An intrusion detection system monitors traffic or activity for suspicious patterns and generates alerts without necessarily blocking the activity itself.
An intrusion prevention system inspects traffic for suspicious patterns and can automatically block or stop activity that matches defined prevention logic.
Zero trust network access provides narrower, identity-aware access to applications without assuming that network location alone should grant broad trust.
DNS filtering is the practice of controlling domain name resolution so users and systems are blocked from reaching known malicious or unwanted destinations.
Email security is the set of controls used to protect email systems, messages, users, and workflows from compromise, fraud, malware, and data exposure.
Domain Name System Security Extensions adds authenticity and integrity protection to DNS data so resolvers can detect certain forms of tampering or spoofing.
A denylist is a rule set that blocks specified users, applications, addresses, domains, or other items while allowing the rest unless another rule stops them.
A man-in-the-middle attack is an interception scenario where an attacker places themselves between communicating parties to observe, alter, or relay traffic without proper authorization.
Email authentication is the set of controls used to help mail systems evaluate whether a message was sent by an authorized source and handled in an expected way.