Glossary
A/B Testing
A technique for testing new software or new features whereby two or more versions are deployed to users for testing. The metrics from each variant are then compared and assessed based on the testing criteria.
Access Control
An integrated system that limits access to various services using common credential and authentication tools like passwords. For cloud platforms, the access control system is often integrated with existing authentication protocols, such as Active Directory.
AD
Stands for Active Directory. AD is Microsoft’s proprietary directory service. It is an umbrella title for a broad range of directory-based identity-related services.
Ad-Hoc File Transfer
A file transfer, or essentially sending a file to another person, generally on a "one-off" basis.
Adaptive DLP
Adaptive Data Loss Prevention, or A-DLP, are solutions that automatically applies the optimal security treatment based on data’s content, context, and required regulation policies. This includes real-time redaction, encryption, blocking, or deleting.
Adaptive Redaction
Adaptive Redaction technology removes and prevents non-compliant information from being shared.
Advanced Reporting
GoAnywhere's module that allows you to gain access to important system information such as PDF documents.
Advanced Workflows
Advanced Workflows is GoAnywhere's module that handles Workflows (projects you can create in GoAnywhere MFT to define your file transfers and improve your business processes).
AES
Short for Advanced Encryption Standard. It is a popular encryption standard that is approved by the NIST.
AIX
Stands for Advanced Interactive Executive. It is an operating system developed by IBM and is UNIX-based. It is typically used for enterprise servers and comes with a robust set of security features.
Amazon Aurora
A MySQL and PostgreSQL-compatible relational database built for the cloud. It combines the performance and availability of traditional databases along with the simplicity and cost-effectiveness of open source.
Amazon S3
Short for Amazon Simple Storage Service. It provides organizations with affordable and scalable cloud storage.
Amazon Web Services
Built in cloud connectors available from Amazon. They are available as GoAnywhere Cloud Connectors.
ANSI
Short for the American National Standards Institute. ANSI is a U.S.-based non-profit organization that works to develop and promote standards in the United States and globally. It helps ensure product integrity and safety.
Anti-malware
Any security program, software, hardware, or combination of both, designed to monitor a system for malicious software. Malicious software can include viruses, worms, Trojan Horses, etc.
Anti-Steganography
Anti-Steganography combats external threats and data loss hidden in images.
Antivirus
A computer program used to prevent, detect, and remove malware.
API
Short for Application Programming Interface. An API is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system.
AS2
Short for Applicability Statement 2. AS2 is a standard used to securely send and receive files over the Internet. The messages are built using S/MIME format and can be compressed, signed, and encrypted.
AS3
Short for Applicability Statement 3. AS3 is a message standard used to securely transmit virtually any file type. It focuses on message formatting, is flexible, and the messages are structured using the standard S/MIME format. It is also a push-pull protocol and does not require an ongoing connection.
AS4
Short for Applicability Statement 4. AS4 is a popular file transfer protocl that gives businesses the ability to securely exchange data with their partners. It builds on the foundations set by AS2 to improve security, reliability, and flexibility for delivering and receiving messages.
ASC X12
Stands for the Accredited Standards Committee X12. It is a standards organization and develops and maintains the X12 EDI and CICA standards, along with XML schemas that drive business processes globally.
ASC X9
Stands for the Accredited Standards Committee X9. It is an ANSI accredited standards developing organization that is responsible for developing Voluntary Open Consensus Standards (VOCS) for the finance industry in the U.S.\r\n
Asymmetric-Key Algorithm
Asymmetric, or public key cryptography, uses public and private keys to encrypt and decrypt data. The keys are a pair, but not identical. One key in the pair can be shared with everyone; the public key. The other key in the pair is kept secret; the private key. Either of the keys can be used to encrypt a message; the opposite key from the one used to encrypt the message is used for decryption.
Audit trail
A record of a sequence of events (such as actions performed by a computer) from which a history may be reconstructed.
Automate Enterprise
A software that provides powerful tools to automate frontend and backend processes in your enterprise. It is available as GoAnywhere Cloud Connector.
Automated File Transfer
Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers.
AWS
Short for Amazon Web Services. It is a subsidiary platform of Amazon that provides cloud computing services.
Azure Blob Storage
Provides organizations with affordable and scalable cloud storage provided by Microsoft.
Azure SQL
An intelligent and scalable cloud databases service that provides the broadest SQL Server engine compatibility.
BaaS
BaaS, short for Backend-as-a-Service, allows developers to focus on the frontend of their applications and leverage backend services without building or maintaining them.
Backdoor
In the world of cybersecurity, a backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high level user access (aka root access) on a computer system, network, or software application. Once they're in, cybercriminals can use a backdoor to steal personal and financial data, install additional malware, and hijack devices. Backdoors are known for being discreet and attacks can often go undetected, resulting in them being used over and over again.
BAI
BAI, or BAI file format, is a file format for performing electronic cash management balance reporting. It was developed and previously maintained by the Bank Administration Institute (BAI). BAI does not separate out the incoming check line items by invoice subtotal reference.
BAI2
BAI2 is a banking EDI format. It is a specialized and standardized set of codes used for cash management by the Bank Administration Institute (BAI). BAI2 splits the check total into separate invoice references and assoicated payment amounts.
Bank Administration Institute (BAI)
The Bank Administration Institute is a non-profit organization in the US that provides training, research, and leadership events for the finance industry.
Pagination
- Page 1
- Next page