Skip to content
NOW AVAILABLE
Feature Release! Learn About Our Enhanced Capabilities for Prioritizing Remediation
Learn more >>
Platform
Overview
Platform
Deployment
Integrations
Features
AI-Powered Reporting
Scheduler
Content Library
Analytics
Runbooks
Assessments
Asset Management
Templates
Client Portal
Priorities
Benefits
Speed Pentest Reporting
Collaborate Effectively
Deliver Actionable Insights
Expand Service Offerings
Improve Report Quality
Measure Risk
Solutions
Use Case
PlexTrac for Pentest Reporting
Cut pentest reporting time by up to 75%
PlexTrac for Prioritizing Remediation
Auto-prioritize remediation with contextual risk scoring
PlexTrac for CTEM
** NEW **
Adopt a continuous approach to managing exposure risk
Organizations
Enterprise Teams
Service Providers
Customers
Resources
Resources
Blog
eBooks
Webinars
Videos
Concepts
Events
ROI Calculator
Featured Resource
Conversational Continuous Threat Exposure Management (CTEM)
Download eBook
Partner
Pricing
Company
Company
About
News
Careers
Contact
Support Portal
Search Site:
search button
Please enter at least 3 characters before searching.
Contact Us
Book a Demo
Book a Demo
Go to homepage
Book a Demo
close mobile menu
Platform
Overview
BACK
Platform
Deployment
Integrations
Features
BACK
AI-Powered Reporting
Scheduler
Content Library
Analytics
Runbooks
Assessments
Asset Management
Templates
Client Portal
Priorities
Benefits
BACK
Speed Pentest Reporting
Collaborate Effectively
Deliver Actionable Insights
Expand Service Offerings
Improve Report Quality
Measure Risk
Customers
Use Cases
BACK
PlexTrac for Pentest Reporting
PlexTrac for Prioritizing Remediation
PlexTrac for CTEM
Organizations
BACK
Service Providers
Enterprise Teams
Resources
BACK
Blog
eBooks
Webinars
Videos
Concepts
Events
ROI Calculator
Partner
Request Pricing
Company
BACK
About
News
Careers
Contact
Support Portal
Search Site:
search button
Please enter at least 3 characters before searching.
Plex
Trac Concepts
Explore terms and definitions covering industry thought leadership, PlexTrac features, cybersecurity foundations, and much more.
A
B
C
D
E
I
M
N
O
P
R
S
T
V
Z
A
A
Advanced Persistent Threats
AI in Cybersecurity
Attack Surface Management (ASM)
Automated Pentesting
B
B
Breach and Attack Simulation (BAS)
Blue Teaming
C
C
Common Vulnerability Scoring System (CVSS)
Continuous Threat Exposure Management (CTEM)
Continuous Monitoring
Continuous Validation
D
D
Dynamic Application Security Testing
E
E
Extended Detection and Response (XDR)
Exposure Management
Ethical Hacking
Endpoint Detection and Response (EDR)
I
I
ISO 27001
Interactive Application Security Testing
Insider Threats
Incident Response (IR)
M
M
Manual Pentesting
Mean Time to Detect (MTTD)
Mean Time to Respond (MTTR)
Mitigation
MITRE ATT&CK Framework
N
N
Network Penetration Testing
NIST Cybersecurity Framework
O
O
Offensive Security
OWASP
P
P
Purple Teaming
Proactive Security
Prioritization Frameworks
Phishing
Penetration Testing As a Service (PTaaS)
R
R
Ransomware
Risk Score
Risk Prioritization
Risk Assessment
Remediation
Red Teaming
S
S
Static Application Security Testing
Source Code Analysis
Security Orchestration, Automation, and Response (SOAR)
T
T
Threat Modeling
Threat Intelligence
V
V
Vulnerability Management
Z
Z
Zero-Day Vulnerabilities
Zero Trust Architecture