• Support
    • Help Desk
    • Documentation
    • Customer Downloads
  • Company
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
JSCAPE by Redwood
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Resources
    • All Resources
    • Blog
  • Pricing
Get a demo
Glossary

Letter: D

Explore commonly used Workload Automation and Job Scheduling terms.

  • @
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Data exchange partner (DEP)

    A DEP is an entity authorized to send or receive files within a transfer system. It represents a trusted participant in structured data exchanges.

  • Data loss prevention (DLP)

    DLP is a security approach that monitors and blocks unauthorized access or sharing of sensitive data. It helps prevent leaks and supports compliance with data protection requirements.

  • Data portability

    Data portability is the ability to move data between systems in a usable format. It ensures information can be transferred without losing structure or meaning.

  • Data protection impact assessment

    A DPIA is a process that evaluates how personal data is handled in a system or project. It identifies privacy risks and defines measures to address them.

  • Data replication

    Data replication copies information across multiple locations to maintain consistency and availability. It supports backup, redundancy and system performance.

  • Data transfer

    Data transfer is the movement of digital information between systems or locations. It enables communication, integration and automated workflows across environments.

  • Data transformation

    Data transformation converts information from one format or structure into another. It ensures compatibility between systems and supports processing or analysis.

  • Decompression

    Decompression restores compressed data back to its original size and format. It allows files to be opened and used after transfer or storage optimization.

  • Decryption

    Decryption converts encoded data back into readable form using a key. It allows authorized users to access protected information securely.

  • Defense-in-depth model

    The defense-in-depth model uses multiple layers of security controls across systems and networks. Each layer adds protection to reduce the impact of potential threats.

  • Demilitarized zone (DMZ)

    A DMZ is a network segment that separates internal systems from external networks. It provides controlled access while reducing exposure to external threats.

  • Deployment

    Deployment is the process of installing and configuring software in a live environment. It makes applications available for use within existing systems and workflows.

  • Deprovisioning

    Deprovisioning removes user access, credentials or system permissions when no longer needed. It helps prevent unauthorized access and supports compliance.

  • Digital Encryption Standard

    DES is a legacy symmetric encryption algorithm that uses a short key to secure data. It’s no longer considered safe and has been replaced by stronger methods like AES.

  • Digital transformation

    Digital transformation is the adoption of technology to improve business processes and operations. It drives efficiency, innovation and better user experiences.

  • Disaster recovery (DR)

    Disaster recovery is a set of processes for restoring systems and data after disruption. It helps organizations resume operations with minimal downtime and loss.

  • DMZ gateway

    A demilitarized zone (DMZ) gateway is a secure intermediary that routes external traffic to internal systems without direct exposure. It protects internal resources by controlling and isolating incoming connections.

  • DMZ proxy

    A DMZ proxy relays requests between external users and internal servers through a protected network layer. It hides internal systems and reduces the risk of direct access.

  • Downtime

    Downtime is the period when a system or service is unavailable or not functioning. It can result from maintenance, failures or external disruptions.

  • Drummond Certified

    Drummond certified indicates that a product has passed interoperability and security testing for specific protocols. It confirms compatibility with other certified systems in real-world use.

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE by Redwood

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Your Privacy Choices