Used words
ABAC
7
Account
Takeover
5
Agent
6
Alert
6
Anomalous
behavior
API
4
Application
Programming
Interface
4
ATO
Attribute
Based
Access
Control
Authenticator
Boldon
James
2
BYOD
CASB
5
Compromised
user
Content
Classification
1
inspection
Context
Data
activity
monitoring
at
Rest
3
classification
1
context
discovery
in
Motion
Use
Loss
Prevention
2
Detector
Dictionaries
Digital
Rights
Management
DLP
3
Document
fingerprinting
DRM
EDM
email
endpoint
Enterprise
Exact
Matching
False
positives
Identity
Incident
In-line
(real-time)
Insider
Threat
Management
(ITM)
Threats
Investigations
ITM
Labels
Luhn
algorithm
Malicious
Message
revocation
Metadata
tagging
MFA
Microsoft
Information
Protection
MIP
Multi-Factor
Authentication
Near
real-time
Negligent
Notification
OAuth
OCR
Optical
Character
Recognition
Partial
Fingerprinting
Privilege
abuse
Proofpoint
tags
Proximity
Quarantine
RBAC
RegEx
Regular
Expressions
Remediation
Remote
Browser
Isolation
Role
Rule
Scan
cloud
Sensor
Smart
ID
Send
Tags
Telemetry
hunting
Titus
Classification
Suite
Tracking
UAM
UEBA
Unmanaged
device
User
and
Entity
Behavior
Analytics
VDIs
Visual
capture
Watchlist
Workflow
status
Create your own