• Support
    • Help Desk
    • Documentation
    • Customer Downloads
  • Company
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
JSCAPE by Redwood
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Resources
    • All Resources
    • Blog
  • Pricing
Get a demo
Glossary

Letter: S

Explore commonly used Workload Automation and Job Scheduling terms.

  • @
  • A
  • B
  • C
  • D
  • E
  • F
  • G
  • H
  • I
  • J
  • K
  • L
  • M
  • N
  • O
  • P
  • Q
  • R
  • S
  • T
  • U
  • V
  • W
  • X
  • Y
  • Z
  • Sarbanes Oxley (SOX)

    SOX is a US law that enforces financial reporting accuracy for public companies. It requires controls and auditing to ensure data integrity.

  • Scalability

    Scalability is the ability of a system to handle increasing workloads by expanding resources. It ensures performance remains stable as demand grows.

  • Scheduling

    Scheduling defines when file transfers or processes should run based on set times or intervals. It enables predictable and automated execution.

  • Secure file sharing

    Secure file sharing allows users to exchange data using encryption and controlled access. It protects sensitive information during distribution.

  • Secure file transfer

    Secure file transfer protects data during movement using encryption and authentication. It ensures confidentiality and integrity between systems or users.

  • Secure Hash Algorithm #1 (SHA-1)

    SHA-1 is a cryptographic hash function that generates a fixed-length value from data. It’s now considered weak and is no longer recommended for secure use.

  • Secure Hash Algorithm #2 (SHA-2)

    SHA-2 is a family of cryptographic hash functions used to verify data integrity. It provides stronger security than earlier algorithms like SHA-1.

  • Secure Hash Algorithm #3 (SHA-3)

    SHA-3 is a modern hash algorithm designed to enhance security and resilience. It offers an alternative approach to hashing compared to previous standards.

  • Secure sockets layer (SSL)

    SSL is an older cryptographic protocol used to secure communication between systems. It has been largely replaced by TLS due to improved security.

  • Secure/multipurpose internet mail extensions (S/MIME)

    S/MIME is a standard that secures email using encryption and digital signatures. It protects message content and verifies the sender’s identity.

  • Server

    A server is a system that stores data and provides services to other devices on a network. It processes requests and delivers resources to clients.

  • Service level agreement (SLA)

    An SLA is a contract that defines expected service performance and availability. It sets measurable standards between providers and customers.

  • SFTP file transfer

    SFTP file transfer describes moving files using the SFTP protocol. It ensures secure communication through encrypted channels.

  • SFTP key rotation

    SFTP key rotation is the practice of regularly replacing SSH keys used for authentication. It helps reduce risk by limiting exposure if a key is compromised.

  • Single Euro Payments Area (SEPA)

    SEPA is a standardized payment framework that simplifies bank transfers across participating European countries. It enables consistent processing for cross-border payments.

  • Single sign-on (SSO)

    SSO allows users to access multiple systems with a single authentication. It improves usability while centralizing identity management.

  • SOAP API

    A SOAP API is a protocol-based interface that uses XML messaging for communication. It follows strict standards for structured data exchange.

  • SOC 2 compliance

    SOC 2 compliance evaluates how organizations manage data related to security and privacy. It focuses on controls for protecting customer information.

  • Society for Worldwide Interbank Financial Telecommunication (SWIFT)

    SWIFT is a global messaging network used by financial institutions to exchange payment information. It enables secure communication for international transactions.

  • Software as a service (SaaS)

    SaaS is a delivery model where applications are hosted by a provider and accessed over the internet. It removes the need for local installation or maintenance.

  • SOX compliance

    SOX compliance refers to meeting the requirements of the Sarbanes-Oxley Act for financial reporting. It enforces controls that ensure accuracy, accountability and auditability of financial data.

  • SSH file transfer

    SSH file transfer uses the secure shell protocol to securely transfer files. It protects data and commands during transmission through encryption.

  • SSH file transfer protocol (SSH)

    SFTP is a secure protocol that transfers files over an encrypted secure shell (SSH) connection. It protects both data and commands during transmission.

  • Subject access requests (SARs)

    SARs allow individuals to request access to personal data held by an organization. They require timely identification and delivery of that information.

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE by Redwood

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Your Privacy Choices