{"id":26358,"date":"2025-07-25T22:58:28","date_gmt":"2025-07-25T22:58:28","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?page_id=26358"},"modified":"2026-03-02T21:05:30","modified_gmt":"2026-03-02T21:05:30","slug":"glossary","status":"publish","type":"page","link":"https:\/\/www.adminbyrequest.com\/en\/glossary","title":{"rendered":"Glossary"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26358\" class=\"elementor elementor-26358\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b0920ee e-flex e-con-boxed e-con e-parent\" data-id=\"b0920ee\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dd0bca5 e-con-full e-flex e-con e-child\" data-id=\"dd0bca5\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27132091 elementor-widget elementor-widget-heading\" data-id=\"27132091\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cybersecurity Glossary<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3dc47b06 elementor-widget elementor-widget-heading\" data-id=\"3dc47b06\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fc9c3c e-flex e-con-boxed e-con e-parent\" data-id=\"1fc9c3c\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7e0f1f8b e-con-full e-flex e-con e-child\" data-id=\"7e0f1f8b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-44af61cf elementor-widget elementor-widget-tp-navigation-menu\" data-id=\"44af61cf\" data-element_type=\"widget\" id=\"side-nav\" data-widget_type=\"tp-navigation-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"plus-navigation-wrap text-left nav-menu69f23144dfaf744af61cf\">\n\t\t\t<div class=\"plus-navigation-inner menu-hover main-menu-indicator-none sub-menu-indicator-none plus-menu-style-1\"  data-menu_transition=\"style-1\" data-mobile-menu-click=\"yes\">\n\t\t\t\t<div id=\"theplus-navigation-normal-menu\" class=\"collapse navbar-collapse navbar-ex1-collapse\">\n\t\t\t\t\n\t\t\t\t\t<div class=\"plus-navigation-menu menu-vertical-side  \">\n\t\t\t\t\t\t<ul id=\"menu-glossary-side-menu\" class=\"nav navbar-nav yamm menu-hover-none  \"><li id=\"menu-item-26399\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26399 plus-dropdown-menu-\" ><a title=\"Admin Rights\" href=\"#admin-rights\" data-text=\"Admin Rights\">Admin Rights<\/a><\/li>\n<li id=\"menu-item-26402\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26402 plus-dropdown-menu-\" ><a title=\"Data Breach\" href=\"#data-breach\" data-text=\"Data Breach\">Data Breach<\/a><\/li>\n<li id=\"menu-item-26400\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26400 plus-dropdown-menu-\" ><a title=\"Endpoint Security\" href=\"#endpoint-security\" data-text=\"Endpoint Security\">Endpoint Security<\/a><\/li>\n<li id=\"menu-item-26404\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26404 plus-dropdown-menu-\" ><a title=\"JIT (Just-in-Time)\" href=\"#jit\" data-text=\"JIT (Just-in-Time)\">JIT (Just-in-Time)<\/a><\/li>\n<li id=\"menu-item-26401\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26401 plus-dropdown-menu-\" ><a title=\"Least Privilege\" href=\"#least-privilege\" data-text=\"Least Privilege\">Least Privilege<\/a><\/li>\n<li id=\"menu-item-26398\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26398 plus-dropdown-menu-\" ><a title=\"Malware\" href=\"#malware\" data-text=\"Malware\">Malware<\/a><\/li>\n<li id=\"menu-item-26403\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26403 plus-dropdown-menu-\" ><a title=\"MFA (Multi-Factor Authentication\" href=\"#mfa\" data-text=\"MFA (Multi-Factor Authentication\">MFA (Multi-Factor Authentication<\/a><\/li>\n<li id=\"menu-item-29040\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29040 plus-dropdown-menu-\" ><a title=\"Privileged Access Management (PAM)\" href=\"#pam\" data-text=\"Privileged Access Management (PAM)\">Privileged Access Management (PAM)<\/a><\/li>\n<li id=\"menu-item-29041\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29041 plus-dropdown-menu-\" ><a title=\"Remote Access\" href=\"#remote-access\" data-text=\"Remote Access\">Remote Access<\/a><\/li>\n<li id=\"menu-item-29042\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29042 plus-dropdown-menu-\" ><a title=\"Social Engineering\" href=\"#social-engineering\" data-text=\"Social Engineering\">Social Engineering<\/a><\/li>\n<li id=\"menu-item-29043\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29043 plus-dropdown-menu-\" ><a title=\"SSO (Single Sign-On)\" href=\"#sso\" data-text=\"SSO (Single Sign-On)\">SSO (Single Sign-On)<\/a><\/li>\n<li id=\"menu-item-29044\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29044 plus-dropdown-menu-\" ><a title=\"VPN (Virtual Private Network)\" href=\"#vpn\" data-text=\"VPN (Virtual Private Network)\">VPN (Virtual Private Network)<\/a><\/li>\n<li id=\"menu-item-29045\" class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29045 plus-dropdown-menu-\" ><a title=\"Zero Trust\" href=\"#zero-trust\" data-text=\"Zero Trust\">Zero Trust<\/a><\/li>\n<\/ul>\t\t\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"plus-mobile-nav-toggle navbar-header mobile-toggle\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"mobile-plus-toggle-menu  plus-collapsed toggle-style-1\"  data-target=\"#plus-mobile-nav-toggle-nav-menu69f23144dfaf744af61cf\">\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<ul class=\"toggle-lines\"><li class=\"toggle-line\"><\/li><li class=\"toggle-line\"><\/li><\/ul>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\n\t\t\t\t\t<div id=\"plus-mobile-nav-toggle-nav-menu69f23144dfaf744af61cf\" class=\"plus-mobile-menu   collapse navbar-collapse navbar-ex1-collapse plus-mobile-menu-content \">\n\t\t\t\t\t\t<div class=\"plus-mobile-menu\"><ul id=\"menu-glossary-side-menu-1\" class=\"nav navbar-nav\"><li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26399 plus-dropdown-menu-\" ><a title=\"Admin Rights\" href=\"#admin-rights\" data-text=\"Admin Rights\">Admin Rights<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26402 plus-dropdown-menu-\" ><a title=\"Data Breach\" href=\"#data-breach\" data-text=\"Data Breach\">Data Breach<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26400 plus-dropdown-menu-\" ><a title=\"Endpoint Security\" href=\"#endpoint-security\" data-text=\"Endpoint Security\">Endpoint Security<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26404 plus-dropdown-menu-\" ><a title=\"JIT (Just-in-Time)\" href=\"#jit\" data-text=\"JIT (Just-in-Time)\">JIT (Just-in-Time)<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26401 plus-dropdown-menu-\" ><a title=\"Least Privilege\" href=\"#least-privilege\" data-text=\"Least Privilege\">Least Privilege<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26398 plus-dropdown-menu-\" ><a title=\"Malware\" href=\"#malware\" data-text=\"Malware\">Malware<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-26403 plus-dropdown-menu-\" ><a title=\"MFA (Multi-Factor Authentication\" href=\"#mfa\" data-text=\"MFA (Multi-Factor Authentication\">MFA (Multi-Factor Authentication<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29040 plus-dropdown-menu-\" ><a title=\"Privileged Access Management (PAM)\" href=\"#pam\" data-text=\"Privileged Access Management (PAM)\">Privileged Access Management (PAM)<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29041 plus-dropdown-menu-\" ><a title=\"Remote Access\" href=\"#remote-access\" data-text=\"Remote Access\">Remote Access<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29042 plus-dropdown-menu-\" ><a title=\"Social Engineering\" href=\"#social-engineering\" data-text=\"Social Engineering\">Social Engineering<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29043 plus-dropdown-menu-\" ><a title=\"SSO (Single Sign-On)\" href=\"#sso\" data-text=\"SSO (Single Sign-On)\">SSO (Single Sign-On)<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29044 plus-dropdown-menu-\" ><a title=\"VPN (Virtual Private Network)\" href=\"#vpn\" data-text=\"VPN (Virtual Private Network)\">VPN (Virtual Private Network)<\/a><\/li>\n<li class=\"menu-item menu-item-type-custom menu-item-object-custom animate-dropdown menu-item-29045 plus-dropdown-menu-\" ><a title=\"Zero Trust\" href=\"#zero-trust\" data-text=\"Zero Trust\">Zero Trust<\/a><\/li>\n<\/ul><\/div>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t \n\t\t<style>@media (min-width:992px){.plus-navigation-wrap.nav-menu69f23144dfaf744af61cf #theplus-navigation-normal-menu{display: block!important;}.plus-navigation-wrap.nav-menu69f23144dfaf744af61cf #plus-mobile-nav-toggle-nav-menu69f23144dfaf744af61cf.collapse.in{display:none;}}@media (max-width:991px){.plus-navigation-wrap.nav-menu69f23144dfaf744af61cf #theplus-navigation-normal-menu{display:none !important;}.plus-navigation-wrap.nav-menu69f23144dfaf744af61cf .plus-mobile-nav-toggle.mobile-toggle{display: -webkit-flex;display: -moz-flex;display: -ms-flex;display: flex;-webkit-align-items: center;-moz-align-items: center;-ms-align-items: center;align-items: center;-webkit-justify-content: flex-end;-moz-justify-content: flex-end;-ms-justify-content: flex-end;justify-content: flex-end;}.plus-navigation-wrap .plus-mobile-menu-content.collapse.swiper-container{display: block;}}<\/style>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53214810 e-con-full e-flex e-con e-child\" data-id=\"53214810\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-5c41bdb e-con-full e-flex e-con e-child\" data-id=\"5c41bdb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5a732ba elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"5a732ba\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"admin-rights\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff0537f elementor-widget elementor-widget-heading\" data-id=\"ff0537f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Admin Rights<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b0cf8c2 elementor-widget elementor-widget-text-editor\" data-id=\"b0cf8c2\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"NormalTextRun SCXW45668563 BCX8\">Elevated permissions that allow users to make system-level changes on computers and servers, such as installing software, <\/span><span class=\"NormalTextRun SCXW45668563 BCX8\">modifying<\/span><span class=\"NormalTextRun SCXW45668563 BCX8\"> security settings, and accessing protected files. When users <\/span><span class=\"NormalTextRun SCXW45668563 BCX8\">operate<\/span><span class=\"NormalTextRun SCXW45668563 BCX8\"> with permanent admin rights, any malware that infects their system automatically inherits those same elevated permissions.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5616524 elementor-widget elementor-widget-button\" data-id=\"5616524\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-admin-rights\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-03c2817 e-con-full e-flex e-con e-child\" data-id=\"03c2817\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ac7f3a elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"7ac7f3a\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"data-breach\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc368b8 elementor-widget elementor-widget-heading\" data-id=\"bc368b8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Breach<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4108e0 elementor-widget elementor-widget-text-editor\" data-id=\"c4108e0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW213969201 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW213969201 BCX8\">A security incident where unauthorized individuals gain access to confidential or protected information. Data breaches result from cyberattacks, insider threats, or human error, often leading to financial losses, regulatory penalties, and reputational damage.<\/span><\/span><span class=\"EOP SCXW213969201 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a5f993b elementor-widget elementor-widget-button\" data-id=\"a5f993b\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-data-breach\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60c84bd e-con-full e-flex e-con e-child\" data-id=\"60c84bd\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-80f2899 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"80f2899\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"endpoint-security\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd31863 elementor-widget elementor-widget-heading\" data-id=\"fd31863\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Endpoint Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4684367 elementor-widget elementor-widget-text-editor\" data-id=\"4684367\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW116357904 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW116357904 BCX8\">The practice of protecting devices like computers, mobile phones, and servers that connect to your network. Endpoint security solutions <\/span><span class=\"NormalTextRun SCXW116357904 BCX8\">monitor<\/span><span class=\"NormalTextRun SCXW116357904 BCX8\">, detect, and respond to threats targeting these devices, which are often the first entry point for cyberattacks.\u00a0<\/span><\/span><span class=\"EOP SCXW116357904 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-402bf9f elementor-widget elementor-widget-button\" data-id=\"402bf9f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-endpoint-security\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b33f94 e-con-full e-flex e-con e-child\" data-id=\"6b33f94\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02cd19c elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"02cd19c\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"jit\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b519c4 elementor-widget elementor-widget-heading\" data-id=\"4b519c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">JIT (Just-in-Time)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-765d8c7 elementor-widget elementor-widget-text-editor\" data-id=\"765d8c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW215084011 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW215084011 BCX8\">A security approach that provides temporary access to resources only when needed, for only as long as necessary. JIT access <\/span><span class=\"NormalTextRun SCXW215084011 BCX8\">eliminates<\/span><span class=\"NormalTextRun SCXW215084011 BCX8\"> standing privileges by granting elevated permissions on demand, then automatically removing them when the task is complete.<\/span><\/span><span class=\"EOP SCXW215084011 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fb1b26 elementor-widget elementor-widget-button\" data-id=\"0fb1b26\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-jit\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c1d66f e-con-full e-flex e-con e-child\" data-id=\"4c1d66f\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-96e897c elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"96e897c\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"least-privilege\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e09518 elementor-widget elementor-widget-heading\" data-id=\"1e09518\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Least Privilege<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3803e9 elementor-widget elementor-widget-text-editor\" data-id=\"c3803e9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW45266612 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW45266612 BCX8\">A security principle that gives users and applications only the minimum access rights needed to perform their job functions. By limiting permissions to what&#8217;s <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW45266612 BCX8\">absolutely <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW45266612 BCX8\">necessary<\/span><span class=\"NormalTextRun SCXW45266612 BCX8\">, least privilege reduces the potential damage from compromised accounts, insider threats, and malware infections.\u00a0<\/span><\/span><span class=\"EOP SCXW45266612 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0da94da elementor-widget elementor-widget-button\" data-id=\"0da94da\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-least-privilege\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a9deed7 e-con-full e-flex e-con e-child\" data-id=\"a9deed7\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a3f34e elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"0a3f34e\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"malware\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7db763b elementor-widget elementor-widget-heading\" data-id=\"7db763b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9907c7d elementor-widget elementor-widget-text-editor\" data-id=\"9907c7d\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW111186653 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW111186653 BCX8\">Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Common types include viruses, ransomware, spyware, and trojans. Malware often spreads through email attachments, infected websites, or compromised software downloads.\u00a0<\/span><\/span><span class=\"EOP SCXW111186653 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2134e98 elementor-widget elementor-widget-button\" data-id=\"2134e98\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-malware\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0cd58b e-con-full e-flex e-con e-child\" data-id=\"e0cd58b\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4d029b elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"a4d029b\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"mfa\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae1fbdd elementor-widget elementor-widget-heading\" data-id=\"ae1fbdd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">MFA (Multi-Factor Authentication)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bf0fa76 elementor-widget elementor-widget-text-editor\" data-id=\"bf0fa76\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW144601411 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW144601411 BCX8\">A security method that requires users to provide two or more verification factors to gain access to systems or applications. Common factors include something you know (password), something you have (phone or token), and something you are (fingerprint or facial recognition).\u00a0<\/span><\/span><span class=\"EOP SCXW144601411 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e71b85 elementor-widget elementor-widget-button\" data-id=\"3e71b85\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-mfa\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28fcbed e-con-full e-flex e-con e-child\" data-id=\"28fcbed\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b80d81 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"5b80d81\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"pam\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a86cf7b elementor-widget elementor-widget-heading\" data-id=\"a86cf7b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PAM (Privileged Access Management)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7f0242 elementor-widget elementor-widget-text-editor\" data-id=\"e7f0242\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW37430109 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW37430109 BCX8\">Security solutions that control and <\/span><span class=\"NormalTextRun SCXW37430109 BCX8\">monitor<\/span><span class=\"NormalTextRun SCXW37430109 BCX8\"> access to critical systems and sensitive data within an organization. PAM manages privileged accounts, enforces access policies, and provides audit trails for high-risk activities across both servers and endpoints.<\/span><\/span><span class=\"EOP SCXW37430109 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49cdb00 elementor-widget elementor-widget-button\" data-id=\"49cdb00\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-pam\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b4e7cfb e-con-full e-flex e-con e-child\" data-id=\"b4e7cfb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6925c1f elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"6925c1f\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"remote-access\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6992f96 elementor-widget elementor-widget-heading\" data-id=\"6992f96\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Remote Access<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc52479 elementor-widget elementor-widget-text-editor\" data-id=\"cc52479\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW118994080 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW118994080 BCX8\">The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring.<\/span><\/span><span class=\"EOP SCXW118994080 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0eb0ac elementor-widget elementor-widget-button\" data-id=\"c0eb0ac\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-remote-access\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05ff5d9 e-con-full e-flex e-con e-child\" data-id=\"05ff5d9\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c01d239 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"c01d239\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"social-engineering\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a81835 elementor-widget elementor-widget-heading\" data-id=\"6a81835\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Social Engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d8877ae elementor-widget elementor-widget-text-editor\" data-id=\"d8877ae\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW118994080 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW118994080 BCX8\">The ability to connect to and control computers or networks from a different location. While remote access supports flexible work and IT support, traditional methods can create security vulnerabilities without proper just-in-time access controls and session monitoring.<\/span><\/span><span class=\"EOP SCXW118994080 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d835bcd elementor-widget elementor-widget-button\" data-id=\"d835bcd\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-social-engineering\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1862f2a e-con-full e-flex e-con e-child\" data-id=\"1862f2a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d2ce9f6 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"d2ce9f6\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"sso\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-002644a elementor-widget elementor-widget-heading\" data-id=\"002644a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SSO (Single Sign-On)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-039667a elementor-widget elementor-widget-text-editor\" data-id=\"039667a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW105044303 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105044303 BCX8\">An authentication method that allows users to access multiple applications and systems with one set of login credentials. SSO reduces password fatigue, enables centralized access control, and simplifies the user experience across different platforms.<\/span><\/span><span class=\"EOP SCXW105044303 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d99c85 elementor-widget elementor-widget-button\" data-id=\"2d99c85\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-sso\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b990759 e-con-full e-flex e-con e-child\" data-id=\"b990759\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-060205c elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"060205c\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"vpn\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ff08f6 elementor-widget elementor-widget-heading\" data-id=\"0ff08f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VPN (Virtual Private Network)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f0f284 elementor-widget elementor-widget-text-editor\" data-id=\"2f0f284\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW132039097 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW132039097 BCX8\">A technology that creates an encrypted connection between a device and a network over the internet. Traditional VPNs provide broad network access but can create security risks by granting excessive permissions and <\/span><span class=\"NormalTextRun SCXW132039097 BCX8\">maintaining<\/span><span class=\"NormalTextRun SCXW132039097 BCX8\"> persistent connections that attackers can exploit.<\/span><\/span><span class=\"EOP SCXW132039097 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f2082f elementor-widget elementor-widget-button\" data-id=\"5f2082f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-vpn\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e30e4a e-con-full e-flex e-con e-child\" data-id=\"9e30e4a\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a88f3d4 elementor-absolute elementor-widget elementor-widget-menu-anchor\" data-id=\"a88f3d4\" data-element_type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"menu-anchor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-menu-anchor\" id=\"zero-trust\"><\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61fb9ca elementor-widget elementor-widget-heading\" data-id=\"61fb9ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Zero Trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c755b8 elementor-widget elementor-widget-text-editor\" data-id=\"0c755b8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW171665397 BCX8\" lang=\"EN-NZ\" xml:lang=\"EN-NZ\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW171665397 BCX8\">A security model that assumes no user, device, or application should be automatically trusted, even if <\/span><span class=\"NormalTextRun SCXW171665397 BCX8\">they&#8217;re<\/span><span class=\"NormalTextRun SCXW171665397 BCX8\"> already inside the network. Zero Trust requires continuous verification and authentication for every access request, replacing traditional perimeter-based security with identity-based access controls.\u00a0<\/span><\/span><span class=\"EOP SCXW171665397 BCX8\" data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46be225 elementor-widget elementor-widget-button\" data-id=\"46be225\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"\/en\/glossary-term-zero-trust\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you&#8217;re comparing products or trying to understand how different technologies work together. Whether you&#8217;re researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"ppma_author":[9],"class_list":["post-26358","page","type-page","status-publish","hentry","entry"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.6.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you&#039;re comparing products or trying to understand how different technologies work together. Whether you&#039;re researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/glossary\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.6.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Glossary \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you&#039;re comparing products or trying to understand how different technologies work together. Whether you&#039;re researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/glossary\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2025-07-25T22:58:28+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-03-02T21:05:30+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Glossary \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you&#039;re comparing products or trying to understand how different technologies work together. Whether you&#039;re researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary#listItem\",\"name\":\"Glossary\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary#listItem\",\"position\":2,\"name\":\"Glossary\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary\",\"name\":\"Glossary \\u00bb Admin By Request\",\"description\":\"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/glossary#breadcrumblist\"},\"datePublished\":\"2025-07-25T22:58:28+00:00\",\"dateModified\":\"2026-03-02T21:05:30+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Glossary \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Glossary \u00bb Admin By Request","description":"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/glossary","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary#listItem","name":"Glossary"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary#listItem","position":2,"name":"Glossary","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/glossary#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/glossary","name":"Glossary \u00bb Admin By Request","description":"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/glossary#breadcrumblist"},"datePublished":"2025-07-25T22:58:28+00:00","dateModified":"2026-03-02T21:05:30+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Glossary \u00bb Admin By Request","og:description":"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication","og:url":"https:\/\/www.adminbyrequest.com\/en\/glossary","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2025-07-25T22:58:28+00:00","article:modified_time":"2026-03-02T21:05:30+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Glossary \u00bb Admin By Request","twitter:description":"Cybersecurity Glossary Cybersecurity terminology can be confusing, especially when you're comparing products or trying to understand how different technologies work together. Whether you're researching solutions for your organization or just need a quick refresher on industry terms, these definitions will help. Admin Rights Data Breach Endpoint Security JIT (Just-in-Time) Least Privilege Malware MFA (Multi-Factor Authentication","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"26358","title":"#post_title #separator_sa #site_title","description":"#post_content","keywords":null,"keyphrases":{"focus":{"keyphrase":"","score":0,"analysis":{"keyphraseInTitle":{"score":0,"maxScore":9,"error":1}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"WebPage","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-03-02 21:35:47","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":{"faqs":[],"keyPoints":[],"titles":[],"descriptions":[],"socialPosts":{"email":[],"linkedin":[],"twitter":[],"facebook":[],"instagram":[]}},"created":"2025-07-25 22:58:28","updated":"2026-03-02 21:54:17"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tGlossary\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Glossary","link":"https:\/\/www.adminbyrequest.com\/en\/glossary"}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/26358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=26358"}],"version-history":[{"count":38,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/26358\/revisions"}],"predecessor-version":[{"id":31602,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/pages\/26358\/revisions\/31602"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=26358"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=26358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}