Home
Platform
Pricing
Use Cases
Eliminate exposed data
Stop data leakage
Reduce 3rd-party exposure
Monitor data transactions
Resources
Blog
Glossary
News
Webinars
Case Studies
Press releases
Company
Blog
News
About
Security
Contact
Join Our Team
Get a Demo
Start Free
Glossary
Featured Terms
Data movement / Data flow
Read More
Data Vulnerability
Read More
Compliance Violation
Read More
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Cloud Data Security Posture Management (DSPM)
Data Security Posture Management (DSPM) automates data identification, classification and movement tracking in public cloud workloads, enabling com...
Read More
Letter=C
Compliance Violation
Compliance Violations occur when a company’s data is not being managed correctly and therefore doesn’t follow regulations. For example...
Read More
Letter=C
Custodian
Unlike the data owner, Data Custodian refers to the creator of the data store who is in charge of maintaining it on...
Read More
Letter=C
DSPM Stages
Discovery, Custodianship, Classification, Data Movements mapping, Data Posture...
Read More
Letter=D
Data Chaos
Data Chaos is the state in which companies lose control over their sensitive data: where it is stored, where it can go, who can access it and what...
Read More
Letter=D
Data Inventory
An automatically and continuously maintained inventory of all company’s data, sensitive records, geographic location, cloud and network location, a...
Read More
Letter=D
Data Store
Managed - managed data stores are a cloud computing service in which the end user pays a cloud service provider (CSP) for access. Unlike a typical...
Read More
Letter=D
Data Vulnerability
Data vulnerability is an underlying weakness associated with a specific data store, which if not patched in time, exposes the data to a...
Read More
Letter=D
Data movement / Data flow
Data Flow defines the movement of data. Data can move between cloud vendors, accounts, services and even regions. When mapping data movement, we ca...
Read More
Letter=D
Data-Centric Security
A security approach which focuses its efforts on a company’s data stores first and foremost, detecting sensitive data, mapping its attack surface a...
Read More
Letter=D
Deployment: On Prem in the Cloud
Hybrid deployment model which is not completely SaaS, but also not entirely on-prem...
Read More
Letter=O
See, Follow & Protect
An automatically and continuously maintained inventory of all company’s data, sensitive records, geographic location, cloud and network location, a...
Read More
letter=S
Shadow Data
Shadow data is defined as any data, residing in managed or unmanaged data stores within the organization, that the company isn’t aware of its exist...
Read More
Letter=S