In today’s video we’ll teach you how to set up SFTP public key authentication on JSCAPE MFT Server. Public key authentication allows you to enforce 2 factor authentication to users connecting through the SFTP service.Read More
Managed File Transfer and Network Solutions
In today’s video, we’ll teach you how to use the Banned Files feature. This feature gives you the ability to block certain files from being uploaded by users.
To specify which files to block, you use what are known as regular expressions. We’ve already discussed regular expressions in a couple of blog posts, so just click the links below to know more about them.
It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more difficult once you start using the secure version of FTP, known as FTPS. In this post, we’ll talk about the problem you’ll usually encounter when your FTPS server is behind a firewall and your client is attempting to perform a file transfer using passive mode or PASV.Read More
In this quick tutorial, you'll discover an easy way to set up a failover server for your SFTP server a.k.a. SFTP active-passive high availability cluster.Read More
The days of HTTP pages on the Web appear to be numbered. Google has announced it would be labelling certain HTTP pages as "Not secure" when it releases Chrome 56 on January 2017. This is part of Google's ongoing effort to increase adoption of HTTPS. HTTPS is reinforced by SSL/TLS, making it a more secure version of HTTPRead More
Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS, SFTP, and HTTPS, data integrity/message authentication is usually achieved through a mechanism known as HMAC. In this post, we explain what HMAC is, its basic inner workings, and how it secures data transfers.Read More
In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of the most widely used file transfer protocols, FTP, fails to meet the security goals of that triad. If you're using FTP in your business operations, it's high time to find an alternative. This post introduces you to some of the top options.Read More
As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad is and how you can apply it to your B2B data transfers.Read More
The first time a user connects to your SSH or SFTP server, his/her file transfer client may display an alert or notice indicating it doesn't recognize the server's fingerprint. What it's actually referring to is the server's SSH/SFTP key fingerprint, an important security feature that helps users and client applications authenticate SSH/SFTP servers. This post explains how it's used.
Most US states now have their own data breach notification law. If your business operations involve the storage and transfer of personal information, there are a couple of things you ought to know to reduce the risks and bring down the costs of compliance.Read More