Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

A/B Testing

A technique for testing new software or new features whereby two or more versions are deployed to users for testing. The metrics from each variant are then compared and assessed based on the testing criteria.

A/B Testing

A technique for testing new software or new features whereby two or more versions are deployed to users for testing. The metrics from each variant are then compared and assessed based on the testing criteria.

Access Control

An integrated system that limits access to various services using common credential and authentication tools like passwords. For cloud platforms, the access control system is often integrated with existing authentication protocols, such as Active Directory.

Access Control

An integrated system that limits access to various services using common credential and authentication tools like passwords. For cloud platforms, the access control system is often integrated with existing authentication protocols, such as Active Directory.

ActiveMQ

A popular open source, multi-protocol Java-based messaging server.

ActiveMQ

A popular open source, multi-protocol Java-based messaging server.

AD

Stands for Active Directory. AD is Microsoft’s proprietary directory service. It is an umbrella title for a broad range of directory-based identity-related services.

AD

Stands for Active Directory. AD is Microsoft’s proprietary directory service. It is an umbrella title for a broad range of directory-based identity-related services.

Ad-Hoc File Transfer

A file transfer, or essentially sending a file to another person, generally on a "one-off" basis.

Ad-Hoc File Transfer

A file transfer, or essentially sending a file to another person, generally on a "one-off" basis.

Adaptive DLP

Adaptive Data Loss Prevention, or A-DLP, are solutions that automatically applies the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting.

Adaptive DLP

Adaptive Data Loss Prevention, or A-DLP, are solutions that automatically applies the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting.

Adaptive Redaction

Adaptive Redaction technology removes and prevents non-compliant information from being shared.

Advanced Reporting

GoAnywhere's module that allows you to gain access to important system information such as PDF documents.

Advanced Workflows

Advanced Workflows is GoAnywhere's module that handles Workflows (projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes).

AES

Short for Advanced Encryption Standard. It is a popular encryption standard that is approved by the NIST.

AIX

Stands for Advanced Interactive Executive. It is an operating system developed by IBM and is UNIX-based. It is typically used for enterprise servers and comes with a robust set of security features.

Amazon Aurora

A MySQL and PostgreSQL-compatible relational database built for the cloud. It combines the performance and availability of traditional databases along with the simplicity and cost-effectiveness of open source.

Amazon S3

Short for Amazon Simple Storage Service. It provides organizations with affordable and scalable cloud storage.

Amazon Web Services

Built in cloud connectors available from Amazon. They are available as GoAnywhere Cloud Connectors.

ANSI

Short for the American National Standards Institute. ANSI is a U.S.-based non-profit organization that works to develop and promote standards in the United States and globally. It helps ensure product integrity and safety. 

Anti-malware

Any security program, software, hardware, or combination of both, designed to monitor a system for malicious software. Malicious software can include viruses, worms, Trojan Horses, etc.

Anti-Steganography

Anti-Steganography combats external threats and data loss hidden in images.

Antivirus

A computer program used to prevent, detect, and remove malware.

API

Short for Application Programming Interface. An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system.

AS2

Short for Applicability Statement 2. AS2 is a standard used to securely send and receive files over the Internet. The messages are built using S/MIME format and can be compressed, signed, and encrypted.

AS3

Short for Applicability Statement 3. AS3 is a message standard used to securely transmit virtually any file type. It focuses on message formatting, is flexible, and the messages are structured using the standard S/MIME format. It is also a push-pull protocol and does not require an ongoing connection.

AS4

Short for Applicability Statement 4. AS4 is a popular file transfer protocl that gives businesses the ability to securely exchange data with their partners. It builds on the foundations set by AS2 to improve security, reliability, and flexibility for delivering and receiving messages.

ASC X12

Stands for the Accredited Standards Committee X12. It is a standards organization and develops and maintains the X12 EDI and CICA standards, along with XML schemas that drive business processes globally.

ASC X9

Stands for the Accredited Standards Committee X9. It is an ANSI accredited standards developing organization that is responsible for developing Voluntary Open Consensus Standards (VOCS) for the finance industry in the U.S.\r\n

Asymmetric-Key Algorithm

Asymmetric, or public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are a pair, but not identical. One key in the pair can be shared with everyone; the public key. The other key in the pair is kept secret; the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.

Audit trail

A record of a sequence of events (such as actions performed by a computer) from which a history may be reconstructed.

Automate Enterprise

A software that provides powerful tools to automate frontend and backend processes in your enterprise. It is available as GoAnywhere Cloud Connector.

Automated File Transfer

Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers.

AWS

Short for Amazon Web Services. It is a subsidiary platform of Amazon that provides cloud computing services. 

Azure Blob Storage

Provides organizations with affordable and scalable cloud storage provided by Microsoft.