End-to-end

From Wikipedia, the free encyclopedia

In any computer communication, there are two or more end points, called end systems or hosts.

End-to-end, in e-commerce, connects people who want to sell and buy. This practice eliminates the layers of middlemen who extract value from the trade and increase the final price.

In security, end-to-end means that sensitive data is encrypted all the way from the device side application back to the enterprise. Rather than relying on transport-level security (such as Secure Sockets Layer, or SSL), end-to-end security puts the power of strong encryption in the user's hands, all through a simple interface. This resolves the so-called “air gap” where sensitive data was previously decrypted at the gateway during translation for wireless protocols into Internet protocols.

End-to-end monitoring is the process of attempting to access a web server or other Internet device from across the Internet, just as a real end user would, to verify that the server is accessible and functioning properly at all times. This approach can be used instead of, or as a complement to, local monitoring software run by the web administrator.

[edit] See also