Skip to content
Product
The Silverfort Platform
Universal MFA
Service Account Protection
Authentication Firewall
Identity Threat Detection and Response
Identity Security Posture Management
Pricing
Use Cases
Identity-First Incident Response
Cyber Insurance
Compliance
Ransomware Protection
Privileged Access Management
Hybrid IAM Consolidation
Lateral Movement Prevention
Risk-Based Authentication
Visibility & Risk Analysis
Identity Zero Trust
Partners
Identity Security Alliance
Channel Partners
Cyber Insurance Partners
Microsoft
Partners Portal
Customers
Support
Silverfort Academy
Documentation Center
Silverfort Trust Center
Resources
Case Studies
Azure AD
Compliance
Cyber Insurance
Glossary
ITDR
Lateral Movement
MFA
Ransomware
Service Accounts
White Paper
Zero Trust
Company
Investors
Recognition
Careers
News and Press
Contact Us
Events
Blog
Pricing
Menu
Product
The Silverfort Platform
Universal MFA
Service Account Protection
Authentication Firewall
Identity Threat Detection and Response
Identity Security Posture Management
Pricing
Use Cases
Identity-First Incident Response
Cyber Insurance
Compliance
Ransomware Protection
Privileged Access Management
Hybrid IAM Consolidation
Lateral Movement Prevention
Risk-Based Authentication
Visibility & Risk Analysis
Identity Zero Trust
Partners
Identity Security Alliance
Channel Partners
Cyber Insurance Partners
Microsoft
Partners Portal
Customers
Support
Silverfort Academy
Documentation Center
Silverfort Trust Center
Resources
Case Studies
Azure AD
Compliance
Cyber Insurance
Glossary
ITDR
Lateral Movement
MFA
Ransomware
Service Accounts
White Paper
Zero Trust
Company
Investors
Recognition
Careers
News and Press
Contact Us
Events
Blog
Pricing
Search
Search
Close this search box.
Request a demo
Glossary
A-F
G-L
M-R
S-Z
Term of the week
Zero Trust
Search
A-F
Active Directory
Adaptive Authentication
Adaptive Multi-Factor Authentication
Air-Gapped Network
Attack Surface
Attack Surface Management
Azure AD
Compromised Credential
Credential Access
Credential Stuffing
Credential Theft
Cyber Insurance
Cyber Security Compliance
G-L
Honeypot Account
Identity and Access Management (IAM)
Identity Fabric
Identity Infrastructure
Identity Protection
Identity Security
Identity Security Posture Management
Identity Segmentation
Identity Threat Detection and Response
Identity Threat Exposure
Identity Verification
Identity Zero Trust
Identity-Based Attack
Kerberoasting
Kerberos Delegation
Lateral Movement
M-R
Machine Identity
MFA Fatigue
MFA Prompt Bombing
MITRE ATT&CK Framework
Multi-Factor Authentication (MFA)
Non-Human Identity
Principle of Least Privilege
Privilege Escalation
Privileged Access Management (PAM)
Privileged Account
Prolific User
PsExec
Ransomware
Risk-based Authentication
S-Z
Service Account
Unconstrained Delegation
Unified Identity Protection
User Account
User Authentication
Zero Trust
Stop Identity Threats Now
Request a demo