Subscribe via E-mail

Your email:
Download Now
Free Consultation
Request Demo


Managed File Transfer and Network Solutions

Current Articles | RSS Feed RSS Feed

Business Benefits of An SFTP Server



In today's data-driven world, the accuracy, integrity, speed, confidentiality, and availability of data matters a lot to businesses. That's why it's imperative for file transfer systems to be capable of meeting the highest standards in regards to those aforementioned qualities. In this post, we examine the typical SFTP server and point out what kind of benefits you'll get from it as a method for delivering business critical data.

Setting SFTP Algorithms On Your SFTP Server

sftp algorithms resized 600


In this post, we'll talk about the algorithms included in a typical SFTP server and explain their basic functions. We'll cover algorithms for key exchanges, ciphers, MACs, and compressions. After that, we'll dive into the JSCAPE MFT Server Manager Web GUI and show you where you can configure those SFTP algorithms there.

How To Set Up An SFTP Reverse Proxy

reverse proxy sftp resized 600


An SFTP reverse proxy adds another layer of security to SFTP services. In addition to SFTP's ability to encrypt data in transit and provide 2-factor authentication, an SFTP reverse proxy brings in several other security-related benefits such as hiding user credentials and the identities of your internal servers. An SFTP reverse proxy can be easy to set up and this post will show you how.

2 Ways to Generate an SFTP Private Key

01 mft server 9 server key manager resized 600


One of the major security features of SFTP is public key authentication. This method of authentication allows JSCAPE MFT Server to verify a user's identity during login by asking for a secret item only he, the user, has. That something is an SFTP private key file. But how can a user get hold of such a file?

5 Indispensable Tips For Choosing a Business SFTP FTP Server

EDI file transfer


To support both regular and sensitive data transfers, businesses typically reinforce their FTP service with a secure file transfer protocol like SFTP. But while these secure network protocols do a good job in protecting data during transmission, data-in-motion security isn't the only thing trading partners require from a file transfer system.

How to Use an SFTP Client



In this tutorial, I'm going to show you how to use an SFTP client to connect with an SFTP server and then upload and download files with it. In addition, I will talk about host keys and how they are used to verify the server's identity. Finally, I will also demonstrate how to load up a private key and take advantage of public key authentication

SFTP Simplified

sftp client server


SFTP is a secure method for transferring files between two computers. SFTP can stand for either SSH File Transfer Protocol or Secure File Transfer Protocol. This post will introduce you to the major functions of SFTP, its differences and similarities with FTP, its basic usage, and other important characteristics.

10 Ways to Make a Server to Server File Transfer Fit Enterprise Use



Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don't fit the bill. In this post, we'll share some tips on how you can enhance your server to suit the stringent requirements of the enterprise. 

Why You Need an SSH Secure File Transfer Client

sniffing ftp connection


The Internet is increasingly becoming too risky for transmitting sensitive files. Several network hacking tools are now being shared freely on the Web, making them easily accessible to professional cyber criminals and script kiddies alike. One way of protecting your files from these threats is by sending them via SFTP, a method that requires an SSH secure file transfer client.

Secure FTP Simplified

FTP transmits in plaintext


If you google the term secure FTP, most of the definitions you'll come across will fall into one of two groups: those that are just too technical and those that are simply too vague. Some, even contradicting. So if you're an average guy with a not-so-technical background, you'll be walking away with a head all tangled in arcane networking acronyms.

All Posts