
What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators…
Learn More

Overview: What Is AES? First adopted by the U.S. government to protect classified information, Advanced Encryption Standard (AES) has long gained global…
Learn More

An Overview of HMAC Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity…
Learn More

Overview How do you strengthen a server’s user authentication system? Well, one solution would be to add another authentication method. Most servers…
Learn More

Overview PGP encryption can add another layer of protection to a trading partner file transfer already secured by FTPS. It can also…
Learn More

Overview People who use SSL/TLS to secure their online transactions/file transfers are mostly only familiar with two of its security functions: 1.…
Learn More

In a previous post, we taught you how to mirror an FTP/S service running on JSCAPE MFT Server to an Amazon S3…
Learn More

When it comes to moving files across networks, not many protocols are as established as File Transfer Protocol (FTP), File Transfer Protocol…
Learn More

One of the reasons why our clients love Triggers is because this feature makes it so easy to set up unmanned, automated…
Learn More

While the IT skills gap is sometimes exaggerated, there are some industries where the tech talent shortage is really a major issue.…
Learn More

Overview Last time, we tackled the problem system administrators encounter when their passive FTP or FTPS connections have to pass through a…
Learn More

It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more complicated once you…
Learn More

EPSV is a command issued by an FTP/S client to signal the server that it wishes to enter into what is known…
Learn More

JSCAPE MFT Server’s Network Storage module (formerly known as Reverse Proxy) makes it possible to extend the storage of your managed file…
Learn More

JSCAPE MFT Server encrypted file transfer protocols like SFTP and those secured through TLS (e.g. HTTPS, FTPS, AS2, OFTP, and WebDAVS) can…
Learn More

Overview There will be times when you’ll want to transfer files over a secure connection. One option is to use FTPS (FTP…
Learn More

The security of any SSL/TLS-protected connection largely depends on the client and server’s choice of cipher suites. But what are cipher suites?…
Learn More

Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn’t it a bit early to start…
Learn More

This video tutorial demonstrates how to set up a secure FTPS Server using JSCAPE MFT Server
Learn More

Overview In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of…
Learn More

Overview As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure…
Learn More

Overview Over the last few months, we’ve been receiving a growing number of inquiries on how to enable support for SHA2 certificates…
Learn More

Overview There are a couple of reasons why you’ll want to map file transfer server drives to Samba shares. Maybe your users…
Learn More

Overview The most widely used secure file transfer protocols, SFTP and FTPS, get their security from underlying protocols. SFTP from SSH and…
Learn More

Overview In order to conduct Electronic Data Interchange (EDI) transactions with a trading partner, businesses need a way of transmitting their EDI…
Learn More

Despite FTP’s vulnerabilities, many Windows users still use FTP clients for transferring files over the Internet. If you really have to keep…
Learn More

Overview In our previous post, we showed you how to use two triggers to upload a second file only if the first…
Learn More

Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in…
Learn More

Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you…
Learn More

Most of these file transfer protocols should already be running on your network. Can you identify their respective default port numbers?
Learn More

Overview Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite…
Learn More

A growing number of businesses are finding it imperative to get certain products out in the market FAST. To beat extremely tight…
Learn More

Overview The strength of an encryption largely depends on two components: 1) the cipher and 2) the length of the key. We…
Learn More

Overview Digital signatures help enforce security during data transfers. They’re mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we’ll be…
Learn More

Overview Hashes are essential to secure file transfers. You can find them in operations involving passwords, file integrity checks, digital signatures, digital…
Learn More

Overview: Symmetric vs. Asymmetric Encryption Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality…
Learn More

Overview: What is an SSL File Transfer? SSL file transfer is a term sometimes used in referring to a secure file transfer…
Learn More

Overview Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don’t fit…
Learn More

Although plain File Transfer Protocol (FTP) has been the data transfer solution of choice for several decades, it’s no longer fit for…
Learn More

Overview: Secure File Transfer Systems Normally, when people send files over the Internet, they do it through email, FTP, or cloud-based file…
Learn More