• Support
    • Help Desk
    • Documentation
    • Customer Downloads
  • Company
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
JSCAPE by Redwood
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Resources
    • All Resources
    • Blog
  • Pricing
Get a demo
Glossary

Letter: R

Explore commonly used Workload Automation and Job Scheduling terms.

  • @
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Real-time monitoring

    Real-time monitoring provides continuous visibility into system activity as it happens. It enables immediate detection of issues and faster response to events.

  • Regulatory compliance

    Regulatory compliance is the adherence to laws and standards governing data handling and security. It ensures organizations meet legal and industry requirements.

  • REST API

    A REST API allows systems to communicate over HTTP using standard methods like GET and POST. It enables flexible integration and data exchange between applications.

  • Resume interrupted transfers

    Resume interrupted transfers allows file movement to continue from the last completed point after disruption. It prevents restarting large transfers from the beginning.

  • Retention

    Retention defines how long data is stored before deletion or archiving. It helps enforce data governance and meet regulatory requirements.

  • Right to erasure

    The right to erasure allows individuals to request deletion of their personal data. It’s a key privacy right under regulations like GDPR.

  • Rivest-Shamir-Adleman (RSA)

    RSA is an asymmetric encryption algorithm that uses a public and private key pair. It’s widely used for secure data exchange and digital signatures.

  • Role-based access control (RBAC)

    RBAC restricts system access based on assigned user roles. It simplifies permission management by grouping access rights by job function.

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE by Redwood

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Your Privacy Choices