Category: FTPS
-

SFTP vs. FTPS: Which file transfer software is best for business use?
What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage remote Linux, UNIX and macOS machines in…
-

What is AES encryption and how does it work?
Overview: What Is AES? First adopted by the U.S. government to protect classified information, Advanced Encryption Standard (AES) has long gained global acceptance and is used for securing sensitive data in various industries. In…
-

What Is HMAC (Hash-based message authentication code), And How Does It Secure File Transfers?
An Overview of HMAC Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS,…
-

What is client certificate authentication?
Overview How do you strengthen a server’s user authentication system? Well, one solution would be to add another authentication method. Most servers authenticate users through the usual username-password technique. If you can augment that…
-

Securing trading partner file transfers w/ auto PGP encryption & FTPS
Overview PGP encryption can add another layer of protection to a trading partner file transfer already secured by FTPS. It can also provide data-at-rest encryption as soon as the file arrives at the other…
-

How to set up SSL client authentication
Overview People who use SSL/TLS to secure their online transactions/file transfers are mostly only familiar with two of its security functions: 1. That it can encrypt data in transit and 2. That it can…
-

How to sync a remote FTP server to s3
In a previous post, we taught you how to mirror an FTP/S service running on JSCAPE MFT Server to an Amazon S3 bucket folder. You can set up a similar process using any remote…
-

Understanding key differences between FTP, FTPS and SFTP
When it comes to moving files across networks, not many protocols are as established as File Transfer Protocol (FTP), File Transfer Protocol Secure (FTPS) and Secure File Transfer Protocol (SFTP). Organizations rely on these…
-

Scheduling an automated file transfer for files matching a regex
One of the reasons why our clients love Triggers is because this feature makes it so easy to set up unmanned, automated file transfers that run overnight or over the weekend. But sometimes, you’ll…
-

How to address the IT skills gap in manufacturing
While the IT skills gap is sometimes exaggerated, there are some industries where the tech talent shortage is really a major issue. One of those industries is manufacturing. Despite growing adoption of advanced technologies…
-

Excluding passive IP for internal FTP/S connections to your reverse proxy
Overview Last time, we tackled the problem system administrators encounter when their passive FTP or FTPS connections have to pass through a NAT firewall or router. A similar problem can happen when you’re dealing…
-

Setting up an FTPS server behind a firewall or NAT for PASV mode data transfers
It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more complicated once you start using the secure version of FTP, known as FTPS. In this…
-

What is the FTP/S EPSV command and when do you use it?
EPSV is a command issued by an FTP/S client to signal the server that it wishes to enter into what is known as Extended Passive Mode. But what is Extended Passive Mode, and when…
-

Using a remote FTP/S service as network storage for your MFT server
JSCAPE MFT Server’s Network Storage module (formerly known as Reverse Proxy) makes it possible to extend the storage of your managed file transfer server to various remote services and storage solutions like SFTP servers,…
-

What is FIPS compliance & should i enable it for file transfers?
JSCAPE MFT Server encrypted file transfer protocols like SFTP and those secured through TLS (e.g. HTTPS, FTPS, AS2, OFTP, and WebDAVS) can be configured for FIPS compliance. Since this is a function that isn’t…
-

Choosing between SSL implicit, explicit, and forced explicit modes
Overview There will be times when you’ll want to transfer files over a secure connection. One option is to use FTPS (FTP over SSL) which provides data-in-motion encryption through SSL (Secure Sockets Layer). When…
-

An Introduction To Cipher Suites
The security of any SSL/TLS-protected connection largely depends on the client and server’s choice of cipher suites. But what are cipher suites? If you use file transfer protocols like HTTPS, FTPS, and AS2 but…
-

Should we start using 4096 bit RSA keys?
Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn’t it a bit early to start using the 4096-bit keys that have become increasingly available in encryption-enabled applications?…
-

Setting up a secure FTPS server video
This video tutorial demonstrates how to set up a secure FTPS Server using JSCAPE MFT Server
-

Top 5 FTP alternatives for businesses
Overview In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of the most widely used file transfer protocols, FTP, fails to meet the…
-

Applying the CIA triad to your enterprise file transfer
Overview As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad…
-

Why SHA2 certificates are imperative in secure file transfers
Overview Over the last few months, we’ve been receiving a growing number of inquiries on how to enable support for SHA2 certificates in JSCAPE MFT Server. We later learned that the intention was not…
-

Mapping FTP, FTPS, or SFTP server drives to samba
Overview There are a couple of reasons why you’ll want to map file transfer server drives to Samba shares. Maybe your users have existing files on a separate machine that doesn’t have any file…
-

SSL vs SSH – a Not-So-Technical comparison
Overview The most widely used secure file transfer protocols, SFTP and FTPS, get their security from underlying protocols. SFTP from SSH and FTPS from SSL. Let’s compare the two.
-

EDI transmission types every trading partner should know
Overview In order to conduct Electronic Data Interchange (EDI) transactions with a trading partner, businesses need a way of transmitting their EDI messages. Today, we take a look at the most widely used EDI…
-

How to use a windows FTP client for secure downloads
Despite FTP’s vulnerabilities, many Windows users still use FTP clients for transferring files over the Internet. If you really have to keep using that archaic file transfer protocol, at least do it securely. Here’s…
-

Uploading a 2nd file only if the 1st succeeds – using 1 trigger
Overview In our previous post, we showed you how to use two triggers to upload a second file only if the first upload succeeded. Here’s a shorter way to do it.
-

What is a key exchange?
Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in a key exchange. What’s that?
-

12 file transfer protocols for businesses
Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you can choose from. Below this list, we’ve also added brief descriptions of…
-

Can you identify the port numbers of these 12 file transfer protocols?
Most of these file transfer protocols should already be running on your network. Can you identify their respective default port numbers?
-

Meeting AES 256 encryption requirements for data in transit
Overview Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite useful. Here, we’ll show you how to enable FTPS, SFTP, HTTPS, WebDAVS,…
-

File transfers have a much bigger impact on Time-To-Market than you think
A growing number of businesses are finding it imperative to get certain products out in the market FAST. To beat extremely tight deadlines, most of them employ IT systems to accelerate business processes. Whenever…
-

What is a Cipher? | Understanding Encryption Algorithms
Overview The strength of an encryption largely depends on two components: 1) the cipher and 2) the length of the key. We already discussed key lengths in an older post. So today, let’s talk…
-

What is a digital signature?
Overview Digital signatures help enforce security during data transfers. They’re mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we’ll be talking about the basic concepts behind digital signatures, where they’re used, how…
-

Understanding hashing
Overview Hashes are essential to secure file transfers. You can find them in operations involving passwords, file integrity checks, digital signatures, digital certificate thumbprints or fingerprints, and others. But what are hashes? In this…
-

Symmetric vs asymmetric encryption
Overview: Symmetric vs. Asymmetric Encryption Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality of data while in transit. So why the need for two kinds…
-

What is an SSL File Transfer? | FTP-SSL | JSCAPE MFT Server
Overview: What is an SSL File Transfer? SSL file transfer is a term sometimes used in referring to a secure file transfer protocol known as FTPS or FTP-SSL. FTP is a network protocol used…
-

10 ways to make server to server file transfers for enterprise use
Overview Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don’t fit the bill. In this post, we’ll share some tips on how you…
-

How to achieve truly secure FTP — 7 essential tips | JSACPE
Although plain File Transfer Protocol (FTP) has been the data transfer solution of choice for several decades, it’s no longer fit for today’s business environments. With so many business processes now involving sensitive data,…
-

10 essential attributes of secure file transfer systems
Overview: Secure File Transfer Systems Normally, when people send files over the Internet, they do it through email, FTP, or cloud-based file sharing services. That’s perfectly fine if the files you send don’t contain…
