Platform
Platform
How it works
Watch a demo
Asset analysis
Integrations
Pricing
Pricing
Business case
ROI
Resources
Resources
Case studies
Blog
Books & Reports
Events
Company
Company
About
Contact
Careers
Partners
Community
Community
Support
Questions library
Documentation
Sign In
Get a Demo
Thank you! Your submission has been received!
Please enter a valid email address
Glossary of terms
A
Access management
Asset inventory
Attack surface analysis
Attack surface management
C
Cloud asset management
Cloud native cybersecurity
Critical assets
Crown jewels
Cyber asset attack surface management (CAASM)
Cyber asset management
Cyber assets
Cyber attack surface
Cyber hygiene
Cyber risk management
D
Data breach
G
Governance, risk, and compliance (GRC)
I
ISO 27001
Identity management
N
NIST
P
Privilege management
S
SOC 2
Security operations
Security posture
V
Vulnerability management
Z
Zero trust