GoAnywhere File Transfer Glossary
Welcome to the GoAnywhere File Transfer Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level MFT glossary is a great resource for learning all of the relevant GoAnywhere goods. Scroll through the full list below, search by term, or select by individual letter.
A technique for testing new software or new features whereby two or more versions are deployed to users for testing. The metrics from each variant are then compared and assessed based on the testing criteria.
An integrated system that limits access to various services using common credential and authentication tools like passwords. For cloud platforms, the access control system is often integrated with existing authentication protocols, such as Active Directory.
A popular open source, multi-protocol Java-based messaging server.
Stands for Active Directory. AD is Microsoft’s proprietary directory service. It is an umbrella title for a broad range of directory-based identity-related services.
A file transfer, or essentially sending a file to another person, generally on a "one-off" basis.
Adaptive Data Loss Prevention, or A-DLP, are solutions that automatically applies the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting.
Adaptive Redaction technology removes and prevents non-compliant information from being shared.
GoAnywhere’s module that allows you to gain access to important system information such as PDF documents.
Advanced Workflows is GoAnywhere's module that handles Workflows (projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes).
Short for Advanced Encryption Standard. It is a popular encryption standard that is approved by the NIST.
Stands for Advanced Interactive Executive. It is an operating system developed by IBM and is UNIX-based. It is typically used for enterprise servers and comes with a robust set of security features.
A MySQL and PostgreSQL-compatible relational database built for the cloud. It combines the performance and availability of traditional databases along with the simplicity and cost-effectiveness of open source databases.
Short for Amazon Simple Storage Service. It provides organizations with affordable and scalable cloud storage.
Built in cloud connectors available from Amazon. They are available as GoAnywhere Cloud Connectors.
Short for the American National Standards Institute. ANSI is a U.S.-based non-profit organization that works to develop and promote standards in the United States and globally. It helps ensure product integrity and safety.
Any security program, software, hardware, or combination of both, designed to monitor a system for malicious software. Malicious software can include viruses, worms, Trojan Horses, etc.
Anti-Steganography combats external threats and data loss hidden in images.
A computer program used to prevent, detect, and remove malware.
Short for Application Programming Interface. An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system.
Short for Applicability Statement 2. AS2 is a standard used to securely send and receive files over the Internet. The messages are built using S/MIME format and can be compressed, signed, and encrypted.
Short for Applicability Statement 3. AS3 is a message standard used to securely transmit virtually any file type. It focuses on message formatting, is flexible, and the messages are structured using the standard S/MIME format. It is also a push-pull protocol and does not require an ongoing connection.
Short for Applicability Statement 4. AS4 is a popular file transfer protocl that gives businesses the ability to securely exchange data with their partners. It builds on the foundations set by AS2 to improve security, reliability, and flexibility for delivering and receiving messages.
Stands for the Accredited Standards Committee X12. It is a standards organization and develops and maintains the X12 EDI and CICA standards, along with XML schemas that drive business processes globally.
Stands for the Accredited Standards Committee X9. It is an ANSI accredited standards developing organization that is responsible for developing Voluntary Open Consensus Standards (VOCS) for the finance industry in the U.S.
Asymmetric, or public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are a pair, but not identical. One key in the pair can be shared with everyone; the public key. The other key in the pair is kept secret; the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
A record of a sequence of events (such as actions performed by a computer) from which a history may be reconstructed.
A software that provides powerful tools to automate frontend and backend processes in your enterprise. It is available as GoAnywhere Cloud Connector.
Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers.
Short for Amazon Web Services. It is a subsidiary platform of Amazon that provides cloud computing services.
Provides organizations with affordable and scalable cloud storage provided by Microsoft.
An intelligent and scalable cloud databases service that provides the broadest SQL Server engine compatibility.
BaaS, short for Backend-as-a-Service, allows developers to focus on the frontend of their applications and leverage backend services without building or maintaining them.
In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. Backdoors are known for being discreet and attacks can often go undetected, resulting in them being used over and over again.
BAI, or BAI file format, is a file format for performing electronic cash management balance reporting. It was developed and previously maintained by the Bank Administration Institute (BAI). BAI does not separate out the incoming check line items by invoice subtotal reference.
BAI2 is a banking EDI format. It is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI). BAI2 splits the check total into separate invoice references and assoicated payment amounts.
Bank Administration Institute (BAI)
The Bank Administration Institute is a non-profit organization in the US that provides training, research, and leadership events for the finance industry.
A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.
BaaS, short for Backend-as-a-Service, allows developers to focus on the frontend of their applications and leverage backend services without building or maintaining them.
A ledger or chain of information that retails a detailed history of digital transactions. They are meant to help protect against counterfeiting and to safeguard digital transactions.
A computer or system that has been compromised and is undetected. The computer can be controlled directly by a bot master or herder for the purpose of spamming or launching a DDoS attack. It may also have been programmed to perform certain actions when interfacing with human input or websites.
A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector.
Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.
A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.
Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.
An entity that issues digital certificates, the highest level of trust.
A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.
Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange.
Stands for Common Internet File System. It is a dialect of SMB.
The result of encryption performed on plaintext using an algorithm, known as a cipher.
This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.
A built-in web and cloud application offered by GoAnywhere. Cloud connectors, or cloud integrations, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.
Transferring or syncing files securely from one cloud service directly to another.
Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.
Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.
This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of the standard.
A way to improve transmission time by shrinking the size of messages.
Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.
The science of protecting information by transforming it into a secure format.
Cryptojacking is an online threat with the main purpose of stealing or "mining" cryptocurrencies.
Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.
Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.
Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files.
Short for Data at Rest. DAR refers to inactive data that is stored physically in any digital form, such as databases, spreadsheets, archives, mobile devices, and more. It is subject to threats from hackers and other malicious threats.
Data in Transit, also known as Data in Motion or Data in Flight, is used to describe data that is in transit from one location to another through networks (cellular, Wi-Fi, private, etc.). The term is often used in laws and regulations to define another key state where data must be secured.
A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted.
Data Mining is a process of discovering patterns in large data sets involving methods at the intersection of machine learning, statistics, and database systems.
A family of database management system products from IBM that serve a number of different operating system platforms.
Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.
Short for Deep Content Inspection. DCI is a form of network filtering that can examine an entire file of MIME object as it passes an inspection point. It can search for viruses, spam, data loss, key words, or other content level criteria.
DDoS, short for a Distributed Denial-of-Service is an attack or malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.
The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.
A relational database management system developed by the Apache Software Foundation that can be embedded in Java programs and used for online transaction processing.
DevOps is a set of practices that combines software development (Dev) and IT operations (Ops). It aims to shorten the systems development life cycle and provide continuous delivery with high software quality.
A way to ensure authenticity by signing incoming messages. Signed messages provide trading partners with confirmation of who sent the message.
Short for Data in Use. This refers to active data that is currently being updated, processed, erased, accessed, or read by a system. It’s not being passively stored but is actively moving through parts of an IT infrastructure. It is more vulnerable than Data at Rest (DAR).
Short for Data Loss Prevention. DLP is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
Stands for the Demilitarized Zone. It is the neutral network that resides between your company’s private network and the Internet containing potential dangers.
The DNS, short for the Domain Name System, is the phonebook of the internet. It is a hierarchical and decentralized naming system for computers, services, or other resources connected to the internet or a private network.
A set of platform-as-a-service products that use operating-system-level virtualization to deliver software in packages called containers.
A file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. It is available as a GoAnywhere Cloud Connector.
Indicates that the AS2 implementation in a certain software package has been tested and approved by the Drummond Group. Drummond certification provides a high degree of security assurance and offers compatibility with other applications that send AS2 file transfers.
A product line of enterprise resource planning and customer relationship management applications created by Microsoft. It is available as a GoAnywhere Cloud Connector.
Short for Electronic Data Interchange. It is a flat file format that B2B trading partners use to send and receive business transactions. Both parties must agree on a transaction set before files are exchanged. Each transaction set corresponds with a number and type of document.
EDI X12 is an Electronic Data Interchange format based on ASC X12 standards. Organizations worldwide use EDI X12 format to exchange data between two or more trading partners.
Stands for the Electronic Data Interchange for Administration, Commerce and Transport. It is the international EDI standard developed by the United Nations.
Short for Enterprise File Sync and Sharing. It is a secure document storage solution that allows IT administrators to maintain local control of file security and user access.
Email encryption can secure email online via a number of options using encryption. These include TLS, password, push/pull, S/MIME, and PGP encryption.
The process of converting information or data into a code, particularly to prevent unauthorized or malicious access.
This offers the ability to control which devices can connect to a corporate network, control what information can be transferred from a corporate network onto devices with context-aware Data in Use (DIU) Policies, and provide the ability to execute Data at Rest (DAR) scanning to audit and manage critical information on endpoints.
Short for “Functions as a Service.” FaaS is a form of cloud computing that provides a “serverless” option for customers to develop, run, and manage application functionalities without maintaining infrastructure.
Stands for the Federal Information Processing Standard. The 140 series of FIPS are U.S. government computer security standards that specify requirements for cryptography modules. The FIPS 140-2 is the current version.
Short for the Federal Information Security Management Act. It established a set of security guidelines that help to reduce the security risk to federal data.
A file that has a specific format which allows for the saving of textual information/data in an organized fashion.
A proxy configured to handle requests for a group of clients under the local Administrators control to an unknown or arbitrary group of resources that are outside of their control.
FTP, short for File Transfer Protocol, is a standard network protocols used for the transfer of computer files between a client and server on a computer network.
Available in the free edition of GoAnywhere MFT. It allows you to set up and automate FTP transfers through an intuitive browser-based interface.
FTPS (FTP over SSL/Secure Sockets Layer) is a secure FTP protocol that allows you to protect and exchange files with trading partners, employees, and clients.
Short for the General Data Protection Regulation. It was designed to protect the personal data of EU (European Union)-based individuals, while harmonizing data privacy laws throughout the EU.
Stands for the Gramm-Leach-Bliley Act. It is a federal law enacted in the U.S. to control the ways that financial institutions deal with the private information of individuals.
Stands for GNU Privacy Guard. It is a free software replacement for Symantec’s PGP cryptographic software suite, compliant with RFC 4880. Also known as GPG.
An enhanced reverse and forward proxy that gives organizations an additional layer of security for exchanging data with trading partners.
A managed file transfer solution that automates and secures file transfers using a centralized enterprise-level approach.
A cloud-based file sharing alternative available from GoAnywhere. It provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners.
A file transfer acceleration protocol in GoAnywhere MFT that can transmit data considerably faster than traditional FTP.
A file storage and synchronization service developed by Google. It is available as a GoAnywhere Cloud Connector.
Stands for GNU Privacy Guard. It is a free software replacement for Symantec’s PGP cryptographic software suite, compliant with RFC 4880. Also known as GnuPG.
A file format and a software application used for file compression and decompression using the GZIP standard.
Short for the Health Insurance Portability and Accountability Act. It sets the standard for protecting sensitive data and applies to any company that details with protected health information (PHI).
Short for the Health Information Technology for Economic and Clinical Health Act. It was created to motivate the implementation of electronic health records and support technology in the United States.
Health level 7 is a set of international standards for the transfer of clincial and administrative data between software applications used by a number of healthcare providers. These standards focus on the application layer, or "layer 7" in the OSI model. HL7 standards are produced by Health Level Seven International, an international standards organization, and are adopted by standard issuing groups like ANSI and the IOS (International Organization for Standardization).
Health Level Seven International (HL7) is a non-profit organization ANSI-accredited standards development organization dedicated to providing standards and solutions that empower global health data interoperability.
Stands for Hypertext Markup Language. It is a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effect on World Wide Web pages.
Short for Hypertext Transfer Protocol. HTTP is the data transfer protocol used on the World Wide Web.
An HTTP proxy that serves two intermediary roles: an HTTP Client and an HTTP Server. It is for security, management, and caching functionality.
Short for Hypertext Transfer Protocol Secure. It is an extension of Hypertext Transfer Protocol (HTTP) and is used for secure communication over a computer network. It is widely used on the internet.
Short for “Infrastructure as a Service.” IaaS is a form of cloud computing that provides virtual computing resources such as storage, networking, and other capabilities over the internet.
Stands for the Internet Architecture Board. It is the internet society that oversees the technical evolution of the internet. It also supervises the IETF and the IRTF.
An operating system that runs on the IBM Power Systems and IBM PureSystems.
This is an IBM standard and MOM product for messaging. It uses messages and queues to support the exchange of information between applications, systems, services, and files. It was previously known as Websphere MQ.
Short for the Internet Content Adaption Protocol. It is a lightweight protocol that provides simple object-based content vectoring for HTTP services.
Stands for the Internet Engineering Task Force. It is an open standards organization that develops and promotes voluntary internet standards, in particular the standards that comprise the internet protocol suite.
Stands for the Internet Message Access Protocol. It is an internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection.
A product family within IBM’s Information Management division. It is a fast and flexible database with the ability to seamlessly integrate SQL, NoSQL/JSON, plus time series and spatial data.
Short for the International Organization for Standardization. This is an international standard-setting organization composed of representatives from various national standards organizations.
The IoT, or Internet of Things, is a system of interrelated computing devices, mechancial and digital machines, objects, animals, or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
Short for Internet Protocol. IP is the principal communications protocol in the internet for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the internet.
“Integration Platform as a Service.” iPaaS is a platform or suite that connects any combination of cloud-based or on-premise applications, processes, services, and/or systems within individual or across multiple organizations. It connects otherwise disjointed systems to deliver a unified solution.
Stands for the Internet Research Task Force. It is composed of a number of focused and long-term research groups that work on topics related to internet protocols, applications, architecture, and technology.
Short for Information Technology. It is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.
An enterprise job scheduling tool and workload automation solution. It is available as a GoAnywhere Cloud Connector.
A programming language that is commonly used in the development of client-server web applications.
An open source automation server that enables developers to build, test, and deploy their software. It is available as a GoAnywhere Cloud Connector.
A proprietary issue tracking product. It is available as a GoAnywhere Cloud Connector.
Short for Java Messaging Service. The JMS API is a Java message-oriented middleware API for sending messages between two or more clients.
Stands for the Java Naming and Directory Interface. It is a Java API that enables Java platform-based applications to access multiple naming and directory services.
Short for Knowledge-based Authentication. KBA is a security measure that identifies end users by asking them to answer specific security questions. It is used in order to verify a user’s identity and provide accurate authorization for online and digital activities.
A computer program that is the core of a computer's operating system. It has complete control over everything in the system.
Short for Lightweight Directory Access Protocol. It is an open, vendor-neutral, and lightweight industry standard client-server protocol for accessing directory services. LDAP runs over TCP/IP or other connection-oriented transfer services.
A family of open source Unix-like operating systems based on the Linux kernel.
Load balancing distributes workloads across multiple resources, such as computers, network links, and central processing units or disk drives.
A way to record standard "message traffic," as well as log message date and time, who sent them, and what was sent.
Stands for Macintosh Operating Systems. It is the primary operating systems for Apple Inc.’s Mac family of computers.
Managed File Transfer (MFT)
Also known as MFT, managed file transfer encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and encryption.
A community-developed, commercially supported fork of the MySQL relational database management system, intended to remain free and open-source software under the GNU General Public License.
A form of asynchronous service-to-service communication. It is a linked list of messages stored and held in the queue until the recipient retrieves them.
Lightweight applications that work to automate your file transfers and workflows on systems (both remote and on-premises) throughout your enterprise. The agents are managed in a way that allows you to configure and schedule agent file transfers and business processes from an intuitive, browser-based interface.
This stands for “Managed File Transfer as a Service.” MFTaaS is a hosted managed file transfer solution using the vendor’s infrastructure.
Short for Message Integrity Check. The MIC is a comparison of checksum values. A checksum is calculated when you send a message and your trading partner creates a checksum after they receive the message. The checksum is returned in the message receipt. If the values match, the message they received is the exact message you sent.
A cloud computing service for building, testing, deploying, and managing applications and services through Microsoft-based data centers.
A server hypervisor that enables consolidation of a single physical server into many virtual servers, all sharing the hardware resources of the host server and powered by Hyper-V.
Short for Multipurpose Internet Mail Extensions. It is an Internet standard that extends the format of email to support text in character sets other than ASCII and non-text attachments such as audio, video, images, application programs, and etc.
MIMEsweeper for SMTP is a content and trusted email security solution that will keep communications flowing freely throughout your company.
Stands for Message Oriented Middleware. It is a type of software product that enables message distribution over complex IT systems.
Multi-Factor Authentication (MFT)
An authentication method that requires two or more pieces of evidence to verify a user's identity for login purposes or other transactions.
An open-source relational database management system.
Stands for Network Address Translation. It allows a single device, such as a router, to act as an agent between the Internet (or "public network") and a local (or "private") network. This means that only a single, unique IP address is required to represent an entire group of computers.
Enables information by more than one person through more than one device at the same time or at different times.
Short for the National Institute of Standards and Technology. It is a physical sciences laboratory, and a non-regulatory agency of the United States Department of Commerce. The NIST promotes U.S. innovation and industrial competitiveness in the fields of technology, engineering, IT, and more.
NIST Special Publication (SP) 800-53
It provides a catalog of security and privacy controls for all U.S. federal information systems, except those related to national security.
Short for Open Application Group Integration Specification. OAGIS is a widely accepted standard that defines a standard way of passing data between businesses and business applications using an XML format.
Short for Optimal Character Recognition. OCR is the use of technology to distinguish handwritten text characters within digital images of physical documents, such as a scanned document.
Also known as GPG, is a popular encryption standard that protects the privacy and integrity of sensitive files.
A free PGP encryption tool that GoAnywhere offers. It makes it easy to protect your sensitive files while complying with the Open PGP standard.
Software with source code that anyone can inspect, modify, and enhance.
A standard that is publicly available and has various rights to use associated with it and may also have various properties of how it was designed.
The software that manages all of the computer’s processes and allows programs and applications to run.
Short for the Open Systems Interconnection Model. The OSI Model is a conceptual model that characterizes and standardizes the communication functions of a computing or telecommunication system without regard to its underlying internal structure and technology. It is made up of 7 layers: Physical, Data Link, Network, Transport, Session, Presentation, & Application.
Short for “Platform as a Service.” PaaS is a form of cloud computing in which a provider delivers hardware and software tools on its own infrastructure to users over the internet.
Short for the Payment Card Industry’s Data Security Standard. It was created by the Payment Card Industry Security Standards Council to increase controls over sensitive cardholder data and reduce fraud. It applies to any organization that processes credit or debit cards.
An open file transfer protocol which allows the writing and reading of files between one computer and another; using a connection established over a telecommunications link (specialized connection, public network, local area network).
Short for Pretty Good Privacy. PGP is an encryption program that provides cryptographic privacy and authentication for data communication.
Short for Protected Health Information. Under U.S. law, this is any information about health status, provision of health care, or payment for health care that is created or collected and can be associated with a specific individual.
Short for Personally Identifiable Information. Any information relating to identifying a person. Also known as Sensitive Personal Information (SPI).
Short for Public Key Infrastructure. It is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption
Text that is not computationally tagged, specially formatted, or written in code.
Stands for Post Office Protocol. It is a protocol for receiving email by downloading it to your computer from a mailbox on the server of an Internet service provider.
Also known as Postgres, PostgreSQL is a free and open-source relational database management system the emphasizes on extensibility and technical standards compliance. It is a fully managed database as a service offering that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability.
A private key is a small amount of code that is paired with a public key to set off algorithms for text encryption, along with decryption. It is created during asymmetric-key encryption and is then used to decrypt and transform a message to a readable format. A private key is also known as a secret key.
A server (computer system or application) that acts an intermediary for request from clients seeking resources from other servers. It intercepts all requests to the real server to see if it can fulfill the requests itself.
A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. Public and private keys are paired to enable secure communication.
A request for data or information from a database table or a combination of tables.
A sequence of work objects that are waiting to be processed.
Short for Representational State Transfer. It is an architectural style consisted of a coordinated set of architectural constraints applied to components, connectors, and data elements – all within a distributed hypermedia system.
Also referred to as a RESTful web service -- is based on representational state transfer technology, an architectural style and approach to communications often used in web services development.
A proxy configured to handle requests from a group of remote or arbitrary clients to a group of known resources under the control of the local Administrator.
Short for Request for Comments. It is a formal text document drafted by the technology community. An RFC document may come from many bodies including the IETF, IRTF, IAB, or from an independent author.
The IETF standards of Open PGP.
Stands for Return on Investment.
Short for “Sofware as a Service.” SaaS refers to a software distribution model in which software is licensed on a subscription basis and is centrally hosted. It is a form of cloud computing that gives users access to a software that runs on a shared resource online.
An American cloud-based software company. It is available as a GoAnywhere Cloud Connector.
SAN, short for Storage Area Network, is a kind of highly specialized high-speed computerized network designed specifically to transfer and transmit data in its rawest block-level form.
A schema is an outline, diagram, or model. In computing, schemas are often used to describe the structure of different types of data. Two common examples include database and XML schemas.
Stands for Secure Copy. SCP creates an encrypted tunnel using SSH between two computer systems and will protect against a variety of attacks.
Lists of commands executed by certain programs or scripting programs. Typically, they are text documents with instructions written using a scripting language. They’re often used to generate web pages and to automate computer processes.
A solution which captures emails in real time and freezes them in a tamper-evident environment.
This email security solution offers cyber-attack protection and outbound data loss prevention (DLP) for secure email collaboration.
The act of transferring sensitive data securely.
Secure File Transfer Automation
Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers.
The Secure Folders module in GoAnywhere provides access to authorized files and folders on the server through the Web Client. With Secure Folders, files can be transferred quickly between the desktop and server over HTTPS.
Stands for Secure File Transfer Protocol (SFTP). It is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream.
This is a way to safely share your critical information both internally and externally with Clearswift and HelpSystems’ first integrated A-DLP and Threat Prevention solution for MFT.
The Secure Mail module in GoAnywhere allows employees to send messages and files as secure "packages" on an ad-hoc basis.
A solution that keeps your network free of viruses, inappropriate content, and harmful executables. It also enables complete granular control over the information that is accessed or shared online.
Serverless computing is a method of providing backend services on an as-used basis. A serverless provider allows users to write and deploy code without the hassle of worrying about the underlying infrastructure. Servers are still used, but a company that gets backend services from a serverless vendor is charged based on usage, not a fixed amount of bandwidth or number of servers.
An American cloud computing company. It is available as a GoAnywhere Cloud Connector.
Short for SSH (Secure Shell) File Transfer Protocol. It is a network protocol organizations can use to secure and send file transfers over SSH.
A web-based collaborative platform that integrates with Microsoft Office. It is available as a GoAnywhere Cloud Connector.
Stands for Server Message Block. It is a network protocol used by Windows-based computers that allows systems within the same network to share files.
Short for Secure/Multipurpose Internet Mail Extensions. It is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.
Stands for Short Message Service. SMS is used to send text messages to mobile phones.
Short for Simple Mail Transfer Protocol. This is the protocol used for sending e-mail over the internet. It authenticates and directs the transfer of electronic mail.
Short for Simple Network Management Protocol. It is an internet standard protocol for collecting and organizing information about managed devices on IP networks. As well as for modifying that information to change device behavior.
Stands for Simple Object Access Protocol. It is a method of transferring messages, or small amounts of information, over the internet. SOAP messages are formatted in XML and are typically sent using HTTP.
An internet protocol that exchanges network packets between a client and server through a proxy server.
A MOM system that allows diverse applications to communicate through JMS messages in a distributed enterprise system.
Short for Sensitive Personal Information. Any information relating to identifying a person. Also known as Personally Identifiable Information (PII).
Stands for Structured Query Language. It is a domain-specific language used in programming and designed to communicate with a database.
A relational database management system developed by Microsoft.
Stands for Secure Shell. It is a cryptographic network protocol for operating network services securely over an unsecured network.
An access credential in the SSH protocol.
Short for Secure Sockets Layer. SSL is a network protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely.
Small data files that digitally bind a cryptographic key to an organization’s details.
This fully implements both the point-to-point, as well as the publish/subscribe message model of the latest Java Message Service (JMS) specification.
Algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.
Stands for Transmission Control Protocol. It is one of the main protocols of the internet protocol suite. It enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
TFTP, which stands for Trivial File Transfer Protocol, is based around FTP technology but uses a different approach to how files are transferred. It is a stripped-down transfer protocol that can only be used to send and receive files. TFTP is best used when encryption or advanced security isn’t required. User authentication and directory visibility are not possible either.
This refers to policies and tools that protect your corporate network.
Short for Transport Layer Security. It is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.
TLSC is a program that establishes a TLS or SSL client connection over an existing TCP connection, then spawns an application. It is meant to make network communications secure even for applications that do not natively support TLS/SSL.
Groups of files that have been defined by the ANSI X12 EDI standard. Each transaction set determines the type of data that will be sent between organizations and their trading partners.
A web-based list making application. It is available as a GoAnywhere Cloud Connector.
A feature in GoAnywhere MFT that can monitor for certain events, such as when a file is uploaded or downloaded by a trading partner.
Short for Uniform Control Standards. UCS is a substandard of X12.
Short for User Datagram Protocol. It is an alternative communications protocol to TCP, use primarily for establishing low-latency and loss-tolerating connections between applications on the internet.
A UID, or Unique Identifier, is a numeric or alphanumeric string that is associated with a single entity within a given system.
A proprietary operating system.
Short for Voluntary Industry Comment Standards. Standardization is the process of implementing or developing technical standards based on the conseus of different parties. These parties include firms, users, interest groups, standards organizations, and governments. Standardization helps to maintain and maximize compatability, interoperability, safety, repeatability, and quality.
A company that provides different software and applications for visualization. GoAnywhere has received the VMware Ready logo.
Short for Voluntary Open Consensus Standards. Standardization is the process of implementing or developing technical standards based on the conseus of different parties. These parties include firms, users, interest groups, standards organizations, and governments. Standardization helps to maintain and maximize compatability, interoperability, safety, repeatability, and quality.
Short for a Virtual Private Network. A VPN extends a private network across a public network. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network.
Weaponized Document Protection
This refers to the structural sanitization of documents to ensure complete removal of malicious code without delaying sharing and access. It prevents embedded, macro-malware and ransomware from entering your network due to phishing emails, drive-by downloads, or attacking uploads.
The client, or user, side of the Web. It typically refers to the Web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site.
A web server is an information technology that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web.
Short for Web Distributed Authoring and Versioning. It is an extension of HTTP that allows clients to perform remote web content authoring operations.
A widely used computer operating system developed by Microsoft.
A workflow contains a set of steps that execute a seamless end-to-end working process or "flow."
A digital certificate that uses the widely accepted international X.509 (PKI) standard to verify that a public key belongs to the user, computer or service identity contained within the certificate.
A form of EDI data that is supported by the ASC X12 standard. It is used by organizations worldwide to exchange sensitive data with other businesses.
XLS is a file extension for a spreadsheet file format created by Microsoft for use with Microsoft Excel.
Stands for Extensible Markup Language. It is like HTML as both are markup languages, but XML was designed to store and transport data.
A support ticketing system and customer service software. It is available as a GoAnywhere Cloud Connector.
A ZIP file can be created to package, compress and encrypt one or more files. ZIP files are very useful for reducing disk space, minimizing transmission times and for keeping related files organized together.
A software library used for data compression.