GoAnywhere Glossary

Welcome to the GoAnywhere Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level MFT glossary is a great resource for learning all of the relevant GoAnywhere goods. Scroll through the full list below, search by term, or select by individual letter.

Show All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

ActiveMQ

A popular open source, multi-protocol Java-based messaging server.

Ad-Hoc File Transfer

A file transfer, or essentially sending a file to another person, generally on a "one-off" basis.

Advanced Reporting

GoAnywhere’s module that allows you to gain access to important system information such as PDF documents.

Advanced Workflows

GoAnywhere’s module that handles Workflows.

AES

Short for Advanced Encryption Standard. It is a popular encryption standard that is approved by the NIST.

AIX

Stands for Advanced Interactive Executive. It is an operating system developed by IBM and is UNIX-based. It is typically used for enterprise servers and comes with a robust set of security features.

Amazon S3

Short for Amazon Simple Storage Service. It provides organizations with affordable and scalable cloud storage.

Amazon Web Services

Built in cloud connectors available from Amazon. They are available as GoAnywhere Cloud Connectors.

ANSI

Short for the American National Standards Institute. ANSI is a U.S.-based non-profit organization that works to develop and promote standards in the United States and globally. It helps ensure product integrity and safety. 

Antivirus

A computer program used to prevent, detect, and remove malware.

API

Short for Application Programming Interface. An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system.

AS2

Short for Applicability Statement 2. AS2 is a standard used to securely send and receive files over the Internet. The messages are built using S/MIME format and can be compressed, signed, and encrypted.

ASC X12

Stands for the Accredited Standards Committee X12. It is a standards organization and develops and maintains the X12 EDI and CICA standards, along with XML schemas that drive business processes globally.

Asymmetric-Key Algorithm

Asymmetric, or public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are a pair, but not identical. One key in the pair can be shared with everyone; the public key. The other key in the pair is kept secret; the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.

Audit Trail

A record of a sequence of events (such as actions performed by a computer) from which a history may be reconstructed.

Automate Enterprise

A software that provides powerful tools to automate frontend and backend processes in your enterprise. It is available as GoAnywhere Cloud Connector.

Automated File Transfer

Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers.

AWS

Short for Amazon Web Services. It is a subsidiary platform of Amazon that provides cloud computing services. 

Azure Blob Storage

Provides organizations with affordable and scalable cloud storage provided by Microsoft.

Batch File

A type of script that contains a list of commands. These commands are executed in sequence and can be used to automate processes.

Box

A cloud content management and file sharing service for businesses. It is available as a GoAnywhere Cloud Connector. 

CCC

Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.

Certificate Authority

An entity that issues digital certificates, the highest level of trust.

CICA

Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange. 

CIFS

Stands for Common Internet File System. It is a dialect of SMB. 

Ciphertext

The result of encryption performed on plaintext using an algorithm, known as a cipher. 

Cloud Computing

This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer.  

Cloud Connectors

A built-in web and cloud application offered by GoAnywhere. Cloud connectors, or cloud integrations, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.

Cloud File Transfer

Transferring or syncing files securely from one cloud service directly to another. 

Cloud Integrations

Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.

Clustering

Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.

Compliance

This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of the standard.

Compression

A way to improve transmission time by shrinking the size of messages.

Cryptography

The science of protecting information by transforming it into a secure format.

CSE

Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.

CSR

Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.

CSV (file)

Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files. 

Data Key

A key which holds a variable value. It can be applied to a string or a text block in order for it to be encrypted or decrypted. 

DB2

A family of database management system products from IBM that serve a number of different operating system platforms.

DBMS

Stands for Database Management System. It is a collection of programs that enables you to store, modify, and extract information from a database.

Decryption

The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.

Derby

A relational database management system developed by the Apache Software Foundation that can be embedded in Java programs and used for online transaction processing.

Digital Signatures

A way to ensure authenticity by signing incoming messages. Signed messages provide trading partners with confirmation of who sent the message.

DLP

Short for Data Loss Prevention. DLP is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.  

DMZ

Stands for Demilitarized Zone. It is the neutral network that resides between your company’s private network and the Internet, containing asteroids, aliens, and other dangers.

Docker

A set of platform-as-a-service products that use operating-system-level virtualization to deliver software in packages called containers.

Dropbox

A file hosting service that offers cloud storage, file synchronization, personal cloud, and client software. It is available as a GoAnywhere Cloud Connector.

Drummond Certified

Indicates that the AS2 implementation in a certain software package has been tested and approved by the Drummond Group. Drummond certification provides a high degree of security assurance and offers compatibility with other applications that send AS2 file transfers.

Dynamics 365

A product line of enterprise resource planning and customer relationship management applications created by Microsoft. It is available as a GoAnywhere Cloud Connector.

EDI

Short for Electronic Data Interchange. It is a flat file format that B2B trading partners use to send and receive business transactions. Both parties must agree on a transaction set before files are exchanged. Each transaction set corresponds with a number and type of document.

EDIFACT

Stands for the Electronic Data Interchange for Administration, Commerce and Transport. It is the international EDI standard developed by the United Nations.

EFSS

Short for Enterprise File Sync and Sharing. It is a secure document storage solution that allows IT administrators to maintain local control of file security and user access.

Encryption

The process of converting information or data into a code, particularly to prevent unauthorized or malicious access.

FIPS 140-2 Compliance

Stands for the Federal Information Processing Standard. The 140 series of FIPS are U.S. government computer security standards that specify requirements for cryptography modules. The FIPS 140-2 is the current version.

FISMA

Short for the Federal Information Security Management Act. It established a set of security guidelines that help to reduce the security risk to federal data.

Fixed-Width (file)

A file that has a specific format which allows for the saving of textual information/data in an organized fashion.  

Forward Proxy

A proxy configured to handle requests for a group of clients under the local Administrators control to an unknown or arbitrary group of resources that are outside of their control.

FTP Client

Available in the free edition of GoAnywhere MFT. It allows you to set up and automate FTP transfers through an intuitive browser-based interface.

FTP Server

Short for File Transfer Protocol. FTP is a kind of legacy technology used to transmit sensitive files. The technology is frequently used and can serve many purposes.

FTPS Server

FTPS is FTP over SSL (Secure Shell) protocol.

GDPR

Short for the General Data Protection Regulation. It was designed to protect the personal data of EU (European Union)-based individuals, while harmonizing data privacy laws throughout the EU.

GLBA

Stands for the Gramm-Leach-Bliley Act. It is a federal law enacted in the U.S. to control the ways that financial institutions deal with the private information of individuals.

GnuPG

Stands for GNU Privacy Guard. It is a free software replacement for Symantec’s PGP cryptographic software suite, compliant with RFC 4880. Also known as GPG.

GoAnywhere Gateway

An enhanced reverse and forward proxy that gives organizations an additional layer of security for exchanging data with trading partners.

GoAnywhere MFT

A managed file transfer solution that automates and secures file transfers using a centralized enterprise-level approach.

GoDrive

A cloud-based file sharing alternative available from GoAnywhere. It provides Enterprise File Sync and Sharing (EFSS) services for your employees and partners.

GoFast

A file transfer acceleration protocol in GoAnywhere MFT that can transmit data considerably faster than traditional FTP. 

Google Drive

A file storage and synchronization service developed by Google. It is available as a GoAnywhere Cloud Connector. 

GPG

Stands for GNU Privacy Guard. It is a free software replacement for Symantec’s PGP cryptographic software suite, compliant with RFC 4880. Also known as GnuPG. 

GZIP

A file format and a software application used for file compression and decompression using the GZIP standard. 

HIPAA

Short for the Health Insurance Portability and Accountability Act. It sets the standard for protecting sensitive data and applies to any company that details with protected health information (PHI). 

HITECH

Short for the Health Information Technology for Economic and Clinical Health Act. It was created to motivate the implementation of electronic health records and support technology in the United States.

HTML

Stands for Hypertext Markup Language. It is a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effect on World Wide Web pages. 

HTTP

Short for Hypertext Transfer Protocol. HTTP is the data transfer protocol used on the World Wide Web. 

HTTP Proxy

An HTTP proxy that serves two intermediary roles: an HTTP Client and an HTTP Server. It is for security, management, and caching functionality.

HTTPS

Short for Hypertext Transfer Protocol Secure. It is an extension of Hypertext Transfer Protocol (HTTP) and is used for secure communication over a computer network. It is widely used on the internet.

IBM i

An operating system that runs on the IBM Power Systems and IBM PureSystems.  

IBM MQ

This is an IBM standard and MOM product for messaging. It uses messages and queues to support the exchange of information between applications, systems, services, and files. It was previously known as Websphere MQ. 

ICAP

Short for the Internet Content Adaption Protocol. It is a lightweight protocol that provides simple object-based content vectoring for HTTP services.

IETF

Stands for the Internet Engineering Task Force. It is an open standards organization that develops and promotes voluntary internet standards, in particular the standards that comprise the internet protocol suite. 

IMAP

Stands for the Internet Message Access Protocol. It is an internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail server over a TCP/IP connection.  

Informix

A product family within IBM’s Information Management division. It is a fast and flexible database with the ability to seamlessly integrate SQL, NoSQL/JSON, plus time series and spatial data.

IP

Short for Internet Protocol. IP is the principal communications protocol in the internet for relaying datagrams across network boundaries. Its routing function enables internetworking, and essentially establishes the internet.

IT

Short for Information Technology. It is the application of computers to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise.

JAMS

An enterprise job scheduling tool and workload automation solution. It is available as a GoAnywhere Cloud Connector.  

Java

A programming language that is commonly used in the development of client-server web applications. 

Jenkins

An open source automation server that enables developers to build, test, and deploy their software. It is available as a GoAnywhere Cloud Connector.

JIRA

A proprietary issue tracking product. It is available as a GoAnywhere Cloud Connector. 

JMS Standard

Short for Java Messaging Service. The JMS API is a Java message-oriented middleware API for sending messages between two or more clients. 

JNDI

Stands for the Java Naming and Directory Interface. It is a Java API that enables Java platform-based applications to access multiple naming and directory services.

JSON

Short for Javascript Object Notation. It is a text-based, human-readable data interchange format used for representing simple data structures and objects in Web browser-based code.

KBA

Short for Knowledge-based Authentication. KBA is a security measure that identifies end users by asking them to answer specific security questions. It is used in order to verify a user’s identity and provide accurate authorization for online and digital activities. 

Kernel

A computer program that is the core of a computer's operating system. It has complete control over everything in the system.  

Linux

A family of open source Unix-like operating systems based on the Linux kernel.  

Load Balancing

Load balancing distributes workloads across multiple resources, such as computers, network links, and central processing units or disk drives.

Logging

A way to record standard "message traffic," as well as log message date and time, who sent them, and what was sent. 

Mac OS (macOS)

Stands for Macintosh Operating Systems. It is the primary operating systems for Apple Inc.’s Mac family of computers.

Managed File Transfer (MFT)

Also known as MFT, managed file transfer encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and encryption. 

MariaDB

A community-developed, commercially supported fork of the MySQL relational database management system, intended to remain free and open-source software under the GNU General Public License.

Message Queue (MQ)

A form of asynchronous service-to-service communication. It is a linked list of messages stored and held in the queue until the recipient retrieves them.

MFT Agents

Lightweight applications that work to automate your file transfers and workflows on systems (both remote and on-premises) throughout your enterprise. The agents are managed in a way that allows you to configure and schedule agent file transfers and business processes from an intuitive, browser-based interface.

MIC

Short for Message Integrity Check. The MIC is a comparison of checksum values. A checksum is calculated when you send a message and your trading partner creates a checksum after they receive the message. The checksum is returned in the message receipt. If the values match, the message they received is the exact message you sent.

Microsoft Azure

A cloud computing service for building, testing, deploying, and managing applications and services through Microsoft-based data centers.

Microsoft Hyper-V

A server hypervisor that enables consolidation of a single physical server into many virtual servers, all sharing the hardware resources of the host server and powered by Hyper-V.

MIME

Short for Multipurpose Internet Mail Extensions. It is an Internet standard that extends the format of email to support text in character sets other than ASCII and non-text attachments such as audio, video, images, application programs, and etc.

MOM

Stands for Message Oriented Middleware. It is a type of software product that enables message distribution over complex IT systems.  

Multi-Factor Authentication (MFT)

An authentication method that requires two or more pieces of evidence to verify a user's identity for login purposes or other transactions.

MySQL

An open-source relational database management system.

NAT

Stands for Network Address Translation. It allows a single device, such as a router, to act as an agent between the Internet (or "public network") and a local (or "private") network. This means that only a single, unique IP address is required to represent an entire group of computers.

Network Sharing

Enables information by more than one person through more than one device at the same time or at different times. 

NIST

Short for the National Institute of Standards and Technology. It is a physical sciences laboratory, and a non-regulatory agency of the United States Department of Commerce. The NIST promotes U.S. innovation and industrial competitiveness in the fields of technology, engineering, IT, and more. 

NIST Special Publication (SP) 800-53

It provides a catalog of security and privacy controls for all U.S. federal information systems, except those related to national security.

Open PGP

Also known as GPG, is a popular encryption standard that protects the privacy and integrity of sensitive files.

Open PGP Studio

A free PGP encryption tool that GoAnywhere offers. It makes it easy to protect your sensitive files while complying with the Open PGP standard. 

Open Source

Software with source code that anyone can inspect, modify, and enhance.

Open Standard

A standard that is publicly available and has various rights to use associated with it and may also have various properties of how it was designed.  

Operating System (OS)

The software that manages all of the computer’s processes and allows programs and applications to run. 

PCI DSS

Short for the Payment Card Industry’s Data Security Standard. It was created by the Payment Card Industry Security Standards Council to increase controls over sensitive cardholder data and reduce fraud. It applies to any organization that processes credit or debit cards.

PeSIT

An open file transfer protocol which allows the writing and reading of files between one computer and another; using a connection established over a telecommunications link (specialized connection, public network, local area network).

PGP

Short for Pretty Good Privacy. PGP is an encryption program that provides cryptographic privacy and authentication for data communication. 

PHI

Short for Protected Health Information. Under U.S. law, this is any information about health status, provision of health care, or payment for health care that is created or collected and can be associated with a specific individual. 

PII

Short for Personally Identifiable Information. Any information relating to identifying a person. Also known as Sensitive Personal Information (SPI).

PKI

Short for Public Key Infrastructure. It is a set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates and manage public-key encryption

Plaintext

Text that is not computationally tagged, specially formatted, or written in code. 

POP3

Stands for Post Office Protocol. It is a protocol for receiving email by downloading it to your computer from a mailbox on the server of an Internet service provider.

PostgreSQL

Also known as Postgres, PostgreSQL is a free and open-source relational database management system the emphasizes on extensibility and technical standards compliance. It is a fully managed database as a service offering that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability. 

Private Key

A private key is a small amount of code that is paired with a public key to set off algorithms for text encryption, along with decryption. It is created during asymmetric-key encryption and is then used to decrypt and transform a message to a readable format. A private key is also known as a secret key.

Proxy Server

A server (computer system or application) that acts an intermediary for request from clients seeking resources from other servers. It intercepts all requests to the real server to see if it can fulfill the requests itself.   

Public Key

A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. Public and private keys are paired to enable secure communication.

Query

A request for data or information from a database table or a combination of tables.  

Queue

A sequence of work objects that are waiting to be processed.

REST

Short for Representational State Transfer. It is an architectural style consisted of a coordinated set of architectural constraints applied to components, connectors, and data elements – all within a distributed hypermedia system. 

RESTful

Also referred to as a RESTful web service -- is based on representational state transfer technology, an architectural style and approach to communications often used in web services development.

Reverse Proxy

A proxy configured to handle requests from a group of remote or arbitrary clients to a group of known resources under the control of the local Administrator.

RFC

Short for Request for Commands. It is a formal document drafted by the IETF that describes the specifications for a particular technology. 

RFC 4880

The IETF standards of Open PGP.

ROI

Stands for Return on Investment. 

Salesforce

An American cloud-based software company. It is available as a GoAnywhere Cloud Connector.

Schema

A schema is an outline, diagram, or model. In computing, schemas are often used to describe the structure of different types of data. Two common examples include database and XML schemas. 

SCP

Stands for Secure Copy. SCP creates an encrypted tunnel using SSH between two computer systems and will protect against a variety of attacks.

Scripts

Lists of commands executed by certain programs or scripting programs. Typically, they are text documents with instructions written using a scripting language. They’re often used to generate web pages and to automate computer processes. 

Secure File Transfer

The act of transferring sensitive data securely. 

Secure File Transfer Automation

Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers. 

Secure Folders

The Secure Folders module in GoAnywhere provides access to authorized files and folders on the server through the Web Client. With Secure Folders, files can be transferred quickly between the desktop and server over HTTPS.

Secure FTP

Stands for Secure File Transfer Protocol (SFTP). It is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream. It is part of the SSH Protocol. 

Secure Mail

The Secure Mail module in GoAnywhere allows employees to send messages and files as secure "packages" on an ad-hoc basis.  

ServiceNow

An American cloud computing company. It is available as a GoAnywhere Cloud Connector. 

SFTP

Short for SSH (Secure Shell) File Transfer Protocol. It is a network protocol organizations can use to secure and send file transfers over SSH. 

SharePoint

A web-based collaborative platform that integrates with Microsoft Office. It is available as a GoAnywhere Cloud Connector.

SMB

Stands for Server Message Block. It is a network protocol used by Windows-based computers that allows systems within the same network to share files. 

S/MIME

Short for Secure/Multipurpose Internet Mail Extensions. It is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.

SMS

Stands for Short Message Service. SMS is used to send text messages to mobile phones. 

SMTP

Short for Simple Mail Transfer Protocol. This is the protocol used for sending e-mail over the internet. It authenticates and directs the transfer of electronic mail.  

SNMP

Short for Simple Network Management Protocol. It is an internet standard protocol for collecting and organizing information about managed devices on IP networks. As well as for modifying that information to change device behavior. 

SOAP

Stands for Simple Object Access Protocol. It is a method of transferring messages, or small amounts of information, over the internet. SOAP messages are formatted in XML and are typically sent using HTTP. 

SOCKS

 An internet protocol that exchanges network packets between a client and server through a proxy server. 

SonicMQ

A MOM system that allows diverse applications to communicate through JMS messages in a distributed enterprise system.

SPI

Short for Sensitive Personal Information. Any information relating to identifying a person. Also known as Personally Identifiable Information (PII). 

SQL

Stands for Structured Query Language. It is a domain-specific language used in programming and designed to communicate with a database. 

SQL Server

A relational database management system developed by Microsoft. 

SSH

Stands for Secure Shell. It is a cryptographic network protocol for operating network services securely over an unsecured network. 

SSH Keys

An access credential in the SSH protocol.

SSL

Short for Secure Sockets Layer. SSL is a network protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. 

SSL Certificates

Small data files that digitally bind a cryptographic key to an organization’s details.  

SwiftMQ

This fully implements both the point-to-point, as well as the publish/subscribe message model of the latest Java Message Service (JMS) specification.

Symmetric-Key Algorithm

Algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. 

TCP

Stands for Transmission Control Protocol. It is one of the main protocols of the internet protocol suite. It enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. 

TLS

Short for Transport Layer Security. It is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. 

Transaction Sets

Groups of files that have been defined by the ANSI X12 EDI standard. Each transaction set determines the type of data that will be sent between organizations and their trading partners.

Trello

A web-based list making application. It is available as a GoAnywhere Cloud Connector.  

Triggers

A feature in GoAnywhere MFT that can monitor for certain events, such as when a file is uploaded or downloaded by a trading partner.

UDP

Short for User Datagram Protocol. It is an alternative communications protocol to TCP, use primarily for establishing low-latency and loss-tolerating connections between applications on the internet. 

UNIX

A proprietary operating system. 

VMWare

A company that provides different software and applications for visualization. GoAnywhere has received the VMware Ready logo.

VPN

Short for a Virtual Private Network. A VPN extends a private network across a public network. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network. 

Web Client

The client, or user, side of the Web. It typically refers to the Web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site. 

Web Server

A web server is an information technology that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. 

WebDAV

Short for Web Distributed Authoring and Versioning. It is an extension of HTTP that allows clients to perform remote web content authoring operations. 

Windows

A widely used computer operating system developed by Microsoft.  

Workflow

A workflow contains a set of steps that execute a seamless end-to-end working process or "flow." 

X.509 Certificate

A digital certificate that uses the widely accepted international X.509 (PKI) standard to verify that a public key belongs to the user, computer or service identity contained within the certificate. 

X12

A form of EDI data that is supported by the ASC X12 standard. It is used by organizations worldwide to exchange sensitive data with other businesses. 

XLS

XLS is a file extension for a spreadsheet file format created by Microsoft for use with Microsoft Excel. 

XML

Stands for Extensible Markup Language. It is like HTML as both are markup languages, but XML was designed to store and transport data. 

Zendesk

A support ticketing system and customer service software. It is available as a GoAnywhere Cloud Connector. 

ZIP

A ZIP file can be created to package, compress and encrypt one or more files. ZIP files are very useful for reducing disk space, minimizing transmission times and for keeping related files organized together.

ZLIB

A software library used for data compression.