Image
Tech Terminology Can be Tough
We know that tech terms can be tricky, but the good news is that technology makes it easy to learn and read about them if you’re willing to do the research.
The GoAnywhere Glossary, our top-level managed file transfer (MFT) glossary, is a great resource for learning and reading about MFT’s most widely used terms and general tech jargon.
Check out some of the most popular terms below in our A-B-C of MFT cheat sheet.
A, C, D, & E
A
- Adaptive DLP – Adaptive Data Loss Prevention, or A-DLP, are solutions that automatically apply the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting.
- Advanced Workflows – Advanced Workflows is GoAnywhere's module that handles Workflows (automated projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes).
- AES – Short for Advanced Encryption Standard. It is a popular encryption standard that is approved by the NIST.
C
- Cloud Computing – This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.
- Cloud Connectors/ Cloud Integrations – Cloud connectors, or cloud integrations, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.
- Clustering – Clustering is the act of using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.
D
- Decryption – The process of taking encoded or encrypted text or other data and converting it back into a text that you or the computer can read and understand.
- DLP – Short for Data Loss Prevention. DLP is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by unauthorized users.
- DMZ – This term stands for the Demilitarized Zone. It is the neutral network that resides between your company’s private network and the Internet containing potential dangers.
E
- EDI – Short for Electronic Data Interchange. It is a flat file format that B2B trading partners use to send and receive business transactions. Both parties must agree on a transaction set before files are exchanged. Each transaction set corresponds with a number and type of document.
- EDIFACT – EDIFACT stands for the Electronic Data Interchange for Administration, Commerce and Transport. It is the international EDI standard developed by the United Nations.
- Encryption – The process of converting information or data into a code, particularly to prevent unauthorized or malicious access.
F, G, I, & J
F
- FTP – FTP, short for File Transfer Protocol, is a standard network protocols used for the transfer of computer files between a client and server on a computer network.
- FTPS – FTPS (FTP over SSL/Secure Sockets Layer) is a secure FTP protocol that allows you to protect and exchange files with trading partners, employees, and clients.
G
- GoAnywhere MFT – GoAnywhere MFT is a managed file transfer solution that automates and secure file transfers using a centralized enterprise-level approach.
I
- IaaS – Short for “Infrastructure as a Service.” IaaS is a form of cloud computing that provides virtual computing resources such as storage, networking, and other capabilities over the internet.
J
- JSON – This term stands for JavaScript Object Notation. It is a text-based, human-readable data interchange format used for representing simple data structures and objects in Web browser-based code.
L, M, N, & O
L
- Load Balancing – Load balancing distributes workloads across multiple resources, such as computers, network links, and central processing units or disk drives.
M
- Managed File Transfer (MFT) – Also known as MFT, managed file transfer encompasses all aspects of inbound and outbound file transfers while using industry-standard network protocols and encryption.
- MFT Agents – MFT Agents are lightweight applications that work to automate your file transfers and workflows on systems (both remote and on-premises) throughout your enterprise. The agents are managed in a way that allows you to configure and schedule agent file transfers and business processes from an intuitive, browser-based interface.
- MFTaaS – This stands for “Managed File Transfer as a Service.” MFTaaS is a hosted managed file transfer solution using the vendor’s infrastructure.
N
- NIST – Short for the National Institute of Standards and Technology. It is a physical sciences laboratory, and a non-regulatory agency of the United States Department of Commerce. The NIST promotes U.S. innovation and industrial competitiveness in the fields of technology, engineering, IT, and more.
O
- Open PGP – Also known as GPG, Open PGP is a popular encryption standard that protects the privacy and integrity of sensitive files.
- Open PGP Studio – This is a free encryption tool that GoAnywhere MFT offers. It makes it easy to protect your sensitive files while complying with the Open PGP standard.
P, R, S, & T
P
- PaaS – Short for “Platform as a Service.” PaaS is a form of cloud computing in which a provider delivers hardware and software tools on its own infrastructure to users over the internet.
- PGP – This stands for Pretty Good Privacy. PGP is an encryption program that provides cryptographic privacy and authentication for data communication.
R
- REST– Short for Representational State Transfer. It is an architectural style consisted of a coordinated set of architectural constraints applied to components, connectors, and data elements – all within a distributed hypermedia system.
S
- SaaS – Short for “Sofware as a Service.” SaaS refers to a software distribution model in which software is licensed on a subscription basis and is centrally hosted. It is a form of cloud computing that gives users access to a software that runs on a shared resource online.
- Secure FTP – Secure FTP stands for Secure File Transfer Protocol (SFTP). It is a secure version of FTP, which facilitates data access and data transfer over a Secure Shell (SSH) data stream.
- SFTP – Short for SSH (Secure Shell) File Transfer Protocol. It is a network protocol that organizations can use to secure and send file transfers over SSH.
- SSH – SSH, which stands for Secure Shell, is a cryptographic network protocol for operating network services securely over an unsecured network.
- SSL – Short for Secure Sockets Layer. SSL is a network protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely.
T
- TLS – Short for Transport Layer Security. It is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions.
- TFTP – TFTP, which stands for Trivial File Transfer Protocol, is based around FTP technology but uses a different approach to how files are transferred. It is a stripped-down transfer protocol that can only be used to send and receive files. TFTP is best used when encryption or advanced security isn’t required. User authentication and directory visibility are not possible either.
- Triggers – A feature in GoAnywhere MFT that can monitor for certain events, such as when a file is uploaded or downloaded by a trading partner.
V, W, X, & Z
V
- VPN – Short for a Virtual Private Network. A VPN extends a private network across a public network. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network.
W
- Weaponized Document Protection – This refers to the structural sanitization of documents to ensure complete removal of malicious code without delaying sharing and access. It prevents embedded, macro-malware and ransomware from entering your network due to phishing emails, drive-by downloads, or attacking uploads.
- Web Client – The client, or user, side of the Web. It typically refers to the Web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site.
- Workflow – A workflow contains a set of steps that execute a seamless end-to-end working process or "flow."
X
- X12 – A form of EDI data that is supported by the ASC X12 standard. It is used by organizations worldwide to exchange sensitive data with other businesses.
Z
- ZIP – A ZIP file can be created to package, compress and encrypt one or more files. ZIP files are very useful for reducing disk space, minimizing transmission times and for keeping related files organized together.