Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

SMS

Stands for Short Message Service. SMS is used to send text messages to mobile phones. 

SNMP

Short for Simple Network Management Protocol. It is an internet standard protocol for collecting and organizing information about managed devices on IP networks. As well as for modifying that information to change device behavior. 

SOAP

Stands for Simple Object Access Protocol. It is a method of transferring messages, or small amounts of information, over the internet. SOAP messages are formatted in XML and are typically sent using HTTP. 

SOCKS

 An internet protocol that exchanges network packets between a client and server through a proxy server. 

SonicMQ

A MOM system that allows diverse applications to communicate through JMS messages in a distributed enterprise system.

SPI

Short for Sensitive Personal Information. Any information relating to identifying a person. Also known as Personally Identifiable Information (PII). 

SQL

Stands for Structured Query Language. It is a domain-specific language used in programming and designed to communicate with a database. 

SQL Server

A relational database management system developed by Microsoft. 

SSH

Stands for Secure Shell. It is a cryptographic network protocol for operating network services securely over an unsecured network. 

SSH Keys

An access credential in the SSH protocol.

SSL

Short for Secure Sockets Layer. SSL is a network protocol designed for securing connections between web clients and web servers over an insecure network, such as the internet. SSL allows sensitive information such as credit card numbers, social security numbers, and login credentials to be transmitted securely. 

SSL Certificates

Small data files that digitally bind a cryptographic key to an organization’s details.  

SwiftMQ

This fully implements both the point-to-point, as well as the publish/subscribe message model of the latest Java Message Service (JMS) specification.

Symmetric-Key Algorithm

Algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. 

TCP

Stands for Transmission Control Protocol. It is one of the main protocols of the internet protocol suite. It enables two hosts to establish a connection and exchange streams of data. It guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent. 

TFTP

TFTP, which stands for Trivial File Transfer Protocol, is based around FTP technology but uses a different approach to how files are transferred. It is a stripped-down transfer protocol that can only be used to send and receive files. TFTP is best used when encryption or advanced security isn’t required. User authentication and directory visibility are not possible either.

Threat Prevention

This refers to policies and tools that protect your corporate network.

TLS

Short for Transport Layer Security. It is a cryptographic protocol that provides end-to-end communications security over networks and is widely used for internet communications and online transactions. 

TLSC

TLSC is a program that establishes a TLS or SSL client connection over an existing TCP connection, then spawns an application. It is meant to make network communications secure even for applications that do not natively support TLS/SSL.

Transaction Sets

Groups of files that have been defined by the ANSI X12 EDI standard. Each transaction set determines the type of data that will be sent between organizations and their trading partners.

Trello

A web-based list making application. It is available as a GoAnywhere Cloud Connector.  

Triggers

A feature in GoAnywhere MFT that can monitor for certain events, such as when a file is uploaded or downloaded by a trading partner.

UCS

Short for Uniform Control Standards. UCS is a substandard of X12.

UDP

Short for User Datagram Protocol. It is an alternative communications protocol to TCP, use primarily for establishing low-latency and loss-tolerating connections between applications on the internet. 

UID

A UID, or Unique Identifier, is a numeric or alphanumeric string that is associated with a single entity within a given system.

UNIX

A proprietary operating system. 

VICS

Short for Voluntary Industry Comment Standards. Standardization is the process of implementing or developing technical standards based on the conseus of different parties. These parties include firms, users, interest groups, standards organizations, and governments. Standardization helps to maintain and maximize compatability, interoperability, safety, repeatability, and quality.

VMWare

A company that provides different software and applications for visualization. GoAnywhere has received the VMware Ready logo.

VOCS

Short for Voluntary Open Consensus Standards. Standardization is the process of implementing or developing technical standards based on the conseus of different parties. These parties include firms, users, interest groups, standards organizations, and governments. Standardization helps to maintain and maximize compatability, interoperability, safety, repeatability, and quality.

VPN

Short for a Virtual Private Network. A VPN extends a private network across a public network. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to a private network. 

Weaponized Document Protection

This refers to the structural sanitization of documents to ensure complete removal of malicious code without delaying sharing and access. It prevents embedded, macro-malware and ransomware from entering your network due to phishing emails, drive-by downloads, or attacking uploads.

Web Client

The client, or user, side of the Web. It typically refers to the Web browser in the user’s machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site. 

Web Server

A web server is an information technology that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. 

WebDAV

Short for Web Distributed Authoring and Versioning. It is an extension of HTTP that allows clients to perform remote web content authoring operations. 

Windows

A widely used computer operating system developed by Microsoft.  

Workflow

A workflow contains a set of steps that execute a seamless end-to-end working process or flow.