PRODUCTS
ADM Platform
Platform Overview
Data Masking
Data Discovery
Data Subsetting
Data Automation
Data Tokenization
Use Cases
Static Data Masking
Test Data Management
Agile DevOps CI/CD
Security + Compliance
Hybrid Cloud / Multicloud
ADM Resources
Viewpoints
Software Advice
Guides + Whitepapers
Data Masking Case study
Get started with ADM
View Tiers + Pricing
Request Demo
SOLUTIONS
Industries
Financial Services
Healthcare
Retail
Insurance
Telecommunications
Public Sector
Databases
Databases + Data Sources for ADM
Data Security for Oracle
Data Masking for Temenos Core Banking (T24 / Transact)
Microsoft SQL Server Data Masking
Data Masking for MySQL
Data Masking for PostgreSQL
SERVICES
Center of Excellence
Data Protection, Cryptography + IAM Center of Excellence
Cybersecurity Assessments
ADM Services
Cybersecurity Needs Assessment & Solution Selection
Cybersecurity Research and Consulting
Software Development & API Integration
Cybersecurity Staff Augmentation
Cryptography + Data Security
Cryptography and Encryption
Key Management Systems (KMS)
Secrets Management
Hardware Security Modules
Certificate Lifecycle Management (CLM) & Machine Identity Management (MIM)
Public Key Infrastructure (PKI)
Test Data Management Services
Tokenization, Obfuscation, Anonymization, & Masking
Identity and Access Management
Identity and Access Management (IAM)
Customer Identity and Access Management (CIAM)
Know Your Customer (KYC) + Identity Verification (IDV)
Online Fraud Detection (OFD)
PARTNERS
Partner Network
Partner Network
Certified Partner Services
Thales
Thales Overview
Thales Managed Services (MSP)
Thales Health Checks + Assessments
Thales Technical Account Management + Staff Augmentation
Thales Solution Implementation + Journey Planning
Thales Platform Upgrades + Migrations
Thales Training Services
Venafi
Venafi Overview
Venafi Managed Services (MSP)
Venafi Health Checks + Assessments
Venafi Technical Account Management + Staff Augmentation
Venafi Solution Implementation + Journey Planning
Venafi Platform Upgrades + Migrations
Venafi Training Services
Keyfactor
Keyfactor Overview
Keyfactor Managed Services (MSP)
Keyfactor Health Checks + Assessments
Keyfactor Technical Account Management + Staff Augmentation
Keyfactor Solution Implementation + Journey Planning
Keyfactor Platform Upgrades + Migrations
Keyfactor Training Services
Partner Network
Partner Network
Certified Partner Services
Thales
Venafi
Keyfactor
HID
Thales
Thales Overview
Thales Managed Services (MSP)
Thales Health Checks + Assessments
Thales Technical Account Management + Staff Augmentation
Thales Solution Implementation + Journey Planning
Thales Platform Upgrades + Migrations
Thales Training Services
Venafi
Venafi Overview
Venafi Managed Services (MSP)
Venafi Health Checks + Assessments
Venafi Technical Account Management + Staff Augmentation
Venafi Solution Implementation + Journey Planning
Venafi Platform Upgrades + Migrations
Venafi Training Services
Keyfactor
Keyfactor Overview
Keyfactor Managed Services (MSP)
Keyfactor Health Checks + Assessments
Keyfactor Technical Account Management + Staff Augmentation
Keyfactor Solution Implementation + Journey Planning
Keyfactor Platform Upgrades + Migrations
Keyfactor Training Services
HID
HID Services Overview
HID Identity Verification (IDV)
Insights
Insights
Articles
Case Studies
Solution Briefs
Videos
Whitepapers
View All
COMPANY
Company
About Us
Support Hub
Newsroom
Community Impact
Contact Us
Innovation Lab
Try before you buy : Discover, evaluate, and test the top cybersecurity tools in the market, before you invest.
Learn More
Download Resource
X
Request a Demo
Get in Touch
Accutive Security Glossary
A comprehensive glossary for important cryptography, IAM + data security terms + international compliance standards
A
B
C
D
E
F
G
H
I
J
K
L
M
N
P
R
S
T
U
W
Z
A
Access Management
Adaptive Authentication
Adaptive Multi-Factor Authentication
Application Network
Argentina: The Personal Data Protection law
Attack Surface
Australian Securities Investment Commission
Australia: Privacy Act 1988
Authentication
Authentication Factors
Authorization
B
Basel III
BeyondCorp
Brazil: General Data Protection Law
Brute Force
C
California Consumer Privacy Act
California Privacy Rights Act
Canada: Personal information Protection and Electronic Documents Act
Chile: Ley de Protección de Datos Personales
China: Personal Information Security Specification (PISS)
CICD Pipeline
Cloud Identity Management
Cloud Migration
Colombia: Personal Data Protection Statute
Continuous Authentication
Continuous Delivery
Continuous Integration
Costa Rica: Law on Protection of the Person Against the Processing of their Personal Data
Customer Identity Access Management (CIAM)
D
Data Breach
Data Breach Prevention
Data Discovery
Data Governance
Data Masking
Data Privacy
Data Virtualization
Deprovisioning
DevOps
E
Employee Identity Management
European Union: General Data Protection Regulation
F
Federated Identity System
G
GDPR Compliance
H
HIPAA: Health Insurance Portability and Accountability Act
Hong Kong: Personal Data (Privacy) Ordinance (PDPO)
I
Identity and Access Management
Identity as a Service
Identity Management
Incident Response Planning
India: Personal Data Protection Bill
Indonesia: Personal Data Protection Bill
Israel: Protection of Privacy Law
J
Japan: Act on the Protection of Personal Information
JSON Web Token
K
Kenya: Data Protection Act of 2019
L
LDAP
Least Privileged Access Control
Lifecycle Management
M
Malaysia: The Personal Data Protection Act
Mexico: Federal Law on Protection of Personal Data Held by Private Parties (LFPDPPP)
Mobility Management
Multi-cloud Strategy
Multi-Factor Authentication
N
New Zealand: Privacy Act 2020
Nigeria: The Nigeria Data Protection Regulation
Norway: Personal Data Act
NY Shield
P
Pakistan: Prevention of Electronic Crimes Act
Passwordless Authentication
Password Spray
Payment Card Industry Data Security Standard
Peru: Personal Data Protection Law
Philippines: Data Privacy Act
Phishing
PIPEDA
Provisioning
Public key Cryptography
R
Russia: Federal Law No. 152-FZ “On Personal Data”
S
SAML
SCIM
Singapore: Personal Dat Protection Act
South Africa: The Protection of Personal Information Act
South Korea: Personal Information Protection Act
Static Data Masking
Switzerland: Federal Data Protection Act
T
Taiwan: Personal Data Protection Act
Test Data Management
Thailand: Personal Data Protection Act
The Hong Kong Monetary Authority
The Japan Act on the Protection of Personal Information
The Massachusetts data protection law
The Monetary Authority of Singapore
The Personal Data Protection Act
Time-Based One-Time Password (TOTP)
Token Authentication
Turkey: Law on the Protection of Personal Data
Two-Factor Authentication
U
United Arab Emirates
United Kingdom: Data Protection Act of 2018
United States
Universal 2nd Factor
Universal Authentication Frameworks
Uruguay: Personal Data Protection Law
W
WebAuthn
Z
Zero Trust
Download this Resource