Glossary

Welcome to the Glossary! Whether you're already familiar with some of these terms or you're just becoming acquainted, our top-level glossary is a great resource for learning all of the relevant goods. Scroll through the full list below, search by term, or select by individual letter.
SHOW ALL A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

PostgreSQL

Also known as Postgres, PostgreSQL is a free and open-source relational database management system the emphasizes on extensibility and technical standards compliance. It is a fully managed database as a service offering that can handle mission-critical workloads with predictable performance, security, high availability, and dynamic scalability. 

Private Key

A private key is a small amount of code that is paired with a public key to set off algorithms for text encryption, along with decryption. It is created during asymmetric-key encryption and is then used to decrypt and transform a message to a readable format. A private key is also known as a secret key.

Proxy Server

A server (computer system or application) that acts an intermediary for request from clients seeking resources from other servers. It intercepts all requests to the real server to see if it can fulfill the requests itself.   

Public Key

A public key is created in public key encryption cryptography that uses asymmetric-key encryption algorithms. Public keys are used to convert a message into an unreadable format. Decryption is carried out using a different, but matching, private key. Public and private keys are paired to enable secure communication.

Query

A request for data or information from a database table or a combination of tables.  

Queue

A sequence of work objects that are waiting to be processed.

Remote Workforce

A remote workforce is a mode of work that allows employees of an organization to perform their essential job responsibilities via a remote location, or outside of their traditional office space. It is becoming an increasingly popular concept among organizations and is being implemented at an increasing rate across the world. \r\n

REST

Short for Representational State Transfer. It is an architectural style consisted of a coordinated set of architectural constraints applied to components, connectors, and data elements – all within a distributed hypermedia system. 

RESTful

Also referred to as a RESTful web service -- is based on representational state transfer technology, an architectural style and approach to communications often used in web services development.

Reverse Proxy

A proxy configured to handle requests from a group of remote or arbitrary clients to a group of known resources under the control of the local Administrator.

RFC

Short for Request for Comments. It is a formal text document drafted by the technology community. An RFC document may come from many bodies including the IETF, IRTF, IAB, or from an independent author.

RFC 4880

The IETF standards of Open PGP.

ROI

Stands for Return on Investment. 

S/MIME

Short for Secure/Multipurpose Internet Mail Extensions. It is a widely accepted method (or more precisely, a protocol) for sending digitally signed and encrypted messages. S/MIME allows you to encrypt emails and digitally sign them.

SaaS

Short for “Sofware as a Service.” SaaS refers to a software distribution model in which software is licensed on a subscription basis and is centrally hosted. It is a form of cloud computing that gives users access to a software that runs on a shared resource online

Salesforce

An American cloud-based software company. It is available as a GoAnywhere Cloud Connector.

SAN

SAN, short for Storage Area Network, is a kind of highly specialized high-speed computerized network designed specifically to transfer and transmit data in its rawest block-level form.

Schema

A schema is an outline, diagram, or model. In computing, schemas are often used to describe the structure of different types of data. Two common examples include database and XML schemas. 

SCP

Stands for Secure Copy. SCP creates an encrypted tunnel using SSH between two computer systems and will protect against a variety of attacks.

Scripts

Lists of commands executed by certain programs or scripting programs. Typically, they are text documents with instructions written using a scripting language. They’re often used to generate web pages and to automate computer processes. 

Secure Archiving

A solution which captures emails in real time and freezes them in a tamper-evident environment.

SECURE Email Gateway

This email security solution offers cyber-attack protection and outbound data loss prevention (DLP) for secure email collaboration.

Secure File Transfer

The act of transferring sensitive data securely. 

Secure File Transfer Automation

Automatic file transfer allows users to program when files should move between internal systems, users, or trading partners. It is often used to manage reoccurring or high-volume file transfers. 

Secure Folders

The Secure Folders module in GoAnywhere provides access to authorized files and folders on the server through the Web Client. With Secure Folders, files can be transferred quickly between the desktop and server over HTTPS.

Secure Forms

The Secure Forms module in GoAnywhere allows your end-users to fill out and submit information online through secure custom-made forms with one or more input values.

Secure FTP

Stands for Secure File Transfer Protocol (SFTP). It is a secure version of File Transfer Protocol (FTP), which facilitates data access and data transfer over a Secure Shell (SSH) data stream.

SECURE ICAP Gateway

This is a way to safely share your critical information both internally and externally with Clearswift and Fortra's first integrated A-DLP and Threat Prevention solution for MFT.

Secure Mail

The Secure Mail module in GoAnywhere allows employees to send messages and files as secure "packages" on an ad-hoc basis.  

SECURE Web Gateway

A solution that keeps your network free of viruses, inappropriate content, and harmful executables. It also enables complete granular control over the information that is accessed or shared online.

Serverless

Serverless computing is a method of providing backend services on an as-used basis. A serverless provider allows users to write and deploy code without the hassle of worrying about the underlying infrastructure. Servers are still used, but a company that gets backend services from a serverless vendor is charged based on usage, not a fixed amount of bandwidth or number of servers.

ServiceNow

An American cloud computing company. It is available as a GoAnywhere Cloud Connector. 

SFTP

Short for SSH (Secure Shell) File Transfer Protocol. It is a network protocol organizations can use to secure and send file transfers over SSH. 

SharePoint

A web-based collaborative platform that integrates with Microsoft Office. It is available as a GoAnywhere Cloud Connector.

SMB

Stands for Server Message Block. It is a network protocol used by Windows-based computers that allows systems within the same network to share files. 

SMPT

Short for Simple Mail Transfer Protocol. This is the protocol used for sending e-mail over the internet. It authenticates and directs the transfer of electronic mail.