• Support
    • Help Desk
    • Documentation
    • Customer Downloads
  • Company
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
JSCAPE by Redwood
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Resources
    • All Resources
    • Blog
    • Glossary
  • Pricing
Get a demo
Glossary

Managed file transfer glossary

Understand key concepts, protocols, and features for secure enterprise file sharing.

  • @
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Integration platform as a service (iPaaS)

    iPaaS is a cloud service that links applications and data sources through connectors and workflows. It supports integration across both cloud and on-premises systems.

  • Internal controls

    Internal controls are policies and safeguards used to protect data and ensure proper operations. They help prevent misuse and support regulatory compliance.

  • Internal file transfer

    Internal file transfer moves data within an organization’s network or trusted systems. It enables secure communication without exposing files externally.

  • ISO 27001

    ISO 27001 is an international standard for managing information security. It outlines requirements for protecting data through structured processes and controls.

  • Load balancing

    Load balancing distributes traffic across multiple systems to improve performance. It prevents overload and helps maintain consistent availability.

  • Man-in-the-middle (MitM)

    A man-in-the-middle attack occurs when a third party intercepts communication between two systems. The attacker can view or alter data without detection.

  • Managed file transfer (MFT)

    Managed file transfer is a platform that centralizes and secures file movement across systems. It uses automation, encryption and controls to manage data exchanges.

  • Managed file transfer as a service (MFTaaS)

    MFTaaS is a cloud-based model that delivers managed file transfer capabilities without local infrastructure. The provider handles maintenance, updates and security.

  • Manual file transfer

    Manual file transfer requires users to initiate and manage each step of moving files. It often lacks automation, which makes it more prone to errors and delays.

  • Many-to-one

    Many-to-one is a transfer model where multiple sources send files to a single destination. It’s commonly used to consolidate data for processing or analysis.

  • MFT agent

    An MFT agent is a lightweight component that enables remote systems to execute transfer tasks. It extends automation capabilities beyond the central platform.

  • MIME types

    MIME types define the format and nature of files being transmitted over networks. They help systems correctly interpret and handle different content types.

  • Monitoring

    Monitoring tracks file transfers, system activity and performance over time. It provides visibility to detect issues and maintain operational reliability.

  • Multi-factor authentication (MFA)

    MFA requires users to verify identity using multiple authentication methods. It strengthens access security beyond a single credential.

  • Multi-tenant model

    A multi-tenant model allows one software instance to serve multiple customers with isolated data. It enables efficient resource sharing while maintaining separation.

  • NIST (National Institute of Standards and Technology)

    NIST is a US agency that develops standards and guidelines for security and technology. Its frameworks guide best practices for data protection and compliance.

  • Odette File Transfer Protocol 2 (OFTP2)

    OFTP2 is a secure protocol used for reliable data exchange, especially in automotive and supply chain industries. It supports encryption, authentication and large file transfers.

  • On-premises MFT

    On-premises MFT is deployed within an organization’s own infrastructure. It provides direct control over security, performance and compliance.

  • One-to-many

    One-to-many is a transfer model where a single source distributes files to multiple destinations. It supports efficient delivery of the same data to many recipients.

  • Operating level agreement (OLA)

    An OLA defines responsibilities between internal teams that support service delivery. It helps ensure service level agreements are met through coordinated efforts.

  • Outbound connection

    An outbound connection is a request initiated from an internal system to an external destination. It’s commonly used to send data outside the organization.

  • P2P sharing

    P2P sharing is a method where devices exchange data directly without a central server. Each participant can both send and receive files.

  • PCI DSS compliance

    PCI DSS is a security standard that governs how payment card data is handled and protected. It requires controls like encryption, access management and monitoring.

  • Personally identifiable information (PII)

    PII is data that can identify a specific individual, either directly or indirectly. It includes details like names, addresses and identification numbers.

  • PeSIT protocol

    PeSIT is a file transfer protocol used mainly in European financial environments. It supports secure and reliable data exchange for high-volume transactions.

  • PGP encryption

    PGP encryption secures data using a combination of public and private keys. It protects file contents and supports authentication through digital signatures.

  • Point-to-point connection

    A point-to-point connection is a direct link between two systems for data exchange. It limits intermediaries but depends on security measures for protection.

  • Private cloud

    A private cloud is a dedicated computing environment used by a single organization. It offers greater control, customization and security than shared models.

  • Programmatic transfer (API/SDK)

    Programmatic transfer moves data using code through APIs or SDKs. It enables automated control of file transfers without manual involvement.

  • Protocol

    A protocol defines the rules for how data is formatted, transmitted and received between systems. It ensures consistent communication across networks and applications.

  • Public cloud

    A public cloud is a shared computing environment delivered over the internet by third-party providers. It offers scalable resources that multiple customers can access.

  • Real-time monitoring

    Real-time monitoring provides continuous visibility into system activity as it happens. It enables immediate detection of issues and faster response to events.

  • Regulatory compliance

    Regulatory compliance is the adherence to laws and standards governing data handling and security. It ensures organizations meet legal and industry requirements.

  • REST API

    A REST API allows systems to communicate over HTTP using standard methods like GET and POST. It enables flexible integration and data exchange between applications.

  • Resume interrupted transfers

    Resume interrupted transfers allows file movement to continue from the last completed point after disruption. It prevents restarting large transfers from the beginning.

  • Retention

    Retention defines how long data is stored before deletion or archiving. It helps enforce data governance and meet regulatory requirements.

  • Right to erasure

    The right to erasure allows individuals to request deletion of their personal data. It’s a key privacy right under regulations like GDPR.

  • Rivest-Shamir-Adleman (RSA)

    RSA is an asymmetric encryption algorithm that uses a public and private key pair. It’s widely used for secure data exchange and digital signatures.

  • Role-based access control (RBAC)

    RBAC restricts system access based on assigned user roles. It simplifies permission management by grouping access rights by job function.

  • Sarbanes Oxley (SOX)

    SOX is a US law that enforces financial reporting accuracy for public companies. It requires controls and auditing to ensure data integrity.

  • Scalability

    Scalability is the ability of a system to handle increasing workloads by expanding resources. It ensures performance remains stable as demand grows.

  • Scheduling

    Scheduling defines when file transfers or processes should run based on set times or intervals. It enables predictable and automated execution.

  • Secure file sharing

    Secure file sharing allows users to exchange data using encryption and controlled access. It protects sensitive information during distribution.

  • Secure file transfer

    Secure file transfer protects data during movement using encryption and authentication. It ensures confidentiality and integrity between systems or users.

  • Secure Hash Algorithm #1 (SHA-1)

    SHA-1 is a cryptographic hash function that generates a fixed-length value from data. It’s now considered weak and is no longer recommended for secure use.

  • Secure Hash Algorithm #2 (SHA-2)

    SHA-2 is a family of cryptographic hash functions used to verify data integrity. It provides stronger security than earlier algorithms like SHA-1.

  • Secure Hash Algorithm #3 (SHA-3)

    SHA-3 is a modern hash algorithm designed to enhance security and resilience. It offers an alternative approach to hashing compared to previous standards.

  • Secure sockets layer (SSL)

    SSL is an older cryptographic protocol used to secure communication between systems. It has been largely replaced by TLS due to improved security.

  • Secure/multipurpose internet mail extensions (S/MIME)

    S/MIME is a standard that secures email using encryption and digital signatures. It protects message content and verifies the sender’s identity.

  • Server

    A server is a system that stores data and provides services to other devices on a network. It processes requests and delivers resources to clients.

  • Service level agreement (SLA)

    An SLA is a contract that defines expected service performance and availability. It sets measurable standards between providers and customers.

  • SFTP file transfer

    SFTP file transfer describes moving files using the SFTP protocol. It ensures secure communication through encrypted channels.

  • SFTP key rotation

    SFTP key rotation is the practice of regularly replacing SSH keys used for authentication. It helps reduce risk by limiting exposure if a key is compromised.

  • Shadow IT

    Shadow IT is the use of systems or applications without official approval from IT teams. It creates security, compliance and visibility risks.

  • Single Euro Payments Area (SEPA)

    SEPA is a standardized payment framework that simplifies bank transfers across participating European countries. It enables consistent processing for cross-border payments.

  • Single sign-on (SSO)

    SSO allows users to access multiple systems with a single authentication. It improves usability while centralizing identity management.

  • SOAP API

    A SOAP API is a protocol-based interface that uses XML messaging for communication. It follows strict standards for structured data exchange.

  • SOC 2 compliance

    SOC 2 compliance evaluates how organizations manage data related to security and privacy. It focuses on controls for protecting customer information.

  • Society for Worldwide Interbank Financial Telecommunication (SWIFT)

    SWIFT is a global messaging network used by financial institutions to exchange payment information. It enables secure communication for international transactions.

  • Software as a service (SaaS)

    SaaS is a delivery model where applications are hosted by a provider and accessed over the internet. It removes the need for local installation or maintenance.

  • SOX compliance

    SOX compliance refers to meeting the requirements of the Sarbanes-Oxley Act for financial reporting. It enforces controls that ensure accuracy, accountability and auditability of financial data.

  • SSH file transfer

    SSH file transfer uses the secure shell protocol to securely transfer files. It protects data and commands during transmission through encryption.

  • SSH file transfer protocol (SSH)

    SFTP is a secure protocol that transfers files over an encrypted secure shell (SSH) connection. It protects both data and commands during transmission.

  • Subject access requests (SARs)

    SARs allow individuals to request access to personal data held by an organization. They require timely identification and delivery of that information.

  • Target

    A target is the destination where a file is delivered after a transfer completes. It can include servers, storage systems or defined endpoints.

  • Transmission control protocol (TCP)

    TCP is a core internet protocol that ensures reliable and ordered data delivery. It manages connections and verifies that data is received correctly.

  • Transmission window

    A transmission window is a defined period when file transfers are allowed to occur. It helps control timing based on system availability or business rules.

  • Transport layer security (TLS)

    TLS is a cryptographic protocol that secures data exchanged over networks. It provides encryption, integrity and authentication for communications.

  • Trigger file

    A trigger file is used to initiate an automated process within a system. Its presence signals that a transfer or workflow should begin.

  • Triple Data Encryption Standard (3DES)

    3DES is a legacy symmetric encryption algorithm that applies the Data Encryption Standard cipher three times to protect data. It’s slower and less secure than the Advanced Encryption Standard and is mainly used for backward compatibility.

  • Uptime

    Uptime measures how long a system remains operational without interruption. It’s typically expressed as a percentage to indicate reliability.

  • User datagram protocol (UDP)

    UDP is a connectionless protocol that sends data without guaranteeing delivery or order. It prioritizes speed and low latency over reliability.

  • User-centric file transfer

    User-centric file transfer focuses on ease of use and self-service for file movement. It allows users to send and receive data with minimal technical effort.

  • Web services API

    A web services API enables systems to exchange data over a network using structured formats. It supports programmatic interaction through protocols like REST or SOAP.

  • Whitelisting

    Whitelisting allows access only to approved users, devices or addresses. All other entities are blocked by default to strengthen security.

  • Workload automation

    Workload automation manages and executes tasks across systems using predefined rules or triggers. It reduces manual effort and improves operational efficiency.

  • Zero trust security

    Zero trust security is a model that requires verification for every access request. It assumes no user or device is trusted by default, regardless of location.

«Previous Page
1 2

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE by Redwood

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Your Privacy Choices