JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

Using DLP to protect credit card data – part 3

Words by

John Carl Villanueva

Applying OpenPGP encryption to a file containing credit card numbers In Part 1, we showed you how to configure DLP on a group directory in order to detect uploaded files that contained credit card numbers. Then in Part 2, we laid out the steps for sending an automatic email notification whenever such files were detected.…

Published in:

Blog

/

Business Process Automation, JSCAPE MFT, Managed File Transfer, Secure File Transfer

Applying OpenPGP encryption to a file containing credit card numbers

In Part 1, we showed you how to configure DLP on a group directory in order to detect uploaded files that contained credit card numbers. Then in Part 2, we laid out the steps for sending an automatic email notification whenever such files were detected. This time, we’re going to teach you how to protect those files using OpenPGP encryption.

If you prefer to watch a video version of this blog post, click play below. Otherwise, please proceed.

First, let me explain why we need to go through this “encryption step”. It would seem totally unnecessary considering that you already know how to configure JSCAPE MFT Server to “deny all access” once a DLP match is found.

Well, you really can’t be too careful with sensitive data these days. Identity thieves are getting more skilled at breaking into IT systems. And so if they couldn’t get to your data through a file transfer client, they certainly could try other options. Regardless of what option they take, the moment they are able to hack into your managed file transfer server and gain access to the file in question, they could easily obtain the information they need.

That’s going to be easy for them because, most likely, your file is going to be in plaintext. They could simply copy the file and open it in their own computer using the needed software application.

For example, if the file in question is a .doc, then all they’ll need is MS Word, OpenOffice, or any word processor that can open .doc files. If the file is .txt, then they’ll just need a text editor. And so on and so forth.

So to prevent them from viewing the contents of the file even if they are able to somehow get hold of the file itself, the best solution would be to encrypt the file. This would render the file unreadable to those who don’t have the required decryption key.

This is how you do it in JSCAPE MFT Server.

pgp_encrypt_credit_card_data_during_file_upload

First you need to generate an encyption key. In the main screen of your JSCAPE managed file transfer server Manager, navigate to Sever > Key Manager.

3-01-server-key-manager

Next, go to the PGP Keys tab and click the Generate button.

3-02-generate-pgp-keys

Assign a person’s name to the PGP key (This might be the same person whom you’ve set the server to notify regarding the DLP match). Enter that person’s email address and then select both a key algorithm (DSA or RSA) and a suitable key length. For some insights on choosing key lengths, read Choosing Key Lengths For Encrypted File Transfers.

3-03-generate-pgp-key

After you click OK, your newly created key will be added to the list of PGP keys.

3-04-pgp-key

Now, go back to the Triggers module so you can add PGP encryption to the trigger actions of the “Credit card numbers detected” trigger you created earlier. Select the trigger and click Edit.

3-05-edit-mft-server-trigger

Click Next on each succeeding screen until you arrive at the list of Trigger Actions for that particular trigger. Click the Add button.

3-06-add-mft-server-trigger-action

Select PGP Encrypt File from the Action drop-down list.

3-07-pgp-encrypt-action

Enter %LocalPath% into the File field, and select the PGP encryption key you created just recently.

3-08-pgp-encrypt-action-parameters

This is actually going to create a PGP-encrypted copy of the original file. Of course, the original file will still be vulnerable to attacks. To delete the original file and just leave the PGP-encrypted copy, just tick the the Delete Source check box.

After clicking OK, you’ll see you’re newly created Trigger Action (PGP Encrypt File) placed under the Trigger Action you created earlier (Send Email). This means, the email notification trigger action will be performed before the PGP encryption.

3-09-new-trigger-actions-mft-server

Click OK until you reach your domain’s main screen. Again, you have to click Apply on that screen for the changes to take effect.

From this point onward, every file a user attempts to download from this group directory will be scanned for MasterCard numbers by the Server’s DLP feature. Once a DLP match occurs, an email notification will be sent to the intendend recipient. The server will then create a copy of the file in question, encrypt that copy, and then delete the original file, leaving the PGP-encrypted copy in its place.

Note that the server will not be encrypting the entire group directory. It won’t necessarily encrypt all uploaded files either. Rather, only those files that have DLP matches are going to be encrypted. This is actually a cost-saving feature because encryption can considerably increase a file’s size. If you encrypt everything, including non-sensitive files, you’ll run out of disk space in no time.

Another important thing to note is that the server will likewise prevent a user from downloading any file located in a DLP-protected directory, regardless whether that file has DLP-matching content or not, if that directory has not yet been indexed. Indexing settings can be configured in Settings > Search Index.

So, when a user attempts to download a file that has not yet been indexed, the server will unconditionally block that download and then index the file. Once the file has been indexed, the server will be able to determine whether the file contains DLP-matching content or not. In turn, the server will be able to take appropriate action (i.e., deny or allow) on all succeeding download attempts on the same file.

Summary

We’ve covered a lot of ground here. If you’ve read the entire article from Part 1 through Part 3, then you should now know why you would need to detect credit card information in uploaded files using DLP. You should also now be able to:

  • Create a DLP rule;

  • Notify a person through email once a DLP match on a file occurs; and

  • Enable your MFT server to perform selective auto-encryption on certain uploaded files.

Get Started Now

Would you like to try an FTP server that allows you to add DLP rules, send out email notifications, and PGP-encrypt sensitive files? Try the free, fully-functional evaluation edition of JSCAPE MFT Server. It supports FTP, FTPS, SFTP, WebDAV, OFTP, AS2, HTTP, HTTPS, and other file transfer protocols.

Download JSCAPE MFT Server Trial

You might also want to read:

How To Set Up a Server To Server File Transfer

OFTP (Odette File Transfer Protocol) – Simplified

How To Send Large Files Through Email

 

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings