Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management | What is CIEM?
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP) Management | Saviynt Identity & Security Glossary
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM) | Saviynt Identity & Security Glossary
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI DSS) | Saviynt
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Zero-Day Attack
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management | What is CIEM?
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP) Management | Saviynt Identity & Security Glossary
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM) | Saviynt Identity & Security Glossary
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI DSS) | Saviynt
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management | What is CIEM?
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP) Management | Saviynt Identity & Security Glossary
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM) | Saviynt Identity & Security Glossary
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI DSS) | Saviynt
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack
Zero-Day Attack
Zero-Day Attack
Access Control
Application Access Governance (AAG)
Attack Surface
AuthN
AuthZ
California Consumer Privacy Act (CCPA)
Cloud Governance
Cloud Infrastructure Entitlement Management | What is CIEM?
Continuous Compliance
Continuous Integration & Continuous Delivery (CI/CD) Pipeline
Converged Identity Platform (CIP)
Cyber Kill Chain
Cybersecurity Maturity Model Certification (CMMC)
Data Access Governance (DAG)
Deprovisioning
DevOps
DevSecOps
Electronic Health Records (EHR)
Enterprise Resource Planning (ERP) Management | Saviynt Identity & Security Glossary
Federal Information Security Modernization Act (FISMA)
FedRAMP
General Data Protection Regulation (GDPR)
Governance, Risk, & Compliance (GRC)
Health Insurance Portability and Accountability Act (HIPAA)
Identity and Access Management (IAM) | Saviynt Identity & Security Glossary
Identity as a Service (IDaaS)
Identity Governance and Administration (IGA)
Identity Management
Identity, Credential, and Access Management (ICAM)
Infrastructure as a Service (IaaS)
Internet of Things (IoT) | Saviynt Identity & Security Glossary
Just-in-Time Access (JIT)
Level of Assurance (LOA)
Lift and Shift
Machine Identity
Machine Learning (ML)
Multi-Factor Authentication (MFA)
National Institute of Standards & Technology (NIST)
Payment Card Industry Data Security Standard (PCI DSS) | Saviynt
Phishing
Platform as a Service (PaaS)
Privileged Access Management (PAM)
Protected Health Information (PHI)
Role-based Access Control (RBAC)
Sarbanes-Oxley Act (SOX)
Separation of Duties (SoD)
Vendor Access Management (VAM)
Zero Standing Privilege (ZSP)
Zero Trust Network Access (ZTNA)
Zero Trust Security
Zero-Day Attack