{"id":25617,"date":"2023-10-25T15:08:54","date_gmt":"2023-10-25T13:08:54","guid":{"rendered":"https:\/\/enginsight.com\/glossary\/"},"modified":"2023-10-25T15:09:06","modified_gmt":"2023-10-25T13:09:06","slug":"glossary","status":"publish","type":"page","link":"https:\/\/enginsight.com\/en\/glossary\/","title":{"rendered":"Glossary"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"25617\" class=\"elementor elementor-25617 elementor-6656\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b590c0e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b590c0e\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fe53ad\" data-id=\"3fe53ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1247037 elementor-widget elementor-widget-heading\" data-id=\"1247037\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Knowledge base<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5950bff elementor-widget elementor-widget-heading\" data-id=\"5950bff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Enginsight &#x2013; Cybersecurity Glossary<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8b38fc9 elementor-widget elementor-widget-text-editor\" data-id=\"8b38fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity is becoming increasingly important in today&#x2019;s world. In our Cybersecurity Glossary, you will find definitions of important cybersecurity terms, best practices and examples from IT security.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-0a3cc3c\" data-id=\"0a3cc3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43873da elementor-widget elementor-widget-image\" data-id=\"43873da\" data-element_type=\"widget\" data-e-type=\"widget\" title=\"Enginsight Cybersecurity Glossar\" alt=\"Enginsight Cybersecurity Glossar\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"522\" height=\"446\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/cybersecurity-glossar-1.png\" class=\"attachment-large size-large wp-image-21177\" alt=\"Cybersecurity Glossar\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/cybersecurity-glossar-1.png 522w, https:\/\/enginsight.com\/wp-content\/uploads\/cybersecurity-glossar-1-300x256.png 300w\" sizes=\"(max-width: 522px) 100vw, 522px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b36564e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b36564e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6904c8c5\" data-id=\"6904c8c5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f17f3ce elementor-widget elementor-widget-shortcode\" data-id=\"f17f3ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><form method=\"post\" action=\"https:\/\/enginsight.com\/en\/glossary\/\">\t\t\t\t\t<div class=\"cmtt_help glossary-search-helpitem\" data-cmtooltip=\"The search returns the partial search for the given query from both the term title and description. So it will return the results even if the given query is part of the word in the description.\"><\/div>&#13;\n\t\t\t\t<span class=\"glossary-search-label\">Suchen:<\/span>&#13;\n\t\t<input type=\"search\" value=\"\" placeholder=\"\" class=\"glossary-search-term \" name=\"search_term\" id=\"glossary-search-term\">&#13;\n\t\t<button type=\"submit\" id=\"glossary-search\" class=\"glossary-search button\">Suchen<\/button>&#13;\n\t\t<\/form><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cefe21 elementor-widget elementor-widget-shortcode\" data-id=\"4cefe21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\"><div class=\"cm-glossary classic-definition\"><div class=\"glossary-container \"><input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"glossary_index_style\" value=\"classic-definition\">        <div class=\"progress-indicator\" style=\"display:none\">&#13;\n                            <img decoding=\"async\" src=\"https:\/\/enginsight.com\/wp-content\/plugins\/TooltipProPlus\/assets\/css\/images\/ajax-loader.gif\" alt=\"AJAX progress indicator\"\/>&#13;\n                    <\/div>&#13;\n\t\t<div class=\"glossary_top_filter\">&#13;\n\t\t\t<div class=\"left\">&#13;\n\t\t\t\t\t\t\t<\/div>&#13;\n\t\t\t\t\t<\/div>&#13;\n&#13;\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"disable_listnav\" value=\"1\">&#13;\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"exact_search\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"cmtt-attribute-field\" name=\"show_search\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"glossary-hide-terms\" name=\"glossary-hide-terms\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"glossary-hide-categories\" name=\"glossary-hide-categories\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"glossary-hide-abbrevs\" name=\"glossary-hide-abbrevs\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"glossary-hide-synonyms\" name=\"glossary-hide-synonyms\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" class=\"glossary-perpage\" name=\"glossary-perpage\" value=\"0\">&#13;\n\t\t<input type=\"hidden\" name=\"tooltip_language\" value=\"\">&#13;\n\t\t<input type=\"hidden\" name=\"language_dropdown\" value=\"\">&#13;\n\t\t<input type=\"hidden\" name=\"languages_for_table\" value=\"\">&#13;\n\t\t<div id=\"glossaryList-nav\" class=\"listNav small\" role=\"tablist\"><\/div><ul class=\"glossaryList\" role=\"tablist\" id=\"glossaryList\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTermSet\"><li class=\" ln-18\" itemscope itemtype=\"https:\/\/schema.org\/DefinedTerm\"><a href=\"https:\/\/enginsight.com\/en\/glossary\/siem-security-information-and-event-management\/\" role=\"term\" class=\"glossaryLink glossary-link-title \" style=\"\" itemprop=\"url\"><span itemprop=\"name\">SIEM - Security Information and Event Management<\/span><\/a><dfn class=\"glossary_itemdesc\" role=\"definition\" itemprop=\"description\">\nWhat is a SIEM?\n\nSIEM, short for &quot;Security Information and Event Management,&quot; is an integrated security system that collects, analyzes, and manages security data from various sources.\n\nIn contrast to traditional security systems, SIEM offers a consolidated and holistic view of a company's IT(...)<\/dfn><\/li><\/ul><\/div><div class=\"clear clearfix cmtt-clearfix\"><\/div><\/div><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-bd01430 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bd01430\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4d9e34b\" data-id=\"4d9e34b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-63e9d81 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"63e9d81\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-c968546\" data-id=\"c968546\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1118de1 elementor-widget elementor-widget-heading\" data-id=\"1118de1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Understandable definitions of IT terms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f107b elementor-widget elementor-widget-text-editor\" data-id=\"d6f107b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the day-to-day work of companies, we are overwhelmed by a flood of IT terms every day. However, it is difficult for most to be familiar with IT terminology such as spoofing, virtualization or managed services. But how do you keep track of things in such an environment?<\/p>\n<p>A quick answer is provided by our Cybersecurity Lexicon, which gives you quick input on complex IT terms, offers explanations and also translates the technical terms into English.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5c33c3d\" data-id=\"5c33c3d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9455704 elementor-widget elementor-widget-image\" data-id=\"9455704\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"488\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/it-office-umgebung.jpg\" class=\"attachment-large size-large wp-image-21164\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/it-office-umgebung.jpg 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/it-office-umgebung-300x183.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/it-office-umgebung-768x469.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f37101 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f37101\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8294731\" data-id=\"8294731\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81b7498 elementor-widget elementor-widget-image\" data-id=\"81b7498\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"620\" src=\"https:\/\/enginsight.com\/wp-content\/uploads\/2018\/07\/authlogo-1024x794.jpg\" class=\"attachment-large size-large wp-image-3816\" alt=\"\" srcset=\"https:\/\/enginsight.com\/wp-content\/uploads\/2018\/07\/authlogo.jpg 1024w, https:\/\/enginsight.com\/wp-content\/uploads\/2018\/07\/authlogo-300x233.jpg 300w, https:\/\/enginsight.com\/wp-content\/uploads\/2018\/07\/authlogo-768x595.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\"\/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-14801d9\" data-id=\"14801d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cd7511 elementor-widget elementor-widget-heading\" data-id=\"2cd7511\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Glossary: The ABC of IT Terms<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d2c35b elementor-widget elementor-widget-text-editor\" data-id=\"4d2c35b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The goal of the Enginsight Cybersecurity Glossary is to explain notable cybersecurity terms in a clear and understandable way. Our security lexicon is aimed at all companies that want to gain a better understanding of the complexity of IT terms. Our cybersecurity glossary is continually expanded and updated with the latest data.<\/p>\n<p>Search for targeted IT terms quickly and easily, or click on one of the terms that have already been suggested.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section data-gradient='{\"angle\":-45,\"colors\":[{\"premium_gradient_colors\":\"#292fda\",\"_id\":\"bf2119f\"},{\"premium_gradient_colors\":\"#4800c6\",\"_id\":\"247101d\"},{\"premium_gradient_colors\":\"#d61971\",\"_id\":\"ea5eb6c\"},{\"premium_gradient_colors\":\"#fda629\",\"_id\":\"1e64f54\"}]}' class=\"elementor-section elementor-top-section elementor-element elementor-element-7afa4f0 elementor-section-stretched elementor-section-content-middle premium-gradient-yes elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7afa4f0\" data-element_type=\"section\" data-e-type=\"section\" data-settings='{\"stretch_section\":\"section-stretched\",\"background_background\":\"classic\"}'>\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-40408ef elementor-invisible\" data-id=\"40408ef\" data-element_type=\"column\" data-e-type=\"column\" data-settings='{\"background_background\":\"classic\",\"animation\":\"fadeInLeft\"}'>\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37c2f01 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"37c2f01\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"far fa-comment-alt\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3fc6209 elementor-widget elementor-widget-heading\" data-id=\"3fc6209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Any questions?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33ce387 elementor-widget elementor-widget-text-editor\" data-id=\"33ce387\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You are welcome to contact us about IT security and Enginsight.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a35deb5 elementor-widget elementor-widget-text-editor\" data-id=\"a35deb5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>hello@enginsight.com<br>+49 (0)3641 2714966<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Knowledge base Enginsight &#x2013; Cybersecurity Glossary Cybersecurity is becoming increasingly important in today&#x2019;s world. In our Cybersecurity Glossary, you will find definitions of important cybersecurity terms, best practices and examples from IT security. Understandable definitions of IT terms In the day-to-day work of companies, we are overwhelmed by a flood of IT terms every day. [&#x2026;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","_eb_attr":"","footnotes":""},"class_list":["post-25617","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/25617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/comments?post=25617"}],"version-history":[{"count":0,"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/pages\/25617\/revisions"}],"wp:attachment":[{"href":"https:\/\/enginsight.com\/en\/wp-json\/wp\/v2\/media?parent=25617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}