Skip to main content

Glossary

TermDescription
SHIELD GateA web security solution based on Remote Browser Isolation (RBI) technology. It hosts the user's web browsing session on the server to protect against online threats.
SHIELD ViewerA dedicated viewer that provides a secure preview when downloading files. Supports read-only document viewing functionality.
SHIELD DriveThe file storage feature of SHIELD Gate. A storage system that safely keeps downloaded files in an isolated environment.
Edge serverA server that supports the establishment of local storage for internal protection. Key elements of a file storage-based architecture.

Security technology terminology

TermDescription
RBI (Remote Browser Isolation)Remote browser isolation. A security technology that executes web browsing sessions on a remote server to isolate the local system from threats.
CDR (Content Disarm and Reconstruction)Document sanitization technology. It removes malware or threats from files and reconstructs them into a safe form for delivery.
Isolated BrowserRemote browser running on the server. Provides an isolated environment to prevent web content from being directly stored on the user's local PC.
Screen markingA feature that displays user identification information in the form of a watermark on the screen to ensure traceability in case of information leakage.

Access and Authentication Terms

TermDescription
SSO (Single Sign-On)Single Sign-On (SSO). An authentication method that allows access to multiple systems with a single login. Used in conjunction with internal accounts.
AD (Active Directory)Microsoft's directory service. Used for managing user accounts and permissions, and can be integrated with SHIELD Gate.
OTP (One-Time Password)One-time password. A time-based or event-based password used for additional security authentication.
RBAC (Role-Based Access Control)Role-based access control. A method of granting system access permissions based on the user's role.
WOL (Wake On LAN)Technology to remotely power on a PC that is turned off via the network. Used for desktop remote access.
TermDescription
Conditional PolicyAccess control policies that are applied differently based on specific conditions such as user location, time, device, and group.
PriorityA value that determines the order of policy application. The lower the number, the earlier it is applied, and in case of a conflict, the more restrictive policy is applied last.
Web CategoryGroups of URLs classified by their nature (e.g., shopping, social media, finance, etc.). You can set access allow/block policies by category.
WildcardSpecial character (*) used for URL pattern matching. Used before the domain to match all URLs including subdomains.
Regular Expression (Regex)Expression for finding strings of a specific pattern. Used for detecting sensitive information (e.g., resident registration numbers, account numbers).
Expiration DateStart and end dates of the policy. It can be set to activate the policy only during the specified period.

Network Terms

TermDescription
PAC (Proxy Auto-Config)Proxy auto-configuration file. A script that automatically determines which proxy to use when the browser accesses a specific URL.
DNS (Domain Name System)A system that converts domain names to IP addresses. In the RBI environment, DNS queries are performed on an isolated server.
ProtocolNetwork communication protocols. HTTP and HTTPS are separately distinguished for policy application.
VDI (Virtual Desktop Infrastructure)Virtual Desktop Infrastructure. A technology that provides virtual desktops from a server.
TermDescription
extensionThe suffix after the file name that indicates the file format (e.g., .pdf, .xlsx, .docx). Upload/download control is possible by file extension.
ClipboardTemporary storage area used for copy/paste functionality. Clipboard usage between PC and remote browser can be controlled by policy.
Isolated StorageAn isolated storage space where downloaded files are saved. They are stored in the designated storage instead of being saved directly on the local PC.
Trash canA space where deleted files are temporarily stored. They are automatically deleted after a certain period (default 30 days) and can be restored before that.
EncryptionA process that transforms files using a special algorithm to ensure safe protection. Automatic encryption can be performed during upload.

User Interface Terms

TermDescription
AppIcon or shortcut to access the business system (ERP, groupware, etc.) registered by the administrator.
URL input field (address bar)An input field where users can directly enter a web address to access the site.
GNB (Global Navigation Bar)Global navigation bar. A top menu that displays a list of recently accessed apps/URLs and supports quick access.
Top barMenu and control area at the top of the screen. Supports full-screen view through hide/show functionality.
Lock screenA guide page displayed when access is blocked by policy. Customizable.

Collaboration and Integration Terms

TermDescription
M365 (Microsoft 365)Microsoft's cloud-based productivity platform. Includes Teams, Office365, Word, PowerPoint, etc.
TeamsMicrosoft's collaboration tool. Supports viewing, uploading, and editing files within the Teams app at SHIELD Gate.
Collaborative editingA feature that allows multiple users to edit a single document simultaneously. Supported by MS365, Google Docs, etc.
Google DocsGoogle's cloud-based document editing tool. Provides real-time collaborative editing features.
Hancom WebA web-based document editing solution from Hancom. You can view and edit hwp/hwpx files online.
NAS (Network Attached Storage)Network-connected storage device. Can be linked to external storage.
OneDriveMicrosoft's cloud storage service
Google DriveGoogle's cloud storage service

Remote Access Terms

TermDescription
SSH (Secure Shell)Network protocol for secure remote access. Supports command execution and file transfer.
SFTP (SSH File Transfer Protocol)SSH-based secure file transfer protocol
TerminalA text-based interface that allows you to control the system by entering commands.
Remote ConsoleA console interface that allows remote access and management of web servers, etc.

Logging and Monitoring Terms

TermDescription
logData that records system and user activities. Includes history of login/logout, file downloads, policy modifications, etc.
SessionThe duration of access from the time the user logs in until they log out or are automatically logged out.
TimeoutA feature that automatically ends the session when there is no user activity for a certain period of time.
DashboardA management screen that visually displays key indicators and statistics. Monitors access status, website categories, and more.
ArchiveA file that has been compressed and stored for long-term log retention.
Integrity VerificationThe process of verifying that log data has not been tampered with.

Technical terms

TermDescription
WebGLJavaScript API for rendering 3D graphics in web browsers
CacheA memory area that temporarily stores frequently used data to improve performance.
CookieA small data file that the website stores in the user's browser. Used for keeping the login status, etc.
Session InformationServer-side data to maintain the user's connection status.
Endpoint BrokerTechnology that supports web applications requiring internal PC communication (such as banking security programs).

Management Terms

TermDescription
LicenseProduct usage permissions. Can be assigned automatically or manually depending on the number of users.
Inbound ProvisioningA feature that automatically synchronizes user information from external systems (Microsoft 365, SCI Server, etc.)
SchedulingA feature that allows you to schedule a specific task to run automatically at a designated time.
Policy GroupA bundle of users who are subject to the same policy. Group creation and management according to organizational structure.
CSVComma-separated values format file. Used for bulk user registration.
Activate/DeactivateAvailability status of the user account. Access to the service is not possible when deactivated.