Skip to main content

Glossary

TermDescription
Security365SOFTCAMP's integrated security service platform. It offers various security services such as SHIELDrive, SHIELD Gate, and Document Security.
Security365 Management CenterA dedicated platform for administrators to centrally manage Security365 services. Control users, groups, licenses, and policies from a single console.
SHIELDriveSecurity365's cloud document security storage service. Provides file encryption storage and access control features.
SHIELD GateSecurity365's Remote Browser Isolation (RBI) based web security service. Protecting users from web threats.
Document SecuritySecurity365's document encryption and access control service. Provides DRM-based document security.

Account and Authentication Terms

TermDescription
SSO (Single Sign-On)Single sign-on. An authentication method that allows access to multiple Security365 services with a single login.
SAML (Security Assertion Markup Language)Standard protocols for implementing SSO. Integrate authentication with the organization's IdP.
IdP (Identity Provider)ID provider. A system responsible for user authentication in an SSO environment. When configuring SAML SSO, it is necessary to register the organization's IdP information.
SP (Service Provider)Service Provider. A system that provides services in an SSO environment. Security365 acts as the SP.
OTP (One-Time Password)One-time password. Used as an additional authentication method, verified with a time-based code generated by the authentication app.
MFA (Multi-Factor Authentication)Multi-factor authentication. Strengthening security by requiring additional authentication methods such as OTP and email verification in addition to ID/password.
CSP CertificationCloud service provider authentication. Login method using external accounts such as Microsoft, Google, etc.

User Management Terms

TermDescription
UserMembers of the organization using the Security365 service. Registration and management in the management center.
AdministratorUsers who have permission to access the Security365 management center and manage settings.
Super AdministratorAn administrator with full permissions across the system. Can grant/revoke permissions for other administrators. At least 1 is required.
Editor ManagerAdministrator who can view and edit all service menus. Administrator menu access not allowed.
Query ManagerAn administrator who can only view all service menus. No modification rights.
Log Viewer AdminGranted to administrators, such as audit personnel, who can only view the log menu.
Activate/DeactivateAvailability status of the user account. If deactivated, service access is not possible, and the license is automatically revoked.

Group Management Terms

TermDescription
Basic GroupA group created to reflect the organizational structure (departments, teams, etc.). Created through manual registration, CSV bulk registration, and synchronization.
Policy GroupA virtual group created separately for policy application. Members can be designated regardless of the organizational structure.
Condition-based groupA policy group where members are automatically set based on specific conditions (e.g., IDs starting with 'dev').
TermDescription
Conditional PolicyA policy that dynamically controls service access based on conditions such as the user's IP, time, country, device, etc.
Condition itemsComponents of access conditions used in conditional policies. Location (IP), country, and time conditions can be registered.
Access PolicyPolicies applied when conditions are met. Choose between Allow access, Block access, or Allow access + Additional authentication.
PriorityA value that determines the order of policy application. If a user is included in multiple policies, the policy with the highest priority is applied.
Zero Trust"Do not trust blindly, always verify" is a security principle. Validate all access attempts and grant the minimum necessary permissions.
TermDescription
Inbound ProvisioningProcess of importing user/group information from external systems (Microsoft 365, SCI Server) to Security365.
Full synchronizationThe method for synchronizing all AD groups and user information in a Microsoft 365 tenant.
Designated Group SynchronizationA method to synchronize only specific AD groups and members selected by the administrator in Microsoft 365.
Automatic synchronizationAutomatic synchronization that runs daily at the set time. Real-time reflection of personnel changes.
Manual synchronizationSynchronization performed by the administrator by clicking the execute button immediately.
AD (Active Directory)Microsoft's directory service. It is used for managing user accounts and groups and can be integrated with Security365.
Azure ADMicrosoft's cloud-based ID management service. Currently renamed to Microsoft Entra ID.
SCI ServerPersonnel Information Management Server used in SOFTCAMP's Document Security
TenantA unit that distinguishes organizations in cloud services. When synchronizing Microsoft 365, it is linked based on the tenant.
TermDescription
LicensePermission for the user to use a specific Security365 service. Must be assigned to the user for service availability.
PlanSecurity365 service subscription unit. The features and number of licenses available are determined by the plan.
Automatic License AssignmentA feature that automatically grants licenses when a user is activated.
Remaining licensesThe remaining quantity after excluding the allocated licenses from the total number of licenses.

Security classification terminology

TermDescription
Security Classification LabelA feature for systematically classifying the security level of data. A two-tier structure of grades and labels.
GradeTop-level classification that distinguishes the security level of data. For example: Confidential, Sensitive, Public. Color coding by grade is possible.
LabelSubcategories of the grade. Detailed classification based on the nature or purpose of the data. Example: personnel information, customer information.

Logging and Monitoring Terms

TermDescription
logRecords of service usage activities by users and administrators. Connection date and time, IP, performed actions, etc. are recorded.
Log BackupA feature to regularly save log data as archive files. Backup cycle and collection period can be set.
Archive fileA compressed file created during log backup. Contains log data for the configured collection period.
Master LogOriginal log data before backup. It will be deleted after backup if the automatic deletion setting is enabled.
Log external transmissionFunction to automatically transfer log backup files to an external server using SSH/SFTP method.

Account Security Terms

TermDescription
Password PolicySecurity rules applied when creating and changing passwords. Settings for minimum length, character combinations, change frequency, etc.
Password reuse restrictionA feature that restricts the reuse of the last N passwords.
Account LockoutA security feature that temporarily locks the account after multiple incorrect password entries.
Automatic LogoutA feature that automatically logs out if the service is not used for a set period of time.
Account Deactivation PeriodSetting to automatically deactivate user accounts after a certain period of inactivity.

Other Terms

TermDescription
CSV (Comma-Separated Values)Comma-separated values format file. Used for bulk registration of users and groups.
GNB (Global Navigation Bar)Global navigation bar. The menu area displayed at the top of the service.
FaviconA small icon image displayed on the browser tab.
Approval ServiceA feature for centrally managing approval requests generated by the integration service.
On-PremiseA method of directly installing and operating on an internal server of the organization. It is contrasted with the cloud method.