Documentation

Glossary

This is the glossary

Glossary

Industry terminology

This glossary contains general terms used in our industy and should help you demistify the world of security.

A
A

Access point
Access point

An access point (AP) is a networking device that lets wireless devices connect to a wired network using Wi-Fi or other wireless standards.

B
B

BYOD (Bring Your Own Device)
BYOD (Bring Your Own Device)

BYOD (Bring Your Own Device) is a workplace policy that allows employees to use their personal devices - like phones, laptops, and tablets - to access company systems and data.

C
C

Cloud-native security
Cloud-native security

Cloud-native security is the practice of protecting dynamic, distributed cloud-native applications and infrastructure, addressing challenges like misconfigurations, ephemeral workloads, and complex microservices, through best practices such as shift-left security, runtime protection, IAM, and automated compliance.

D
D

DHCP (Dynamic Host Configuration Protocol)
DHCP (Dynamic Host Configuration Protocol)

DHCP is a networking protocol that automatically assigns IP addresses and other network configuration details (like DNS servers and default gateways) to devices when they connect to a network.

E
E

F
F

G
G

H
H

I
I

Identity provider (IdP)
Identity provider (IdP)

An identity provider (IdP) is a system or service that creates, manages, and validates digital identities for users, enabling them to securely access applications, networks, and services.

J
J

K
K

L
L

M
M

MAC address
MAC address

A MAC address (Media Access Control address) is a unique hardware identifier assigned to a device’s network interface for communication on a local network.

Microsegmentation
Microsegmentation

Microsegmentation is a security technique that divides data centers into small, isolated segments down to the individual workload level. This allows for the creation of granular security policies for each segment, restricting lateral movement of threats and enhancing overall security.

N
N

NAC (Network Access Control)
NAC (Network Access Control)

Network Access Control (NAC) is a cybersecurity framework that authenticates users and devices, enforces access policies, and ensures only authorized, compliant endpoints can connect to a network.

O
O

P
P

Q
Q

R
R

RADIUS protocol
RADIUS protocol

RADIUS (Remote Authentication Dial-In User Service) is a network protocol that centralizes authentication, authorization, and accounting (AAA) to manage and secure user access.

S
S

SSID
SSID

An SSID is the name of your Wi-Fi network that you see when you search for available connections. Knowing what an SSID is helps you connect to the right Wi-Fi.

T
T

U
U

V
V

W
W

X
X

Y
Y

Z
Z

Platform

Integrated with the best technologies on the market

Infrastructure agnostic and plug-and-play deployment: rapidly roll-out Cloudi-Fi across global sites with any infrastructure provider

Cloud native, borderless, scalable and global!

Unlocking Universal Zero Trust Network Access on all continents

World map
90+
Countries
500M+
Users and devices
100k+
Secured sites
Cloudi-Fi white logo

Start your journey with Cloudi-Fi

Platform

One platform for all industries

Cloudi-Fi empowers organizations with a scalable, cloud-based solution to secure users, devices and data.
Designed to integrate seamlessly into existing infrastructures.