FIM
File integrity monitoring (FIM) → security control that monitors critical files and directories for unauthorized changes, helping detect malware, insider threats, or system tampering by alerting when files are modified.
SFC
System file checker (SFC) → built-in Windows utility that automatically verifies the integrity of protected system files and repairs them if they are altered, acting as an automated form of file integrity monitoring.
Tripwire
Tripwire → file integrity monitoring tool commonly used on Linux systems that detects and alerts on unauthorized changes to system files, configurations, or binaries.
DLP
Data loss prevention (DLP) → security technology that monitors, detects, and blocks sensitive data from being accessed, transmitted, or exfiltrated without authorization across endpoints, networks, or cloud services.
USB Blocking
USB blocking → endpoint security control that restricts or disables universal serial bus devices to prevent malware introduction, data exfiltration, or unauthorized device usage.
Endpoints
Endpoints → devices that connect to a network and interact with data, such as desktops, laptops, servers, mobile devices, and tablets, making them common targets for attacks.
Edge vs Access Control
Edge versus access control → edge controls protect traffic at network boundaries such as firewalls or gateways, while access controls enforce permissions at the user, device, or resource level such as authentication systems or file permissions.
Posture Assessment
Posture assessment → evaluation of a device’s security state, including patch level, antivirus status, and configuration, to determine whether it meets security requirements before granting access.
Persistent Agents
Persistent agents → security agents that remain installed on endpoints continuously, providing ongoing monitoring, visibility, and enforcement of security policies.
Dissolvable Agents
Dissolvable agents → temporary security agents that are deployed for a short period to assess posture or perform scans and then removed after completing their task.
Agentless NAC
Agentless network access control (NAC) → access control method that evaluates device security posture without installing software, typically using network scans or authentication checks.
EDR
Endpoint detection and response (EDR) → advanced endpoint security solution that continuously monitors behavior, detects threats, investigates incidents, and responds to attacks beyond traditional antivirus or intrusion prevention.
XDR
Extended detection and response (XDR) → security platform that extends endpoint detection and response by correlating data across endpoints, networks, email, and cloud environments to improve threat detection and response.