Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

E

East/West Traffic

Traffic that moves between two or more machines across the same data center, including server-to-server communication or between individual devices.

Endpoint Agent Consolidation

Many endpoint security systems have multiple agents (lightweight services that run in the background to automate monitoring and control). A more secure, modern approach is to have a single agent that drives your entire security ecosystem, leading to decreased CPU load, bandwidth use, and operational complexity.

Endpoint Detection and Response (EDR)

A security solution that continuously monitors endpoint devices for threats such as ransomware, fileless attacks, zero-day malware, and phishing. Using AI and machine learning, EDR collects endpoint data, analyzes behavior, and enables automated or manual responses to stop threats before they spread.

Read More

Endpoint Protection Platform (EPP)

A cloud-native security solution that centralizes next-generation antivirus with self-learning, AI-powered analytics for Windows, macOS, and Linux desktops, laptops, and servers. Goes beyond signature-based antivirus, using behavioral analytics to stop malware, ransomware, and zero-day threats that traditional solutions miss.

Endpoint Protection, Detection and Response (EPDR)

A security solution that combines Endpoint Protection Platform (EPP) technologies, advanced Endpoint Detection and Response (EDR), and self-learning AI-powered agents and services to protect computers, laptops, and servers from threats invisible to traditional solutions.

P

Patch Management

The process of applying vendor-issued updates to close security vulnerabilities and optimize the performance of software and devices. The best patch management services detect missing patches, outdated or EOL software, and known CVEs, then correlate that data with risk severity to help teams prioritize remediations.

V

VPN (Virtual Private Network)

Stands for Virtual Private Network. Provides security benefits of a private, dedicated, leased-line network without the cost of owning one. Uses cryptography to make data unreadable over the Internet. Commonly used to connect multiple company locations. Weakness of VPN is that it allows access with just a username and password. If a password is leaked, your systems are open. Zero Trust Network Access (ZTNA)is a modern alternative to VPNs.

Read More

X

XDR

Stands for Extended Detection and Response. While EDR focuses on identifying and responding to threats at the endpoint level, XDR broadens the scope by collecting telemetry data and automatically correlating detections across multiple security domains, including endpoint, identity, email, network, and cloud. Using AI and machine-learning technologies, XDR then performs automatic analysis to integrate them into a centralized security system.

Z

Zero Trust

A cybersecurity strategy based on the principle of "never trust, always verify," assuming threats exist everywhere. Rather than relying on a single technology, it implements multiple security controls, including multi-factor authentication, EDR, Zero Trust Network Access, and dark web credential monitoring. In addition, users only have access to the specific parts of the network they need and not more.

Zero Trust Identity Framework

A security model that requires strict identity verification for every person and device, inside or outside the network perimeter, trying to access resources on a private network.

Zero Trust Network Access (ZTNA)

A security framework that assumes threats are everywhere and therefore verifies every user and device attempting to access resources, and grants least-privileged access to specific applications rather than to the entire network. A foundational security model within SASE.