• Support
    • Help Desk
    • Documentation
    • Customer Downloads
  • Company
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
JSCAPE by Redwood
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Resources
    • All Resources
    • Blog
  • Pricing
Get a demo
Glossary

Letter: F

Explore commonly used Workload Automation and Job Scheduling terms.

  • @
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Federal Deposit Insurance Corporation (FDIC)

    The FDIC is a US government agency that protects deposits at insured financial institutions. It also supervises banks to maintain trust in the financial system.

  • File integrity checking

    File integrity checking verifies that data hasn’t been altered or corrupted. It uses hashes or checksums to confirm consistency during transfer or storage.

  • File name filters

    File name filters use patterns or rules to include or exclude specific files during transfers. They help ensure only the correct files are selected for processing.

  • File renaming

    File renaming automatically changes file names based on defined rules during workflows. It helps enforce naming standards and maintain consistency across systems.

  • File sharing

    File sharing is the process of providing access to digital files between users or systems. It supports collaboration and controlled data distribution.

  • File transfer automation

    File transfer automation uses predefined rules to move files without manual input. It increases reliability and ensures consistent execution of transfer tasks.

  • File transfer protocol (FTP)

    FTP is a standard network protocol used to transfer files between systems over a network. It doesn’t use encryption, which makes it less secure than modern alternatives.

  • File transfer security certification

    File transfer security certification verifies that a system meets established security standards. It demonstrates the ability to protect data during transmission.

  • File transfer workflow

    A file transfer workflow is a structured sequence of steps that governs how files are processed and moved. It automates tasks like routing, validation and error handling.

  • FIPS 140-2

    FIPS 140-2 is a US government standard that defines security requirements for cryptographic modules. It’s being phased out in favor of the updated FIPS 140-3.

  • FIPS 140-2 compliance

    FIPS 140-2 compliance means a system follows the security requirements defined by the FIPS 140-2 standard. It ensures approved methods are used for protecting sensitive data.

  • FIPS 140-3

    FIPS 140-3 is the current US standard for validating cryptographic modules. It introduces updated requirements aligned with international security frameworks.

  • FIPS compliant

    FIPS compliant describes systems that meet US government standards for data protection and cryptography. It indicates the use of approved methods for securing sensitive information.

  • FIPS validated

    FIPS validated describes cryptographic modules that have been officially tested and approved by the CMVP. It confirms they meet required security standards for encryption.

  • Firewall

    A firewall monitors and controls network traffic based on defined security rules. It blocks unauthorized access while allowing trusted communication.

  • Flow-based system

    A flow-based system processes data through a sequence of connected steps or tasks. It enables structured automation and efficient execution of workflows.

  • Folder-based system

    A folder-based system organizes files within a hierarchical directory structure. It helps users manage and locate data using grouped storage.

  • FTP secure (FTPS)

    FTPS is a secure version of FTP that uses SSL or TLS to encrypt data in transit. It protects files and credentials during transmission across networks.

  • FTP with PGP

    FTP with PGP combines file transfer protocol with encryption from Pretty Good Privacy. It protects file contents even when using an otherwise unencrypted method.

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE by Redwood

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Your Privacy Choices