Accutive Security
ADM Platform
Data Masking
Data Discovery
Data Subsetting
Data Automation
Solutions
Industries
Financial Services
Healthcare
Retail
Insurance
Telco
Public Sector
Data Sources & Destination
Use Cases
Agile DevOps CI/CD
Test Data Management
Hybrid Cloud & Multicloud
Security & Compliance
Services
Professional Services
Authentication & Access Management
Blockchain
Center of Excellence
Certificate Management & Machine Identities
Cryptography & Encryption
Data Discovery Services
Fraud Detection & Prevention
Hardware Security Modules
Identities
Key & Secrets Management
Public Key Infrastructure (PKI)
Product & Solution Selection
Research & Consulting
Software Development & API Integration
Staff Augmentation
Tokenization & Obfuscation & Masking
Certified Partner Services
Thales
Maximizing Thales Product Value Extraction
Thales Application Management Services
Thales Health & Architecture Review
Thales Platform Migrations
Thales Solution Journey Planning
Thales Staff Augmentation
Thales Technical Account Management
Thales Training Services
Thales Use Case Expansion
Venafi
Maximizing Venafi Product Value Extraction
Venafi Application Management Services
Venafi Health & Architecture Review
Venafi Platform Migrations
Venafi Solution Journey Planning
Venafi Staff Augmentation
Venafi Technical Account Management
Venafi Training Services
Venafi Use Case Expansion
Keyfactor
Maximizing Keyfactor Product Value Extraction
Keyfactor Application Management Services
Keyfactor Health and Architecture Review
Keyfactor Platform Migrations
Keyfactor Solution Journey Planning
Keyfactor Staff Augmentation
Keyfactor Technical Account Management
Keyfactor Training Services
Keyfactor Use Case Expansion
ADM Services
Partners
Insights
Company
About Us
Contact Us
Accutive Parent Corporation
Glossary
ADM Platform
Data Masking
Data Discovery
Data Subsetting
Data Automation
Solutions
Industries
Financial Services
Healthcare
Retail
Insurance
Telco
Public Sector
Data Sources & Destination
Use Cases
Agile DevOps CI/CD
Test Data Management
Hybrid Cloud & Multicloud
Security & Compliance
Services
Professional Services
Authentication & Access Management
Blockchain
Center of Excellence
Certificate Management & Machine Identities
Cryptography & Encryption
Data Discovery Services
Fraud Detection & Prevention
Hardware Security Modules
Identities
Key & Secrets Management
Public Key Infrastructure (PKI)
Product & Solution Selection
Research & Consulting
Software Development & API Integration
Staff Augmentation
Tokenization & Obfuscation & Masking
Certified Partner Services
Thales
Maximizing Thales Product Value Extraction
Thales Application Management Services
Thales Health & Architecture Review
Thales Platform Migrations
Thales Solution Journey Planning
Thales Staff Augmentation
Thales Technical Account Management
Thales Training Services
Thales Use Case Expansion
Venafi
Maximizing Venafi Product Value Extraction
Venafi Application Management Services
Venafi Health & Architecture Review
Venafi Platform Migrations
Venafi Solution Journey Planning
Venafi Staff Augmentation
Venafi Technical Account Management
Venafi Training Services
Venafi Use Case Expansion
Keyfactor
Maximizing Keyfactor Product Value Extraction
Keyfactor Application Management Services
Keyfactor Health and Architecture Review
Keyfactor Platform Migrations
Keyfactor Solution Journey Planning
Keyfactor Staff Augmentation
Keyfactor Technical Account Management
Keyfactor Training Services
Keyfactor Use Case Expansion
ADM Services
Partners
Insights
Company
About Us
Contact Us
Accutive Parent Corporation
Glossary
Preferred Language
Request a Demo
Accutive Security Glossary
A comprehensive glossary for important
data security terms
A
B
C
D
E
F
G
H
I
J
K
L
M
N
P
R
S
T
U
W
Z
A
Access Management
Adaptive Authentication
Adaptive Multi-Factor Authentication
Application Network
Argentina: The Personal Data Protection law
Attack Surface
Australian Securities Investment Commission
Australia: Privacy Act 1988
Authentication
Authentication Factors
Authorization
B
Basel III
BeyondCorp
Brazil: General Data Protection Law
Brute Force
C
California Consumer Privacy Act
California Privacy Rights Act
Canada: Personal information Protection and Electronic Documents Act
Chile: Ley de Protección de Datos Personales
China: Personal Information Security Specification (PISS)
CICD Pipeline
Cloud Identity Management
Cloud Migration
Colombia: Personal Data Protection Statute
Continuous Authentication
Continuous Delivery
Continuous Integration
Costa Rica: Law on Protection of the Person Against the Processing of their Personal Data
Customer Identity Access Management (CIAM)
D
Data Breach
Data Breach Prevention
Data Discovery
Data Governance
Data Masking
Data Privacy
Data Virtualization
Deprovisioning
DevOps
E
Employee Identity Management
European Union: General Data Protection Regulation
F
Federated Identity System
G
GDPR Compliance
H
HIPAA
Hong Kong: Personal Data (Privacy) Ordinance (PDPO)
I
Identity and Access Management
Identity as a Service
Identity Management
Incident Response Planning
India: Personal Data Protection Bill
Indonesia: Personal Data Protection Bill
Israel: Protection of Privacy Law
J
Japan: Act on the Protection of Personal Information
JSON Web Token
K
Access Management
Adaptive Authentication
Adaptive Multi-Factor Authentication
Application Network
Argentina: The Personal Data Protection law
Attack Surface
Australian Securities Investment Commission
Australia: Privacy Act 1988
Authentication
Authentication Factors
Authorization
Basel III
BeyondCorp
Brazil: General Data Protection Law
Brute Force
California Consumer Privacy Act
California Privacy Rights Act
Canada: Personal information Protection and Electronic Documents Act
Chile: Ley de Protección de Datos Personales
China: Personal Information Security Specification (PISS)
CICD Pipeline
Cloud Identity Management
Cloud Migration
Colombia: Personal Data Protection Statute
Continuous Authentication
Continuous Delivery
Continuous Integration
Costa Rica: Law on Protection of the Person Against the Processing of their Personal Data
Customer Identity Access Management (CIAM)
Data Breach
Data Breach Prevention
Data Discovery
Data Governance
Data Masking
Data Privacy
Data Virtualization
Deprovisioning
DevOps
Employee Identity Management
European Union: General Data Protection Regulation
Federated Identity System
GDPR Compliance
HIPAA
Hong Kong: Personal Data (Privacy) Ordinance (PDPO)
Identity and Access Management
Identity as a Service
Identity Management
Incident Response Planning
India: Personal Data Protection Bill
Indonesia: Personal Data Protection Bill
Israel: Protection of Privacy Law
Japan: Act on the Protection of Personal Information
JSON Web Token
Kenya: Data Protection Act of 2019
LDAP
Least Privileged Access Control
Lifecycle Management
Malaysia: The Personal Data Protection Act
Mexico: Federal Law on Protection of Personal Data Held by Private Parties (LFPDPPP)
Mobility Management
Multi-cloud Strategy
Multi-Factor Authentication
New Zealand: Privacy Act 2020
Nigeria: The Nigeria Data Protection Regulation
Norway: Personal Data Act
NY Shield
Pakistan: Prevention of Electronic Crimes Act
Passwordless Authentication
Password Spray
Payment Card Industry Data Security Standard
Peru: Personal Data Protection Law
Philippines: Data Privacy Act
Phishing
PIPEDA
Provisioning
Public key Cryptography
Russia: Federal Law No. 152-FZ “On Personal Data”
SAML
SCIM
Singapore: Personal Dat Protection Act
South Africa: The Protection of Personal Information Act
South Korea: Personal Information Protection Act
Switzerland: Federal Data Protection Act
Taiwan: Personal Data Protection Act
Test Data Management
Thailand: Personal Data Protection Act
The Hong Kong Monetary Authority
The Japan Act on the Protection of Personal Information
The Massachusetts data protection law
The Monetary Authority of Singapore
The Personal Data Protection Act
Time-Based One-Time Password (TOTP)
Token Authentication
Turkey: Law on the Protection of Personal Data
Two-Factor Authentication
United Arab Emirates
United Kingdom: Data Protection Act of 2018
United States
Universal 2nd Factor
Universal Authentication Frameworks
Uruguay: Personal Data Protection Law
WebAuthn
Zero Trust
L
LDAP
Least Privileged Access Control
Lifecycle Management
M
Malaysia: The Personal Data Protection Act
Mexico: Federal Law on Protection of Personal Data Held by Private Parties (LFPDPPP)
Mobility Management
Multi-cloud Strategy
Multi-Factor Authentication
N
New Zealand: Privacy Act 2020
Nigeria: The Nigeria Data Protection Regulation
Norway: Personal Data Act
NY Shield
P
Pakistan: Prevention of Electronic Crimes Act
Passwordless Authentication
Password Spray
Payment Card Industry Data Security Standard
Peru: Personal Data Protection Law
Philippines: Data Privacy Act
Phishing
PIPEDA
Provisioning
Public key Cryptography
R
Russia: Federal Law No. 152-FZ “On Personal Data”
S
SAML
SCIM
Singapore: Personal Dat Protection Act
South Africa: The Protection of Personal Information Act
South Korea: Personal Information Protection Act
Switzerland: Federal Data Protection Act
T
Taiwan: Personal Data Protection Act
Test Data Management
Thailand: Personal Data Protection Act
The Hong Kong Monetary Authority
The Japan Act on the Protection of Personal Information
The Massachusetts data protection law
The Monetary Authority of Singapore
The Personal Data Protection Act
Time-Based One-Time Password (TOTP)
Token Authentication
Turkey: Law on the Protection of Personal Data
Two-Factor Authentication
U
United Arab Emirates
United Kingdom: Data Protection Act of 2018
United States
Universal 2nd Factor
Universal Authentication Frameworks
Uruguay: Personal Data Protection Law
W
WebAuthn
Z
Zero Trust