Data exchange partner (DEP)
A DEP is an entity authorized to send or receive files within a transfer system. It represents a trusted participant in structured data exchanges.
Explore commonly used Workload Automation and Job Scheduling terms.
A DEP is an entity authorized to send or receive files within a transfer system. It represents a trusted participant in structured data exchanges.
DLP is a security approach that monitors and blocks unauthorized access or sharing of sensitive data. It helps prevent leaks and supports compliance with data protection requirements.
Data portability is the ability to move data between systems in a usable format. It ensures information can be transferred without losing structure or meaning.
A DPIA is a process that evaluates how personal data is handled in a system or project. It identifies privacy risks and defines measures to address them.
Data replication copies information across multiple locations to maintain consistency and availability. It supports backup, redundancy and system performance.
Data transfer is the movement of digital information between systems or locations. It enables communication, integration and automated workflows across environments.
Data transformation converts information from one format or structure into another. It ensures compatibility between systems and supports processing or analysis.
Decompression restores compressed data back to its original size and format. It allows files to be opened and used after transfer or storage optimization.
Decryption converts encoded data back into readable form using a key. It allows authorized users to access protected information securely.
The defense-in-depth model uses multiple layers of security controls across systems and networks. Each layer adds protection to reduce the impact of potential threats.
A DMZ is a network segment that separates internal systems from external networks. It provides controlled access while reducing exposure to external threats.
Deployment is the process of installing and configuring software in a live environment. It makes applications available for use within existing systems and workflows.
Deprovisioning removes user access, credentials or system permissions when no longer needed. It helps prevent unauthorized access and supports compliance.
DES is a legacy symmetric encryption algorithm that uses a short key to secure data. It’s no longer considered safe and has been replaced by stronger methods like AES.
Digital transformation is the adoption of technology to improve business processes and operations. It drives efficiency, innovation and better user experiences.
Disaster recovery is a set of processes for restoring systems and data after disruption. It helps organizations resume operations with minimal downtime and loss.
A demilitarized zone (DMZ) gateway is a secure intermediary that routes external traffic to internal systems without direct exposure. It protects internal resources by controlling and isolating incoming connections.
A DMZ proxy relays requests between external users and internal servers through a protected network layer. It hides internal systems and reduces the risk of direct access.
Downtime is the period when a system or service is unavailable or not functioning. It can result from maintenance, failures or external disruptions.
Drummond certified indicates that a product has passed interoperability and security testing for specific protocols. It confirms compatibility with other certified systems in real-world use.