
Following major corporate scandals, most notably the high-profile cases of Enron, WorldCom and Tyco, the United States Congress responded by enacting the…
Learn More

In the highly regulated financial services industry, it’s crucial to maintain compliance with information security standards. Doing so establishes trustworthiness, mitigates data…
Learn More

When we use Transport Layer Security (TLS), we typically do so to protect our data while transmitting it over the network and…
Learn More

When you transfer documents as part of business operations, security is crucial. The growing volume of sensitive information involved in these activities…
Learn More

Multi-factor authentication (MFA) is your file transfer systems’ first line of defense. With phishing attacks and compromised credentials being two of the…
Learn More

What is Single Sign-On (SSO)?
Learn More

When you’re troubleshooting connectivity issues between Secure Shell (SSH)/Secure File Transfer Protocol (SFTP) clients and servers, it pays to inspect the error…
Learn More

Why do some organizations excel in protecting their sensitive data during file transfers while others fall prey to cyber threats? What constitutes…
Learn More

Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) are two cryptographic software tools that enable data encryption, authentication, and integrity. These…
Learn More

Overview How do you strengthen a server’s user authentication system? Well, one solution would be to add another authentication method. Most servers…
Learn More
This custom trigger action performs a virus scan against a directory using Avastanti-virus software. Downloads Source code and build instructions
Learn More
This custom trigger action performs a virus scan against a directory using Kaspersky anti-virus software. Downloads Source code and build instructions
Learn More
This custom trigger action updates the virus database definitions using Kaspersky anti-virus software. Downloads Source code and build instructions
Learn More
This custom trigger action performs a virus scan against a file using Kaspersky anti-virus software. Downloads Source code and build instructions
Learn More
This custom trigger action performs a virus scan against a file using Avast anti-virus software. Downloads Source code and build instructions
Learn More

Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn’t it a bit early to start…
Learn More

When users attempt to connect to your Secure File Transfer Protocol (SFTP) server for the first time, they’ll see an alert indicating…
Learn More

When you’re tasked with configuring Simple Mail Transfer Protocol (SMTP) settings to connect to an email server, you need to get two…
Learn More

Overview Client certificate authentication is very suitable for highly secure HTTPS connections. But for this type of authentication to work, the server…
Learn More

In our previous post, we discussed what a digital certificate is. But how do digital certificates work? Today, we will give you…
Learn More

Overview: DSA vs. RSA During the process of generating server keys, client keys, or PGP keys in the JSCAPE MFT Server Manager,…
Learn More

Overview A lot of people who often send files love FTP. The File Transfer Protocol allows users to transmit volumes of files…
Learn More