- Big Data
This is the process of applying enormous computing power, using the latest in machine learning and artificial intelligence, to massive and often highly complex sets of information.
- Bring Your Own Device (BYOD)
This term refers to the policy of permitting employees to use personally owned mobile devices (particularly smartphones and tablets) to access privileged company information and applications.
- Cloud Computing
This process stores and accesses applications and computer data on multiple servers through the Internet rather than running installed software on a personal computer or local office server.
Protecting information and intellectual property in digital form against theft and misuse.
- Data Loss Prevention (DLP)
This dated strategy originally was developed to prevent end users from sending sensitive or critical information outside of an organization’s network. We believe it does not work effectively in the cloud where users require access across multiple networks and devices.
- Deep Packet Inspection (DPI)
Is a form of filtering used to inspect data packets sent from one compute to another over a network. The effective use of DPI enables its users to track down, identify, categorize, reroute or stop packets with undesirable code or data.
- Dictionary Keywords (Securio core functionality)
Users can also create and upload custom dictionary keywords and phrases that will be used by the policy engine to inspect for sensitive data at rest and in motion. These keywords can be assigned weighted values to compare against a pre-defined threshold. This feature can be used to detect document types, such as financial statements, healthcare records, source code, etc.
- Discover (Securio component)
The Discover component is a comprehensive information-aware solution used to scan enterprise data storage areas for data at rest, inspecting it for fingerprint, pattern and keyword dictionary matches. Depending upon a customer’s workflow needs, flexible scheduling options are available to perform continuous, daily, weekly or monthly scans. The Discover functionality can be used to identify sensitive data that is located in unauthorized areas. This might indicate an ineffective company policy or that an unauthorized user has infiltrated a network and is staging sensitive data for exfiltration at a later time.
- Information-Centric Security (ICS)
With emphasis on the security of the information itself rather than on the security of networks, applications or even simply data, ICS is an open user access, cloud-focused security methodology.
- Manage (Securio Component)
The Manage component is an intuitive and easy to use web-based interface for management and reporting of all Securio solutions. This interface is completely RESTful API (Application Programming Interface) driven and can be replaced by a customer’s proprietary dashboard if desired. This design allows cloud providers, SaaS installations and Managed Service Providers (MSPs) to fully utilize Securio's functionality and optionally have results displayed cohesively within their product’s dashboard systems, whether customer proprietary or commercially available off-the-shelf.
- Patterns (Securio core functionality)
Global Velocity has developed industry-leading pattern recognition technology that offers robust inspection of content at rest and in motion. Examples of patterns are credit card, social security and driver’s license numbers. Additional custom patterns can be created easily to search for patterns such as product numbers, patient numbers, customer account numbers, etc.
- Policy Engine (Securio core functionality)
A critical component of any security product is the policy engine. Based on extensive testing and refinement on large federal government projects, Global Velocity has enhanced its policy engine to be comprehensive, yet easy to use. Administrators of the system can create both straight-forward or sophisticated security policies based on items such as patterns, dictionary keywords, digital fingerprints, Internet traffic classification and protocols, email recipients and senders, file types and IP addresses. Incidents and notification lists can be configured to alert key personnel in real time when security events need attention. The system can be setup to block, notify, quarantine or log individual Incidents and Findings.
- Protect (Securio component)
The Protect component is designed to defend against unauthorized data loss over the web and through email. It is designed to monitor and/or block sensitive data from being sent to unauthorized users or locations. The Global Velocity Information-Centric Security platform can be used to inspect all outbound Internet traffic and scan content for fingerprint, pattern and keyword dictionary matches. User defined policies can be set up to block, quarantine or log this activity. All major Internet protocols are supported, such as HTTP, HTTPS, FTP and SMTP.
Global Velocity also provides a unique Protect option called “Policy as a Service.” This option allows cloud application vendors to interactively query the policy engine with a single piece of content, such as a file or body of text. The policy engine will inspect the content request, comparing it against the customer’s defined policies, and return an appropriate status that the vendor can use to determine next steps to take within their application or process flow. This unique functionality offers great flexibility for SaaS vendors in particular, allowing them to integrate Information-Centric Security capabilities directly into their applications.
This term refers to the ability of a computer application or product to continue to function properly when size or volume is increased to meet user need. Vertical scalability is the ability to add resources, such as additional CPUs or memory, to improve computing capability. Horizontal scalability is the ability to add more nodes to a system so they work together as a single logical unit.
- Secure Web Gateway (SWG)
Web-surfing PCs are protected from infection by filtering unwanted software and malware from user-initiated Internet traffic. While these Gateways are designed for the cloud, we believe they are not designed to provide Information-Centric Security.
- Software-as-a-Service (SaaS)
Sometimes referred to as "on-demand software," SaaS is a service-oriented software delivery model in which software and associated data are centrally hosted on the cloud.
- Track (Securio component)
A unique and optional feature of Global Velocity’s Securio platform is the ability to track and record the genealogy and chain of custody of sensitive documents. This information is used by the Information-Centric Security platform for auditing purposes as well as to identify meaningful deviations from normal behavior that could infer malicious intent.
- Virtual Vault (Securio core functionality)
Using Global Velocity’s proprietary algorithms, users can also generate digital fingerprints of sensitive documents to be monitored and protected. The original document remains unaltered while the resulting digital fingerprints are used by the Securio to create a “virtual vault” that detects when the content, or portions of the content, have been moved or sent to unauthorized locations. Global Velocity is the only company offering this powerful functionality and protection in the cloud.
- Virtualization (including virtually aware)
The main enabling technology for cloud computing is virtualization, which creates a simulated version of a device or resource (such as a server, storage device, network or operating system) where the resources are divided into one or more execution environments. Virtualization provides the agility required to speed up IT operations, and reduce cost by increasing infrastructure utilization.