Subscribe via E-mail

Your email:
Download Now
Free Consultation
Request Demo

Blog

Managed File Transfer and Network Solutions

Current Articles | RSS Feed RSS Feed

What is OpenID?

  
  
  
  
  
openid rp op resized 600

Overview

Web SSO support comes to JSCAPE MFT Server in the form of two widely accepted standards: OpenID and SAML. Earlier this month, we already talked about SAML. So now it's time to get acquainted with OpenID.

What is SAML?

  
  
  
  
  
assertion authentication

Overview

The latest version of JSCAPE MFT Server (8.8) already supports SAML Web SSO. Although we introduced SSO and its benefits in previous posts, we never went into the details of specific Web SSO standards like SAML and OpenID (also supported by 8.8). But in order to take advantage of any of our Web single sign-on features, you'll need to have at least some basic understanding of each of these two standards. Today, you can start with SAML.

How To Do an iPad or iPhone File Transfer

  
  
  
  
  
add new https service

Overview

In this tutorial, I'll show you how to carry out file transfers between an iPhone or iPad and JSCAPE MFT Server. This capability is ideal for organizations who have adopted some form of BYOD policy and want to establish secure backups and file transfers between iOS mobile devices and a company-owned server. 

Redefining the FTP Server

  
  
  
  
  
man in the middle attack ftp

Overview

Your perception of an FTP server may be in need of an overhaul and you probably need to know why.

Securing HIPAA EDI Transactions with AS2

  
  
  
  
  
transaction without edi

Overview

One of the main goals of the Health Insurance Portability and Accountability Act (HIPAA) is to improve efficiency in the US health care industry. To achieve this, HIPAA mandates the use of electronic data interchange (EDI) in health care transactions and requires HIPAA covered entities to adopt national standards when implementing EDI.

Protecting FTP Passwords from Brute Force Attacks

  
  
  
  
  
ftp brute force

"Always use strong passwords." - You probably don't pay too much attention to this advice, do you? A lot of people don't either. That's why brute force is still one of the favorite techniques for breaking into any password-protected system, including FTP servers. It's really not very difficult to carry out. Let me show you.  

How to Detect Rogue FTP Servers on your Network

  
  
  
  
  
built in ftp server in Mac resized 600

Overview

Rogue FTP servers can be a menace. Not only do they pose a serious threat to company privacy, they can also stand in the way of regulatory compliance. In this post, you'll learn where these servers come from, what specific dangers accompany them, and how they can be detected.

Countering Packet Sniffers Using Encrypted FTP

  
  
  
  
  
packet sniffing in a hub resized 600

Overview

A lot of people who often send files just love FTP. The File Transfer Protocol allows users to transmit volumes of files over the Internet through uncomplicated FTP clients, some of which are already built-in in the two popular operating systems, Windows and Mac OS X. Sadly, this well-loved technology is not very secure. That's why people who craft regulations like PCI DSS are wary of it. They know that an attacker armed with a packet sniffer can easily obtain usernames and passwords just by sniffing an FTP connection. 

Protecting Your File Transfer Service from Internal Threats

  
  
  
  
  
man in the middle ftp resized 600

Overview

Every year since 2010, Ponemon Institute conducts a research entitled "Cost of Cyber Crime Study". One of the main goals of the study is to quantify the economic impact of cyber attacks. This information is meant to help organizations determine the appropriate capital investment for countering these attacks or minimizing their impact. 

Considerations When Setting Up Your DMZ's Reverse Proxy and Firewall

  
  
  
  
  
single firewall architecture resized 600

There are a number of things to consider when setting up the reverse proxy and firewalls in your DMZ. These things are going to have a significant impact on the performance and security not only on your file transfers but for your entire network in general, so you really need to weigh the advantages and disadvantages of each set up before deciding how you are going to put everything together. 

All Posts