Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Data Security

Data security is the practice of identifying and protecting sensitive data, and ensuring it remains secure throughout its lifecycle.

DB2

A family of database management system products from IBM that serve a number of different operating system platforms.

DBMS

Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.

DCI

Short for Deep Content Inspection. DCI is a form of network filtering that can examine an entire file of MIME object as it passes an inspection point. It can search for viruses, spam, data loss, key words, or other content level criteria.

DDoS

DDoS, short for a Distributed Denial-of-Service is an attack or malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.

Decryption

The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.

Derby

A relational database management system developed by the Apache Software Foundation that can be embedded in Java programs and used for online transaction processing.

DevOps

DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.

Digital Signatures

A way to ensure authenticity by signing incoming messages. Signed messages provide trading partners with confirmation of who sent the message.

DIU

Short for Data in Use. This refers to active data that is currently being updated, processed, erased, accessed, or read by a system. It’s not being passively stored but is actively moving through parts of an IT infrastructure. It is more vulnerable than Data at Rest (DAR).

DLP

Short for Data Loss Prevention. DLP is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.

DMZ

Stands for the Demilitarized Zone. It is the neutral network that resides between your company’s private network and the Internet containing potential dangers.

DNS

The DNS, short for the Domain Name System, is the phonebook of the internet. It is a hierarchical and decentralized naming system for computers, services, or other resources connected to the internet or a private network.

Docker

A set of platform-as-a-service products that use operating-system-level virtualization to deliver software in packages called containers.

Dropbox

A file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. It is available as a GoAnywhere Cloud Connector.

Drummond Certified

Indicates that the AS2 implementation in a certain software package has been tested and approved by the Drummond Group. Drummond certification provides a high degree of security assurance and offers compatibility with other applications that send AS2 file transfers.

Dynamics 365

A product line of enterprise resource planning and customer relationship management applications created by Microsoft. It is available as a GoAnywhere Cloud Connector.

EDI

Short for Electronic Data Interchange. It is a flat file format that B2B trading partners use to send and receive business transactions. Both parties must agree on a transaction set before files are exchanged. Each transaction set corresponds with a number and type of document.

EDI X12

EDI X12 is an Electronic Data Interchange format based on ASC X12 standards. Organizations worldwide use EDI X12 format to exchange data between two or more trading partners.

EDIFACT

Stands for the Electronic Data Interchange for Administration, Commerce and Transport. It is the international EDI standard developed by the United Nations.

EFSS

Short for Enterprise File Sync and Sharing. It is a secure document storage solution that allows IT administrators to maintain local control of file security and user access.

 

Email Encryption

Email encryption can secure email online via a number of options using encryption. These include TLS, password, push/pull, S/MIME, and PGP encryption.

Encryption

The process of converting information or data into a code, particularly to prevent unauthorized or malicious access.

Endpoint DLP

This offers the ability to control which devices can connect to a corporate network, control what information can be transferred from a corporate network onto devices with context-aware Data in Use (DIU) Policies, and provide the ability to execute Data at Rest (DAR) scanning to audit and manage critical information on endpoints.

FaaS

Short for “Functions as a Service.” FaaS is a form of cloud computing that provides a “serverless” option for customers to develop, run, and manage application functionalities without maintaining infrastructure.

FIPS 140-2 Compliance

Stands for the Federal Information Processing Standard. The 140 series of FIPS are U.S. government computer security standards that specify requirements for cryptography modules. The FIPS 140-2 is the current version.

FISMA

Short for the Federal Information Security Management Act. It established a set of security guidelines that help to reduce the security risk to federal data.

Fixed-Width (file)

A file that has a specific format which allows for the saving of textual information/data in an organized fashion.  

Forward Proxy

A proxy configured to handle requests for a group of clients under the local Administrators control to an unknown or arbitrary group of resources that are outside of their control.

FTP

FTP, short for File Transfer Protocol, is a standard network protocols used for the transfer of computer files between a client and server on a computer network.

FTP Client

Available in the free edition of GoAnywhere MFT. It allows you to set up and automate FTP transfers through an intuitive browser-based interface.

FTPS

FTPS (FTP over SSL/Secure Sockets Layer) is a secure FTP protocol that allows you to protect and exchange files with trading partners, employees, and clients.

GDPR

Short for the General Data Protection Regulation. It was designed to protect the personal data of EU (European Union)-based individuals, while harmonizing data privacy laws throughout the EU.

GLBA

Stands for the Gramm-Leach-Bliley Act. It is a federal law enacted in the U.S. to control the ways that financial institutions deal with the private information of individuals.

GnuPG

Stands for GNU Privacy Guard. It is a free software replacement for Symantec’s PGP cryptographic software suite, compliant with RFC 4880. Also known as GPG.

GoAnywhere Gateway

An enhanced reverse and forward proxy that gives organizations an additional layer of security for exchanging data with trading partners.