-as-a-service (DBaaS) is a type of cloud computing service that enables users to work with a managed database without purchasing or configuring infrastructure.
The General Data Protection Regulation (GDPR) is EU legislation with wide-reaching implications for data protection and security.
The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that establishes standards for protecting electronic health information.
Identity and Access Management (IAM) refers to processes and systems used to manage and control access to resources within a cloud computing environment.
An insider threat describes cybersecurity risk associated with malicious behavior by people within an organization.
A managed database is a database that is hosted and managed by a third-party provider, rather than by the organization using the database.
Multi-cloud is a type of software or data architecture, in which the same organization uses more than one 'cloud'.
The National Institute of Standards and Technology (NIST) is a non-regulatory agency and laboratory, operating as part of the US Department of Commerce.
The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard, designed to reduce payment card fraud by obligating companies that process or store credit card information to secure their environments.
Protected health information (PHI) is an individually identifiable record created by a HIPAA 'covered entity' which relates to a person's health status, health care, or payments.
Personally identifiable information (PII) refers to data that can be used to identify a specific person.
Ransomware is a type of malware attack where an attacker threatens to leak, delete, or make a victim's files inaccessible by encrypting them – unless the victim agrees to pay a ransom.
SOC 2 is a compliance and privacy standard that specifies how organizations should manage customer data and related systems in order to ensure confidentiality, integrity, and availability.
Sarbanes-Oxley (SOX) are regulations that protect investors from fraudulent financial reporting by obligating companies to maintain strong accounting and finance controls.
Secrets are pieces of private information used to authenticate and authorize access to protected resources or sensitive information.
Self-managed databases are database systems in which the database or cloud vendor provides the physical database server, but the user is responsible for setup, configuration, and maintenance of the database.
Semi-structured data refers to data that is not stored in a tabular format, but still has some level of hierarchy and separation between fields within a data record.
Shadow data is data that is created, stored, or shared without being formally managed or governed by the relevant IT teams.
Shadow IT refers to situations where individuals in an organization use IT-related hardware, software, applications, or services without the knowledge or authorization of the IT teams responsible for these tools.
Structured data is data that conforms to a specific format or structure that follows a predetermined set of rules, which makes it easy to search, sort, and analyze.
Unmanaged Data Store
An unmanaged data store is a type of database that is not supported by a cloud provider.
Unstructured data is data that lacks a predetermined structure or format. Some examples are text documents, images, or audio files.