Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

CCC

Short for Clear Command Channel. The CCC command makes a secured control/command channel revert back to plaintext (unsecured). It helps to solve data connection problems.

CDN

A CDN, or Content Delivery Network, refers to a geographically distributed group of servers which work together to provide fast delivery of internet content.

CDR

Stands for Content Disarm and Reconstruction. CDR is an advanced threat prevention technology that does not rely on detection. Instead, it assumes all files are malicious, so it sanitizes and rebuilds each file ensuring full usability and safe content.

Certificate Authority

An entity that issues digital certificates, the highest level of trust.

Checksum

A checksum is a sequence of numbers and letters used to check for errors that may have been introduced during transmission or storage. By themselves, checksums are often used to verify data integrity, but are not relied upon to verify data authenticity.

CICA

Short for Context Inspired Component Architecture. It is ASC X12’s message-design methodology, created to help resolve costly, differing, and often incompatible XML messages used for B2B (Business-to-Business) data exchange. 

CIFS

Stands for Common Internet File System. It is a dialect of SMB. 

Ciphertext

The result of encryption performed on plaintext using an algorithm, known as a cipher. 

Cloud Computing

This refers to applications and services offered over the internet. They are essentially data centers, collectively referred to as "the cloud." Cloud computing uses a network of remote servers hosted on the internet to store, manage, and process data, rather than a local server or a personal computer. Cloud Computing services falls into four categories: IaaS, FaaS, PaaS, and SaaS.

Cloud File Transfer

Transferring or syncing files securely from one cloud service directly to another. 

Cloud Intergrations

Cloud integrations, or cloud connectors, are built-in web and cloud application integrations that connect to your GoAnywhere MFT projects and workflows.

Clustering

Using two or more computer systems that work together. Typically, this refers to multiple servers that are linked together in order to handle varying workloads or to provide continued operation in case one fails.

Compliance

This indicates that a vendor successfully recognizes a particular standard and encompass most, if not all, of that key standard.

Compression

A way to improve transmission time by shrinking the size of messages.

Cryptocurrency

Cryptocurrency is a digital currency that can be used to buy goods and services. It uses an online ledger with strong cryptography to secure online transactions.

Cryptography

The science of protecting information by transforming it into a secure format.

Cryptojacking

Cryptojacking is an online threat with the main purpose of stealing or \"mining\" cryptocurrencies.

CSE

Short for the Canadian Communication Security Establishment. It is one of Canada’s key security and intelligence organizations. They are responsible for protecting Canadian government electronic information and communication networks, among other duties.

CSR

Short for Certificate Signing Requests. It is a block of encoded text that is given to a Certificate Authority when applying for an SSL Certificate.

CSV (file)

Stands for Comma-Separated Values. A CSV file is a delimited text file that uses a literal comma to separate files.