Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

E

East/West Traffic

Traffic that moves between two or more machines across the same data center, including server-to-server communication or between individual devices.

Elevation of Privilege

Any attempt to gain greater permissions illicitly (typically, by impersonating a privileged user or otherwise bypassing normal authentication) within a computer system is considered an elevation of privilege.

Endpoint Agent Consolidation

Many endpoint security systems have multiple agents (lightweight services that run in the background to automate monitoring and control). A more secure, modern approach is to have a single agent that drives your entire security ecosystem, leading to decreased CPU load, bandwidth use, and operational complexity.

Endpoint Detection and Response (EDR)

A security solution that continuously monitors endpoint devices for threats such as ransomware, fileless attacks, zero-day malware, and phishing. Using AI and machine learning, EDR collects endpoint data, analyzes behavior, and enables automated or manual responses to stop threats before they spread.

Read More

Endpoint Protection Platform (EPP)

A cloud-native security solution that centralizes next-generation antivirus with self-learning, AI-powered analytics for Windows, macOS, and Linux desktops, laptops, and servers. Goes beyond signature-based antivirus, using behavioral analytics to stop malware, ransomware, and zero-day threats that traditional solutions miss.

Endpoint Protection, Detection and Response (EPDR)

A security solution that combines Endpoint Protection Platform (EPP) technologies, advanced Endpoint Detection and Response (EDR), and self-learning AI-powered agents and services to protect computers, laptops, and servers from threats invisible to traditional solutions.

Evil Twin

A wireless access point masquerading as a trusted wireless network, used to trick users into connecting to attacker's network, where they can steal passwords or other sensitive information by either intercepting unencrypted HTTP traffic or using their control of network traffic to run convincing phishing attacks.