Glossary

March 5, 2024

ID 95897

Endpoint Protection Platform (EPP)

An integrated system of complex protection for endpoint devices (for example, mobile devices, computers, or laptops) that includes various security technologies. An example of an Endpoint Protection Platform is Kaspersky Endpoint Security for Business.

EPP application

An application included in a protection system for endpoint devices (Endpoint Protection Platform, or EPP). EPP applications are installed on endpoint devices within the IT infrastructure of an organization (for example, mobile devices, computers, or laptops). An example of an EPP application is Kaspersky Endpoint Security for Windows, as part of the EPP solution Kaspersky Endpoint Security for Business.

IOC

An indicator of compromise (or IOC) shows the evidence on a device that points to a security breach.

IOC file

A file that contains a set of compromise indicators that are compared to the indicators of an event. If the compared indicators match, the application considers the event to be an alert. The probability of an alert may increase if a scan detects that several IOC files exactly match an object.

OpenIOC

An open standard for XML-based Indicator of Compromise (IOC) descriptions that include over 500 different indicators of compromise.

Response

Incident response is a structured methodology for handling security incidents, breaches, and cyberthreats.

Targeted attack

An attack targeted at a specific person or organization. Unlike mass attacks by computer viruses aimed at infecting maximum number of computers, targeted attacks can be aimed at infecting the network of a certain organization or even one server in the organization IT infrastructure. A special trojan program may be developed for each targeted attack.

Tenant

A tenant is an organization to which you supply Kaspersky Endpoint Detection and Response Optimum.

TLS encryption

Encryption of the connection between two servers, providing secure data transfer between the servers via the Internet.

Traces

Running the application in debug mode; after each instruction is executed, the application stops and the result is displayed.

Did you find this article helpful?
What can we do better?
Thank you for your feedback! You're helping us improve.
Thank you for your feedback! You're helping us improve.