Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

DAR

Short for Data at Rest. DAR refers to inactive data that is stored physically in any digital form, such as databases, spreadsheets, archives, mobile devices, and more. It is subject to threats from hackers and other malicious threats.

Data Classification

Data classification is the act of organizing data by relevant categories so that it may be used and protected more efficiently.

Data in Transit

Data in Transit, also known as Data in Motion or Data in Flight, is used to describe data that is in transit from one location to another through networks (cellular, Wi-Fi, private, etc.). The term is often used in laws and regulations to define another key state where data must be secured.

Data Key

A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted. 

Data Mining

Data Mining is a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.

Data Security

Data security is the practice of identifying and protecting sensitive data, and ensuring it remains secure throughout its lifecycle.

DB2

A family of database management system products from IBM that serve a number of different operating system platforms.

DBMS

Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.

DCI

Short for Deep Content Inspection. DCI is a form of network filtering that can examine an entire file of MIME object as it passes an inspection point. It can search for viruses, spam, data loss, key words, or other content level criteria.

DDoS

DDoS, short for a Distributed Denial-of-Service is an attack or malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.

Decryption

The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.

Derby

A relational database management system developed by the Apache Software Foundation that can be embedded in Java programs and used for online transaction processing.

DevOps

DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.

Digital Signatures

A way to ensure authenticity by signing incoming messages. Signed messages provide trading partners with confirmation of who sent the message.

DIU

Short for Data in Use. This refers to active data that is currently being updated, processed, erased, accessed, or read by a system. It’s not being passively stored but is actively moving through parts of an IT infrastructure. It is more vulnerable than Data at Rest (DAR).

DLP

Short for Data Loss Prevention. DLP is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

DMZ

Stands for the Demilitarized Zone. It is the neutral network that resides between your company’s private network and the Internet containing potential dangers.

DNS

The DNS, short for the Domain Name System, is the phonebook of the internet. It is a hierarchical and decentralized naming system for computers, services, or other resources connected to the internet or a private network.

Docker

A set of platform-as-a-service products that use operating-system-level virtualization to deliver software in packages called containers.

Dropbox

A file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. It is available as a GoAnywhere Cloud Connector.

Drummond Certified

Indicates that the AS2 implementation in a certain software package has been tested and approved by the Drummond Group. Drummond certification provides a high degree of security assurance and offers compatibility with other applications that send AS2 file transfers.

Dynamics 365

A product line of enterprise resource planning and customer relationship management applications created by Microsoft. It is available as a GoAnywhere Cloud Connector.