Glossary

    A
  • Assertion Consumer Service (ACS) URL - a combination of the Secure Token Server subsystem address, its port number for handling SAML messages, the SAML binding, and any necessary information that is specific for CIC or ICWS.
  • Assertion Consumer Service (ACS) URL - a combination of the Secure Token Server subsystem address, its port number for handling SAML messages, the SAML binding, and any necessary information that is specific for CIC or ICWS.
  • Microsoft® directory information service. Stores data about user, computer, and service identities for authentication and access. Acronym: AD.
  • Active Directory Federation Services. A Microsoft software component for Windows Server OS to give users single sign-on access to an organization's systems and applications.
  • Assertion Consumer Service (ACS) URL - a combination of the Secure Token Server subsystem address, its port number for handling SAML messages, the SAML binding, and any necessary information that is specific for CIC or ICWS.
  • Directory or database to store user accounts and their attribute values, such as Active Directory.
  • Amazon® Web Services. Public cloud platform that offers global compute, storage, database, application and other cloud services.
  • C
  • Check Point Virtual Security Gateway that protects dynamic virtual environments with policy enforcement. CloudGuard Gateway inspects traffic between Virtual Machines to enforce security, without changing the Virtual Network topology.
  • G
  • Google® Cloud Platform is a suite of products and services that includes hosting, cloud computing, database services and more.
  • I
  • A system entity that creates, maintains, and manages identity information for principals and also provides authentication services to relying applications within a federation or distributed network. Acronym: IdP or IDP.
  • Intrusion Prevention System (IPS), also known as intrusion detection prevention system (IDPS), is a technology that keeps an eye on a network for any malicious activities attempting to exploit a known vulnerability.
  • L
  • Lightweight Directory Access Protocol. It provides a mechanism used to connect to, search, and modify Internet directories (such as Microsoft Active Directory).
  • M
  • Multifactor Authentication - an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence (or factors) to an authentication mechanism.
  • Collection of integrated cloud services that developers and IT professionals use to build, deploy, and manage applications through a global network of data centers managed by Microsoft®.
  • Managed Security Service Provider (MSSP) - An managed security service provider (MSSP) provides outsourced monitoring and management of security devices and systems. Common services include managed firewall, intrusion detection, virtual private network, vulnerability scanning and anti-viral services.
  • R
  • Remote Authentication Dial-In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA or Triple A) management for users who connect and use a network service. RADIUS is a client/server protocol that runs in the application layer, and can use either TCP or UDP as transport.
  • S
  • Software as a Service (SaaS) - An application delivered over the Internet by a provider. The application doesn’t have to be purchased, installed, or run on users’ computers. SaaS providers were previously referred to as ASPs (application service providers).
  • Security Assertion Markup Language. An XML-based, open-standard data format for exchanging authentication and authorization data between parties, in particular, between an identity provider and a service provider.
  • A Check Point service offering that helps customers with deployments or technical services for Check Point products.
  • The ShiftLeft tool scans source code, containers and serverless functions, looking for vulnerabilities including those associated with the Log4j tool. This tool alerts the security and DevOps teams if any vulnerabilities are detected in the pre-build phase, ensuring that vulnerable code is not deployed.
  • Single Sign-On (SSO) - A session/user authentication process that permits a user to enter one name and password in order to access multiple applications.
  • T
  • A database of security intelligence that is dynamically updated using a worldwide network of threat sensors.
  • U
  • A Check Point software blade that allows granular control over which web sites can be accessed by a given group of users, computers or networks.
  • The Check Point User Center offers Single Sign-On (SSO) management for all your Check Point needs: (1) Manage Accounts & Products (2) Get Support Offers (3) License Products (4) Open & manage your Service Requests (5) Access Downloads and product documentation (6) Search Technical Knowledge Center
  • Z
  • An attack or threat that uses a previously unknown computer or software vulnerability.