Solutions
 

Cloud Security

Cyberattack and cybersecurity terms related to cloud security

Cryptomining

Cryptomining is the process by which crypto currencies, such as Bitcoin, are created.


Data exfiltration

Data exfiltration is a form of security breach that occurs when a malicious actor conducts an unauthorized data transfer.


East-West attack

An east-west attack, also known as a lateral attack, refers to the techniques that threat actors use to progressively manoeuvre through and gain further access to valuable data and assets.


EC2

Elastic Compute Cloud (EC2) is a web service that provides secure, resizable compute capacity in the cloud.


Excessive Permissions

Protecting against excessive permissions and responding quickly when those permissions are abused.


Exposed Cloud Database

An exposed cloud database is a database that has been inadvertently exposed due to a misconfiguration or vulnerability.


Exposed Cloud Server

A cloud server is a highly powerful virtual IT infrastructure that can host data and applications. However, if incorrectly configured the cloud server can be exposed.


Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia