This video tutorial demonstrates how to set up an FTPS Server using JSCAPE MFT ServerRead More
Managed File Transfer and Network Solutions
In this video, we'll show you how to automatically encrypt files uploaded to JSCAPE MFT Server.Read More
In today’s video we’ll teach you how to set up SFTP public key authentication on JSCAPE MFT Server. Public key authentication allows you to enforce 2 factor authentication to users connecting through the SFTP service.Read More
In today’s video, we’ll teach you how to use the Banned Files feature. This feature gives you the ability to block certain files from being uploaded by users.
To specify which files to block, you use what are known as regular expressions. We’ve already discussed regular expressions in a couple of blog posts, so just click the links below to know more about them.
It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more difficult once you start using the secure version of FTP, known as FTPS. In this post, we’ll talk about the problem you’ll usually encounter when your FTPS server is behind a firewall and your client is attempting to perform a file transfer using passive mode or PASV.Read More
In this quick tutorial, you'll discover an easy way to set up a failover server for your SFTP server a.k.a. SFTP active-passive high availability cluster.Read More
The days of HTTP pages on the Web appear to be numbered. Google has announced it would be labelling certain HTTP pages as "Not secure" when it releases Chrome 56 on January 2017. This is part of Google's ongoing effort to increase adoption of HTTPS. HTTPS is reinforced by SSL/TLS, making it a more secure version of HTTPRead More
Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS, SFTP, and HTTPS, data integrity/message authentication is usually achieved through a mechanism known as HMAC. In this post, we explain what HMAC is, its basic inner workings, and how it secures data transfers.Read More
In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of the most widely used file transfer protocols, FTP, fails to meet the security goals of that triad. If you're using FTP in your business operations, it's high time to find an alternative. This post introduces you to some of the top options.Read More
As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad is and how you can apply it to your B2B data transfers.Read More