Blog & newsroom
-
Mind the (air) gap: Bridging the divide between IT and OT
If you’re in the business of manufacturing, oil and gas, utilities, transportation or mining, unanticipated downtime is a constant threat. Operational technology…
-
JSCAPE by Redwood, version 2025.3: New UI continues to make a splash
Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive.
-
in JSCAPE MFT
Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline
The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of…
-
in JSCAPE MFT
Escape the grip: Why flexible MFT is key to enterprise agility
Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership…
-
in JSCAPE MFT
Avoid downtime and threat actors: Getting the best of both worlds in MFT
For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT…
-
Pricing predictability: Better forecast your MFT spend
The costs of unpredictable MFT solutions Today’s economic landscape is marked by significant instability, which creates a challenging environment for businesses, particularly…
-
in JSCAPE MFT
Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times
Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are…
-
JSCAPE by Redwood, version 2025.2: Level up your file transfer operations with better speed, scaling and new UI
Level up your file transfer operations with JSCAPE, version: 2025.2. Enjoy a new and better-organized UI in certain areas of JSCAPE, helping…
-
11 proven tactics to safeguard file transfers and prevent data breaches
File transfer environments, with their many moving parts and frequent handling of sensitive data, require multiple layers of security. Here are 11…
-
in JSCAPE MFT
5 signs your MFT vendor is capable of mitigating zero-day data breaches
Zero-day exploits are currently one of the most prevalent cyber attacks impacting file transfer solutions. We won’t go into specifics, but a…
-
SFTP vs. FTPS: Which file transfer software is best for business use?
What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators…
-
in EDI
EDI integration with trading partners: 6 best practices
Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes…
-
How to develop automated file transfer workflows: A step-by-step guide for IT teams
Once your organization embarks on a digital transformation journey, there’s no turning back. Your leaders will now be on a never-ending mission…
-
in SFTP
Choosing the right SFTP hosting for advanced file transfer workflows
Most Secure File Transfer Protocol (SFTP) hosting services can handle basic file transfer tasks, but not all are suitable for advanced workflows.…
-
in security
Easy Sarbanes-Oxley Act (SOX) compliance through secure protocols
Following major corporate scandals, most notably the high-profile cases of Enron, WorldCom and Tyco, the United States Congress responded by enacting the…
-
in security
Protect cardholder data: PCI DSS compliance guide
In the highly regulated financial services industry, it’s crucial to maintain compliance with information security standards. Doing so establishes trustworthiness, mitigates data…
-
in SFTP
How to use SFTP compression
File Transfer Protocol (FTP) has very few advantages over Secure File Transfer Protocol (SFTP). However, if you measure the transfer speed between…
-
How to generate client certificates for SSL/TLS authentication
When we use Transport Layer Security (TLS), we typically do so to protect our data while transmitting it over the network and…
-
JSCAPE 2025.1: Streamlined security, file movement and trigger troubleshooting
We’re excited to announce the release of JSCAPE 2025.1. This new version is packed with features and enhancements designed to empower your…
-
in JSCAPE MFT
5 ways JSCAPE ensures 24/7/365 security and compliance for banking file transfers
Banking institutions, including commercial, retail and investment banks, frequently exchange files with various trading partners, which typically include customers, clearinghouses, corporate clients,…
-
in JSCAPE MFT
How to protect consumer data and ensure data security for banks with JSCAPE
Banks store, process and transfer vast amounts of sensitive consumer data. This may include financial information, credit card data, personally identifiable information…
-
in JSCAPE MFT
The compliance imperative: why secure file transfers are non-negotiable in 2025
This year, the stakes for regulatory compliance are higher than ever. Organizations face an increasingly complex landscape of data protection and privacy…
-
10 hidden costs of inadequate file transfer security
Advanced secure file transfer solutions, like managed file transfer (MFT) servers, are no doubt more expensive than run-of-the-mill file transfer software. In…
-
Why more IT professionals are switching from basic SFTP server software to MFT
-
How to set up an FTP scheduler for windows
Scheduled file transfers offer significant operational, strategic and technical benefits. They allow your IT staff to save time and improve productivity. They…
-
JSCAPE 2024.4: enhancements to security and SaaS
JSCAPE by Redwood wraps up the year with several security updates, plus enhancements to our SaaS environment, to get your 2025 started…
-
File transfer data breach risk: real or overstated?
Managed file transfer (MFT) vendors often highlight security as a key differentiator between MFT and traditional file transfer solutions. With their vast…
-
in JSCAPE MFT
JSCAPE MFT server 12.1.10.391 (Patch)
JSCAPE MFT Server Patch 12.1.10.391 was released to address this issue:
-
in JSCAPE MFT
JSCAPE MFT server 12.1.10.392 (Patch)
JSCAPE MFT Server Patch 12.1.10.392 was released to address the following issues:
-
in JSCAPE MFT
JSCAPE MFT server 12.1.11 (Patch)
JSCAPE MFT Server Patch 12.1.11 was released to address the following issue:
-
in JSCAPE MFT
JSCAPE MFT server 12.1.12 (Patch)
JSCAPE MFT Server Patch 12.1.12 was released to apply the following changes:
-
How to generate a trigger report using an action
This custom trigger action is used to export the details of the trigger executions for a single trigger by name in excel format
-
Replace root path of the users using ReplaceUsersPath action
This custom trigger action is used to replace the users default root path.
-
Replace path of all users using ReplaceUsersPath action
This custom trigger action is used to replace all users path.
-
Generate trigger report by custom date using TriggerReportByCustomDate action
This custom trigger action is used to export the details of the trigger executions for a single trigger by name and custom date…
-
What is SSO and how does it work? a guide for file transfer professionals
What is Single Sign-On (SSO)?
-
What is MFA authentication and why it’s crucial for file transfer security
Multi-factor authentication (MFA) is your file transfer systems’ first line of defense. With phishing attacks and compromised credentials being two of the…
-
in security
9 best practices for secure document transfers in business operations
When you transfer documents as part of business operations, security is crucial. The growing volume of sensitive information involved in these activities…
-
MFT servers explained: why your business needs one now
Increased IT complexity, regulatory compliance obligations and senior management demands for greater efficiency are rapidly rendering general-purpose file transfer solutions incapable of…
-
MFT servers explained: why your business needs one now
Increased IT complexity, regulatory compliance obligations and senior management demands for greater efficiency are rapidly rendering general-purpose file transfer solutions incapable of…
-
in security
9 best practices for secure document transfers in business operations
When you transfer documents as part of business operations, security is crucial. The growing volume of sensitive information involved in these activities…
-
in JSCAPE SaaS
How to choose a SaaS secure file transfer service for your business
Enterprise organizations must streamline how they share content and protect sensitive files. Old file transfer systems cannot keep up with new demands,…
-
What is MFA authentication and why it’s crucial for file transfer security
Multi-factor authentication (MFA) is your file transfer systems’ first line of defense. With phishing attacks and compromised credentials being two of the…
-
What is SSO and how does it work? a guide for file transfer professionals
What is Single Sign-On (SSO)?
-
Why is an enterprise file transfer solution necessary?
In today’s interconnected world, secure and reliable file transfers are vital to business processes. While enterprises have often turned to traditional solutions…
-
Using SFTP with the Cloud
For several decades, SFTP, which stands for Secure File Transfer Protocol or SSH File Transfer Protocol, has been arguably the most widely…
-
SSH file transfer protocol 101: what it is and when to use it
When it comes to securely transferring files over the internet, the SSH File Transfer Protocol (SFTP) stands out as one of the…
-
JSCAPE 2024.3: key updates to enhance performance and security in file transfers
You asked for it, and JSCAPE by Redwood delivered! JSCAPE 2024.3 introduces some commonly requested features, including new detailed reporting, trigger capabilities…
-
7 alternatives to an SFTP platform you probably didn’t know
Many of our customers use Secure File Transfer Protocol (SFTP) for their business file transfers. While SFTP is certainly a good choice…
-
The benefits of secure file transfer software
Any organization that exchanges sensitive files with another party through the internet or any wide area network should carry out those exchanges…