Glossary
Last updated
Was this helpful?
Last updated
Was this helpful?
FenixPyre has its own vocabulary. Most FenixPyre terms are common English words or computing terms that have a specific meaning within the FenixPyre system.
This glossary lists the most prominent terms and a few less familiar ones with unusual or unexpected definitions.
FenixPyre Windows Agent is the software installed in client machines for encrypting and opening files securely.
The Admin Dashboard is the place where admins can manage their users, permissions, policies, and applications. Access it at .
Protected Folders are designated locations within an organization where sensitive content can be accessed. Files outside these folders can't be opened. Examples include common user folders on endpoints, network drives, and cloud-based document-sharing platforms.
To access FenixPyre encrypted data, specific conditions must be met. Our system automatically enforces access rules on all files to save time. Currently, we support access rules based on geographic locations, such as country restrictions to the US, and IP address
FenixPyre will only encrypt and open files whose file extension has been added in the FenixPyre Admin Dashboard.
User applications are authorized applications that are permitted to display FenixPyre encrypted data in plain text, assuming the access rules are satisfied.
FenixPyre Offline mode allows users to access their files when their devices are not connected to the internet. Enabling this feature is easy from the FenixPyre admin dashboard. When enabled, FenixPyre users will have the "offline access" action available on their FenixPyre right-click menu.
Whitelisting refers to designating a specific process or file as trusted, allowing it to operate without interference from security tools,
A process refers to a program actively running on your computer. An executable, such as a .exe
file in Windows, is a file that initiates a program. These are what you authorize the system to trust
Endpoint security solutions designed to monitor, detect, and respond to threats on devices such as computers and servers.
Software engineered for the detection and protection against malicious programs, such as malware and viruses.
An advanced solution that combines multiple security elements (endpoints, networks, cloud systems) for a comprehensive threat overview.
Configure user applications
Configure offline mode