Logo Teldat
Glossary

What is a Firewall?

A firewall monitors and controls network traffic based on predefined security rules, blocking unauthorized access and threats.

What is an NGFW?

An NGFW inspects traffic from layer 3 to layer 7 with DPI, IPS, and application control. NGFW vs. firewall vs. UTM, and its role in SASE.

What is Cybersecurity?

Cybersecurity protects networks, devices, and data from cyberattacks. Defense layers, common threats, the NIS2 Directive, and be.Safe solutions.

What is ENS (Esquema Nacional de Seguridad)?

What is ENS (Esquema Nacional de Seguridad)? Spanish legal regulation that establishes the security policy for protecting information and electronic services.

What is IDS/ IPS?

IDS monitors network traffic for threats. IPS detects and blocks attacks in real time.

What is NIS2 Directive?

What is NIS2 Directive?

What is OT (Operational Technology)?

[et_pb_section fb_built="1" admin_label="Global CSS" _builder_version="4.19.4" global_colors_info="{}"][et_pb_row _builder_version="4.19.4" global_colors_info="{}"][et_pb_column type="4_4" _builder_version="4.19.4" global_colors_info="{}"][et_pb_code admin_label="CSS + Schema" _builder_version="4.19.4" global_colors_info="{}"][/et_pb_code][/et_pb_column][/et_pb_row][/et_pb_section][et_pb_section fb_built="1" admin_label="Hero" _builder_version="4.19.4" global_colors_info="{}"][et_pb_row _builder_version="4.19.4" module_alignment="center" global_colors_info="{}"][et_pb_column type="4_4" _builder_version="4.19.4" global_colors_info="{}"][et_pb_text…

What is Phishing?

Phishing tricks users into revealing credentials via email, phone, or SMS.

What is Ransomware?

Ransomware encrypts data and demands payment: types, attack vectors, economic impact and prevention.

What is SASE?

SASE (Secure Access Service Edge) is a cloud architecture that unifies SD-WAN with security services like SWG, CASB, ZTNA and FWaaS.

What is SSE (Security Service Edge)?

Security Service Edge (SSE) is the cloud delivered security half of SASE.

What is XDR – Extented Detection and Response?

XDR unifies threat data from endpoints, networks, cloud, and email for AI-powered detection and response. XDR vs. EDR vs. SIEM.

What is Zero Trust SD-WAN?

Zero Trust SD-WAN embeds identity-based segmentation, ZTNA, and embedded NGFW into SD-WAN networks.

What is Zero Trust?

What are Zero Trust, Zero Trust Network Access (ZTNA), and Zero Trust SD-WAN?

What is ZTNA?

ZTNA verifies every user and device before granting access, replacing implicit trust with least-privilege control. ZTNA vs VPN and its role in SASE.

Why switch from VPN to ZTNA?

Comparation ZTNA vs VPN: attack surface, lateral movement, user experience, and scalability.

XDR vs EDR vs NDR vs SIEM

Compare XDR, EDR, NDR, and SIEM side by side: scope, detection methods, automated response, and when to use each.