
File transfer environments, with their many moving parts and frequent handling of sensitive data, require multiple layers of security. Here are 11…
Learn More

HTTPS file transfers combine user-friendly file management with enterprise-level security. Supported by SSL/TLS encryption, they ensure data confidentiality, authentication, and integrity. No…
Learn More

Multi-factor authentication (MFA) is your file transfer systems’ first line of defense. With phishing attacks and compromised credentials being two of the…
Learn More

Any organization that exchanges sensitive files with another party through the internet or any wide area network should carry out those exchanges…
Learn More

When you’re troubleshooting connectivity issues between Secure Shell (SSH)/Secure File Transfer Protocol (SFTP) clients and servers, it pays to inspect the error…
Learn More

When your business processes involve large files that need to cross the internet in the fastest way possible, look beyond traditional methods…
Learn More

Why do some organizations excel in protecting their sensitive data during file transfers while others fall prey to cyber threats? What constitutes…
Learn More

The file transfer software options available today aren’t all created equal. Evaluating solutions based on your organization’s needs goes beyond splitting hairs…
Learn More

In an era dominated by digital transformation and the exchange of sensitive data, the security and efficiency of file transfers have become…
Learn More

Managed file transfer (MFT) is an essential component of secure data exchange for businesses and enterprise organizations. Whether you are transferring sensitive…
Learn More

Automated secure file transfer protocol (SFTP) file transfers are traditionally done through scripts, but there’s a much easier way. In this tutorial,…
Learn More

Overview: What Is AES? First adopted by the U.S. government to protect classified information, Advanced Encryption Standard (AES) has long gained global…
Learn More

Let’s say you have trading partners who can only transfer files to you via SFTP. Incidentally, you also happen to have an…
Learn More

JSCAPE MFT Server makes it easy to strengthen secure file transfers with OpenPGP encryption and decryption. But before you can protect your…
Learn More

An Overview of HMAC Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity…
Learn More

When I first read about HSTS, my first reaction was, “What’s this? A replacement for HTTPS? Considering the ubiquity of HTTPS, shouldn’t…
Learn More

As you scout for the most cost-effective way of transmitting files with your business units and trading partners, among the many file…
Learn More

Overview How do you strengthen a server’s user authentication system? Well, one solution would be to add another authentication method. Most servers…
Learn More

Overview People who use SSL/TLS to secure their online transactions/file transfers are mostly only familiar with two of its security functions: 1.…
Learn More

Because Microsoft Windows doesn’t have a secure file transfer protocol server built in, we’ve put together a simple and easy-to-follow tutorial on…
Learn More

Overview [Last updated: December 2020] Malicious insiders and careless insiders are increasingly posing serious risks to file transfer systems. If nothing is…
Learn More

Businesses that deal with large files such as high-definition videos, 3D CAD models, and so on, sometimes need to transfer these files…
Learn More

Overview Let’s say you want to install an SSH FTP server (SFTP) on a Linux machine devoid of a GUI. However, after…
Learn More

Files you upload to an Amazon S3 trading partner through JSCAPE MFT Server are normally stored in plaintext. If you want to…
Learn More

AS2 (Applicability Statement 2) is a secure file transfer protocol used for automated, server-to-server transfers. It ensures message integrity, confidentiality, and reliability,…
Learn More

In one of our previous posts, we talked about the importance of authenticating an SFTP host before logging into it and how…
Learn More

When it comes to moving files across networks, not many protocols are as established as File Transfer Protocol (FTP), File Transfer Protocol…
Learn More

To prevent confidential data from leaking out of your organization or getting stolen, your cyber security efforts have to be aimed at…
Learn More

In this post, we show you how to configure a client certificate and how to simplify certificate management.
Learn More

As promised in our last post, we’re going to talk about JSCAPE MFT Server and why it’s the perfect choice for an…
Learn More

So you’ve already discovered the benefits of AS2 and are now convinced you need one for your business. You might now be…
Learn More

Last time, we talked about the benefits of AS2 and why you might need it for your business. In order to transact…
Learn More

To ensure non-repudiation of AS2 receipts, you need to affix digital signatures to your AS2 Message Disposition Notifications or MDNs. We’ll teach…
Learn More

Overview If your AS2 connection already runs over HTTPS, your EDI messages should already be protected by the data-in-motion encryption that comes…
Learn More

It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more complicated once you…
Learn More

In this post, we’ll walk you through the steps of installing the JSCAPE MFT Gateway Agent on a Windows machine and adding…
Learn More

In this post, we’ll walk you through the steps of installing the JSCAPE MFT Gateway Agent on a Linux machine and adding…
Learn More

JSCAPE MFT Server’s Network Storage module (formerly known as Reverse Proxy) makes it possible to extend the storage of your managed file…
Learn More

Overview Today, we’ll teach you how to set up a HTTPS to HTTP reverse proxy. This service can come in handy if…
Learn More

JSCAPE MFT Server’s Network Storage module (formerly known as Reverse Proxy) allows you to utilize various remote services and storage solutions as…
Learn More

Overview An SFTP reverse proxy adds another layer of security to SFTP services. In addition to SFTP’s ability to encrypt data in…
Learn More

For today’s MFT security tip, let’s talk about using digital certificates for server authentication. Ideally, when your users attempt to connect to…
Learn More

For today’s MFT security tip, let’s talk about replacing default admin passwords. Most software applications come with default admin passwords. You normally…
Learn More

For today’s security tip, we talk about data-at-rest encryption. When your users upload files to your file transfer server, those files are…
Learn More

Overview In order to keep transactions secure, you and your trading partners likely use SFTP and other encrypted protocols for your automated…
Learn More

In today’s security tip, we talk about including uppercase and lowercase characters in passwords. This is related to our previous video about…
Learn More

It’s time for another MFT Security tip. Today, let’s talk about long passwords and why you would want to require your users…
Learn More

Overview In this post, we’ll discuss the algorithms in a typical SFTP server and explain their basic functions. We’ll cover algorithms for…
Learn More

Last week, we published the blog post ‘The Ultimate Guide To Hardening Your Secure File Transfer Server‘, where we shared several tips…
Learn More