Glossary

Clarifying Key Concepts in Cloud PAM, CIEM, and Zero Trust Access and much more for Robust Defense

Just-in-Time Access vs. Birthright Access

Just-in-Time Access vs. Birthright Access

Explore the fundamental differences between Just-in-Time (JIT) Access, a dynamic and secure approach, and static Birthright Access

What is Birth Right Access

What is Birth Right Access

Understand Birthright Access: Automatic, baseline permissions granted upon joining an organization

What is Key Rotation

What is Key Rotation

Understand Key Rotation: Regularly changing cryptographic keys and credentials to boost security, minimize risk, and ensure continuous compliance

What is Machine Identity Management

What is Machine Identity Management

Understand Machine Identity Management: Secure and govern the digital identities of non-human entities, crucial for modern IT security and operations.

What is Database Access Management

What is Database Access Management

Discover Database Access Management: Secure, control, and audit who accesses your critical data, ensuring compliance and robust data protection

What is Fine-Grained Access

What is Fine-Grained Access

Discover Fine-Grained Access: precise, context-aware permissions for enhanced security, compliance, and granular control over data access

What is Time-Based Access

What is Time-Based Access

Learn about time-based access: automatically granting and revoking permissions based on predefined schedules for stronger security.

What is Temporary Access

What is Temporary Access

Learn about temporary access: limited duration, limited scope permissions for better security, and controlled data access.

What is FedRamp

What is FedRamp

FedRAMP: The U.S. government's stringent program for securing cloud services, ensuring robust data protection for federal agencies

What is SoC2

What is SoC2

SOC 2: An audit standard for service organizations, ensuring robust security, availability, and privacy controls for customer data

What is DPDPA

What is DPDPA

DPDPA: India's new digital data protection law, safeguarding personal data and outlining strict obligations for businesses

What is GDPR

What is GDPR

GDPR: The EU's robust data privacy law protecting personal data and empowering individuals, with global impact on businesses

What is HIPAA

What is HIPAA

Understand HIPAA: The U.S. law protecting sensitive patient health information, mandating privacy and security for healthcare data

What is NIST

What is NIST

The U.S. agency crafting essential cybersecurity standards and frameworks, guiding organizations to manage risk and boost digital defenses.

What is SOX

What is SOX

Understand SOX (Sarbanes-Oxley Act): The U.S. law protecting investors by mandating financial reporting and internal controls for public companies

What is Separation of Duties (SoD)

What is Separation of Duties (SoD)

Prevent fraud & error with Separation of Duties (SoD). Split critical tasks among different people to boost security, compliance, and trust.

What are Dormant Accounts

What are Dormant Accounts

Learn how inactive or dormant but enabled user accounts can become backdoors, enabling unauthorized access and compliance violations

What are Orphaned Accounts

What are Orphaned Accounts

Orphaned accounts are hidden dangers. Uncover the serious security and compliance risks of digital identities left active with no current user

What is Zero Trust Access

What is Zero Trust Access

The modern security framework that eliminates implicit trust, requiring continuous verification for every access request, regardless of user or device

What is Least Privilege Access

What is Least Privilege Access

The fundamental security principle of granting only the minimum necessary access rights, reducing risk and containing potential breaches

What are NHI Risks

What are NHI Risks

Security challenges posed by non-human identities like applications and AI Agents, including privilege escalation, data breaches etc

What are Non-Human Identities

What are Non-Human Identities

Digital entities like applications, services, AI Agents that require identity and access management, crucial for enterprise security and compliance

What is Just-in-Time Access

What is Just-in-Time Access

Grants temporary, time-limited, and purpose-specific access to sensitive resources, minimizing risk and enforcing true Least Privilege

What is User Onboarding & Offboarding

What is User Onboarding & Offboarding

The critical identity lifecycle processes for securely provisioning and de-provisioning access for all users, vital for security and compliance

What is Access Governance

What is Access Governance

Ensuring all access rights align with organizational policies, security needs, compliance regulations and providing auditability and control.

What is Identity Governance

What is Identity Governance

The framework for overseeing and ensuring that identity and access policies align with business needs, security , and regulatory requirements

What is Identity Security Posture Management (ISPM)?

What is Identity Security Posture Management (ISPM)?

The discipline for continuously assessing, managing, and improving the security configuration and risk of an organization's entire identity landscape

What is Identity Governance and Administration

What is Identity Governance and Administration

Identity Governance and Administration is a framework that manages and controls user identities and their access rights within an organization

What is Privilege Access Management

What is Privilege Access Management

The critical cybersecurity discipline that secures, monitors, and manages highly sensitive accounts and their access to an org's most valuable assets.

What is MCP Protocol

What is MCP Protocol

Discover the Model Context Protocol : A crucial standard for secure and controlled communication between AI models

What is IAM in cybersecurity

What is IAM in cybersecurity

Understand IAM: The foundation that ensures only authorized users and entities can access an organization's critical resources and data

What is Agentic AI

What is Agentic AI

Agentic AI (Artificial Intelligence) refers to AI systems designed to take autonomous action to achieve a specified goal

What is Access Management

What is Access Management

Access Management is the cybersecurity discipline that governs who, eg users, applications, devices, machine identities can access what resources

Set up in minutes with agentless, flexible deployment.

Save time and enhance security with ReShield’s streamlined, automated processes

94%

reduction to Identity attack surface

95%

less time to process access request

<10mins

to add new integration

Frequently Asked Question

What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?
What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?
What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?

Set up in minutes with agentless, flexible deployment.

Save time and enhance security with ReShield’s streamlined, automated processes

94%

reduction to Identity attack surface

95%

less time to process access request

<10mins

to add new integration

Set up in minutes with agentless, flexible deployment.

Save time and enhance security with ReShield’s streamlined, automated processes

94%

reduction to Identity attack surface

95%

less time to process access request

<10mins

to add new integration

Frequently Asked Question

What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?
What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?

Frequently Asked Question

What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?
What is ReShield?
How is ReShield different from other Identity Products?
Does ReShield work with other identity and security systems?
What are the prerequisites of using ReShield?
How is ReShield secure?
Do you support on-prem and cloud?