Glossary of terms
-
Actions: Closed loop responses to suspicious events. Actions are applied to prevent future anomalous events from occurring. Learn more.
-
Cloud Access Security Broker (CASB): On-premises or cloud-based security policy enforcement point placed between cloud service consumers and cloud service providers. CASBs combine and interject enterprise security policies as cloud-based resources are accessed. They also help organizations to extend security controls of their on-premises infrastructure to cloud.
-
Citrix ADC (Application Delivery Controller): Network device that lives in a data center, located strategically between the firewall, and one or more application servers. Handles load balancing between servers and optimizes end-user performance and security for enterprise applications. Learn more.
-
Citrix ADM (Application Delivery Management): Centralized network management, analytics, and orchestration solution. From a single platform, administrators can view, automate, and manage network services for scale-out application architectures. Learn more.
-
Citrix ADM agent: Proxy that enables communication between Citrix ADM and the managed instances in a data center. Learn more.
-
Citrix Analytics: Cloud service that collects data across services and products (on-premises and cloud), and generates actionable insights, enabling administrators to proactively handle user and application security threats, improve app performance, and support continuous operations. Learn more.
-
Citrix Cloud: Platform that connects to resources through the Citrix Cloud Connector on any cloud or infrastructure (on-premises, public cloud, private cloud, or hybrid cloud). Learn more.
-
Citrix Gateway: Consolidated remote access solution that consolidates remote access infrastructure to provide single sign-on across all applications whether in a data center, in the cloud, or delivered as SaaS. Learn more.
-
Citrix Hypervisor: Virtualization management platform optimized for application, desktop, and server virtualization infrastructures. Learn more.
-
Citrix Workspace App (formerly known as Citrix Receiver): Client software that provides seamless, secure access to applications, desktops and data from any device, including smartphones, tablets, PCs, and Macs. Learn more.
-
DLP (Data Loss Prevention): Solution that describes a set of technologies and inspection techniques to classify information contained in an object such as file, email, packet, application, or a data store. Also, the object can also be in storage, in use, or across a network. DLP tools can dynamically apply policies such as log, report, classify, relocate, tag, and encrypt. DLP tools can also apply enterprise data rights management protections. Learn more.
-
DNS (Domain Name System): Network service that is used to locate internet domain names and translate them to internet protocol (IP) addresses. DNS maps website names that users provide, to their corresponding IP-addresses that machines provide, to locate a website regardless of the physical location of the entities.
-
Data processing: Method of processing data from a data source to Citrix Analytics. Learn more.
-
Data source: Product or service that sends data to Citrix Analytics. A data source can be internal or external. [Learn more]/en-us/citrix-analytics/data-sources.html).
-
Data export: Product or service that receives data from Citrix Analytics and provides insights. Learn more.
-
Discovered users: Total number of users in an organization that use data sources. Learn more.
-
FQDN (Fully Qualified Domain Name): Complete domain name for internal (StoreFront) and external (Citrix ADC) access.
-
Machine learning: Type of data analysis technology that extracts knowledge without being explicitly programmed to do so. Data from a wide variety of potential sources such as applications, sensors, networks, devices, and appliances are fed into a machine learning system. The system uses the data and applies algorithms to build its own logic to solve a problem, derive insight, or make a prediction.
-
Microsoft Graph Security: Gateway that connects customer security and organizational data. Provides easy-to-review alerts and remediation options when an action must be taken. Learn more.
-
Performance Analytics: Service that provides visibility into user session details across an organization. Learn more.
-
Policy: Set of conditions to be met for an action to be applied on a user’s risk profile. Learn more.
-
Risk indicator: Metric that provides information about the level of exposure to a business risk that the organization has at a given time. Learn more.
-
Risk score: Dynamic value that indicates the aggregate level of risk a user or an entity poses to an IT infrastructure over a pre-determined monitoring period. Learn more.
-
Risk timeline: Record of a user’s or an entity’s risky behavior that allows administrators to probe into a risk profile and understand the data usage, device usage, application usage, and location usage. Learn more.
-
Risky user: User that has acted in a risky manner or presented risky behavior. Learn more.
-
Security Analytics: Advanced analysis of data that is used to achieve compelling security outcomes such as security monitoring and threat hunting. Learn more.
-
Secure Private Access: Service that provides integration of single sign-on, remote access, and content inspection into a single solution for end-to-end access control. Learn more.
-
Splunk: SIEM (Security Information and Event Management) software that receives intelligent data from Citrix Analytics and provides insights about the potential business risks. Learn more.
-
UBA (User Behavior Analytics): Process of baselining user activity and behavior combined with peer group analysis, to detect potential intrusions, and malicious activity.
-
Watchlist: List of users or entities whom administrators want to monitor for suspicious activities. Learn more.