File Transfer Glossary

Tech talk can be confusing when you don’t know what something means. Find definitions to file transfer terms by clicking the corresponding letter in the navigation menu, below.

Questions about file transfer terms or technology?
Get answers, not a sales pitch.


A

Ad hoc file sharing

Also File sharing, Manual file transfer, User-centric file transfer

When people share files with each other manually through email or another application.

Antivirus scanning

When managed file transfer (MFT) software scans files for viruses to keep the environment secure.

Application programming interface (API)

APIs let a user control an application without logging in. In the case of managed file transfer (MFT), APIs can funnel alert information from the MFT application to another application.

Archive

Storing files for a certain time, typically to meet compliance requirements.

Automated file transfer

Describes a use case or software that automates file transfers.

Auto-scaling

Describes a software’s ability to handle increasing usage without human involvement.

B

C

Checkpoint restart

Describes the ability for managed file transfer (MFT) software to resume failed or delayed file transfers from a certain checkpoint.

Client

A piece of hardware or software that requests information from a server. It is typically used by individual users on the network.

Cloud

A global network of servers. Resources can be accessed anywhere if there is an internet connection.
Source: azure.microsoft.com/en-us/overview/what-is-the-cloud/

Cloud managed file transfer (MFT)

Software that automates file transfers and runs in the cloud.

Cloud-native

Describes software that is built in the cloud, unlike software that is built on-premises and then adapted for the cloud.

Compression

A process to make a file take up less storage space. Compression is typically done to speed up file transfer.

Connector

Also Integration

A specific connection to an external resource of any kind, whether it is a

  • Generic protocol such as HTTP, FTP, etc.
  • Java-based database
  • Specific third-party API

Connectors may be operation-based or endpoint-based, but these terms refer to a difference in how they are configured, not in what they do.

D

Data replication

When data is copied to an off-site location in case of a disaster.

Data sovereignty

The idea that the data any organization collects, stores and processes is subject to the nation’s laws where it is physically located. Data sovereignty affects which data centers a company should use.
Source: permission.io/blog/data-sovereignty/

Data transformation

When data is changed to meet a business need. Examples of data transformation could include adding, deleting, standardizing or re-organizing data.

Decompression

Restoring a compressed file to its original size. A file must be decompressed to be used.

Decryption

Making data readable again when the person receives it.

Defense-in-depth model

A cybersecurity strategy that uses multiple layers of security to protect information. This model should include policies to ensure physical, operational and managerial security.

Demilitarized zone (DMZ)

An area outside a company’s firewall. Companies will put publicly accessed servers in the DMZ to keep hackers from accessing sensitive data behind the firewall.

Deployment

The steps required to make software available to its users. Cloud deployments are typically easier than on-premises deployments.
Source: sumologic.com/glossary/software-deployment/

Digital transformation

Implementing new technologies, talent and processes to improve business processes and satisfy customers.
Source: cio.com/article/3211428/what-is-digital-transformation-a-necessary-disruption.html

Disaster recovery

The ability and methods used by an organization to get its IT infrastructure functional after a disaster.

Downtime

When software is not working. This could be due to scheduled updates or maintenance, a cyberattack or another disaster.

E

Elasticity

Describes a software’s ability to accommodate increases in demand.

Encryption

Making data unreadable before it is sent to keep it secure.

End-to-end encryption (E2EE)

Encrypting a file during transfer and in storage. End-to-end encryption can also be described as a combination of encryption in transit and encryption at rest.

Endpoint

A term describing the origin(s) and destination(s) of file transfers. Endpoints can be clients or servers and use various protocols.

Electronic Software Distribution (ESD)

Also Electronic Software Delivery (ESD)

Sharing software manually with customers via an online interface.

Event-driven managed file transfer (MFT)

Setting up managed file transfer (MFT) software to act when a certain event occurs. For example, if your enterprise resource planning (ERP) system places files in a specific location, the MFT software can collect and distribute the files, then report the status back to the ERP system so that the process can be marked as successful.

External file transfer

Also Business-to-business file transfer

Transferring files with customers, wholesalers, resellers, retailers and other third parties.

F

File name filters

The ability to filter files based on file type or a part of the name.

File renaming

Changing the name of a file while it is being transferred. Examples of file renaming could include adding the date or time of transfer, adding a text string, or replacing part of the file name with something else.

Firewall

A network security device that monitors incoming and outgoing traffic. It allows or blocks traffic based on a set of rules.
Source: cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

Flow

Also Transport, Workflow

A flow is a pathway created to transfer files between endpoints. In Thru, you can modify flows at any time by adding or removing organizations or endpoints.

Flow-based system

A system with workflows or flows as the primary component. Folder paths are added to endpoints.

Folder-based system

A system with folders as the primary component. The ability to make workflows is limited or nonexistent.

FTP

Stands for File Transfer Protocol. FTP is unencrypted, meaning that anyone can intercept and read information in files. Many companies have been gradually phasing out FTP file transfers.

FTPS

Stands for File Transfer Protocol over SSL. It encrypts files with Transport Layer Security (TLS) encryption, which used to be known as SSL.

G

General Data Protection Regulation (GDPR)

A law created by the European Union to protect EU citizens’ data. GDPR regulates the collection, use and deletion of personal data.

General “Good Practices” (GxP)

GxP refers to general “good practices” regarding quality guidelines and regulations, with the “x” standing for various fields or industries.

Guaranteed delivery

The ability of managed file transfer (MFT) software to keep trying to deliver files if it is having trouble transferring them.

H

Headless managed file transfer

Using APIs to control managed file transfer (MFT) software without logging in. IT teams can simplify monitoring and processes by using headless MFT.

High availability

Describes a software’s ability to run continuously without failing. High availability and disaster recovery are often discussed together.
Source: avinetworks.com/glossary/high-availability/

HIPAA

Health Insurance Portability and Accountability Act (HIPAA) protects patients’ protected health information (PHI). Any company that has access to PHI must achieve and maintain HIPAA compliance.

HTTP

Stands for Hypertext Transfer Protocol. It sends requests and responses in an unencrypted format, meaning that bad actors can intercept and read the information.

Many websites used to use HTTP, but most have switched to HTTPS.

HTTPS

Stands for Hypertext Transfer Protocol Secure. It uses Transport Layer Security (TLS) to encrypt data. HTTPS is often used by websites because it keeps users’ data secure.

Hybrid architecture

Also Hybrid managed file transfer

A situation in which a company uses cloud managed file transfer (MFT) with an on-premises agent to handle transfers within the company’s firewall. The on-premises agent is orchestrated from the cloud.

Hybrid architecture gives a company the advantages of cloud MFT without sacrificing the security of its internal file transfers.

I

Inbound connection

A connection from outside a company’s network to within the network.

Integration platform as a service (iPaaS)

Also Enterprise integration platform as a service (EiPaaS)

A cloud service that allows software developers to automate how on-premises and cloud-based applications share data by providing a selection of pre-built connectors and business rules that make it easier to standardize integration flows.
Source: techopedia.com/definition/30881/integration-platform-as-a-service-ipaas

Internal file transfer

A file transfer that occurs within a company’s network, behind its firewall.

J

K

L

Local area network (LAN)

A collection of devices connected in one physical location, such as a building, office or home.
Source: cisco.com/c/en/us/products/switches/what-is-a-lan-local-area-network.html

M

Managed file transfer (MFT)

A technology that secures and simplifies the process of exchanging files internally or externally to an organization.

Managed file transfer as a service (MFTaaS)

Also Managed file transfer platform as a service (MFTPaaS)

A cloud managed file transfer (MFT) solution in which the vendor handles software updates, disaster recovery, high availability and scaling.

Many-to-one

A file transfer pattern in which many organizations are sending files to one organization.

Mapping

In Thru, adding different source and target folder paths to the source endpoint(s).

Metadata

Information about data. File metadata could be the name, creation date, etc.

MFT agent

For Thru, an application that is installed on-premises and orchestrated from the cloud. It handles file transfers within a company’s network.

Migration

The process of switching from one software or system to another.

Monitoring

The ability of a managed file transfer (MFT) application to record information about file transfers and alert administrators in case a file transfer fails.

N

No-code

Describes software that requires no coding knowledge to use.

O

One-to-many

A file transfer pattern in which one organization is sending files to many organizations.

Organization

Groups of people you want to send files to in Thru. They can represent internal teams (your accounting or marketing teams) or other companies.

Outbound connection

A connection from within a company’s network to outside the network.

P

Partner

Any group of people a company exchanges files with, including clients, distributors, manufacturers, resellers, subsidiaries, suppliers, etc.

Persistence

The ability of managed file transfer (MFT) software to store files until they are successfully delivered.

Pretty Good Privacy (PGP) encryption

A type of encryption that protects the file itself. It uses two keys: one public and one private. The public key is shared with anyone and used to decrypt the message. The private key is never shared and decrypts the message.

Point-to-point connection

A connection between only two points to exchange data. Point-to-point connections are coded and maintained by the IT team. Over time, a company could accumulate hundreds or thousands of point-to-point connections.

Private cloud

Also Virtual private cloud

When a company sets up a cloud that is only for its use. It manages its own high availability, disaster recovery and scaling within its private cloud.

Protocol

A set of rules or procedures for transmitting data between electronic devices, such as computers.
Source: britannica.com/technology/protocol-computer-science

Public cloud

Also Multi-tenant model

When multiple companies use the same cloud and keep their data separate. The software vendor manages high availability, disaster recovery and scaling.

Publish/subscribe model (pub/sub)

In Thru, the ability to replace point-to-point connections by adding as many organizations as needed to one flow. Endpoints can be changed at any time and flows automatically adjust.

Purge

Deleting files after they are successfully delivered.

Q

Quarantine

Isolating a file that might have a virus to keep it from harming other files or parts of the system.

R

REST API

REST stands for Representational State Transfer. REST APIs work with plain text, XML, HTML and JSON. They require less bandwidth than SOAP APIs.
Source: guru99.com/comparison-between-web-services.html

Retention

Keeping files after they are transferred for compliance or other purposes.

S

Scheduling

Setting managed file transfer (MFT) software to check for files at certain times of the day, week or month.

Server

A piece of computer software or hardware that fulfills requests from the client. It typically has resources shared by every user on the network.

Service level agreement (SLA)

An agreement between a software provider and its customers about how much uptime the customer will experience. If the SLA is broken, the vendor may have to reimburse customers for the downtime.

SFTP

Stands for SSH File Transfer Protocol or Secure File Transfer Protocol. SFTP is a file transfer protocol that uses Secure Shell (SSH) to encrypt files.

Shadow IT

When employees find a way around a cumbersome IT process that is not secure or trackable by IT. For example, employees might work on confidential documents in a collaboration website that is not secure.

SOAP API

SOAP stands for Simple Object Access Protocol. SOAP APIs only work with XML formats and require more bandwidth.
Source: cisco.com/c/en/us/products/security/firewalls/what-is-a-firewall.html

Software as a service (SaaS)

A software licensing model in which access to the software is provided on a subscription basis, with the software being located on external servers rather than on servers located in-house.
Source: investopedia.com/terms/s/software-as-a-service-saas.asp

Source(s)

Where a file is coming from.

T

Target(s)

Where a file is going.

Trigger file

Also Semaphore file

A file used to keep managed file transfer (MFT) software from pulling partial files from endpoints.

U

Uptime

When software is working and available for use.

V

W

Whitelisting

Also IP address whitelisting

When all IP addresses are blocked by default and must be approved individually for security purposes.

X

Y

Z

Zero trust (ZT)

Summarized in motto: Never trust, always verify.
As defined by National Institute of Standards and Technology (NIST): Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.
Source: nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf

Have other questions about file transfer terms or technology?
Get answers, not a sales pitch.

 

Our focus has always been enterprise-level file transfers in the cloud. Submit your file transfer question(s) and and we’ll be in touch with answers.


Want to learn more about MFT in general? Go to our comprehensive guide to MFT »

 

Scroll to Top