Managed File Transfer and Network Solutions

What Is A Cipher?

Posted by John Carl Villanueva on Sun, Apr 26, 2015 @ 10:56 PM


The strength of an encryption largely depends on two components: 1) the cipher and 2) the length of the key. We already discussed key lengths in an older post. So today, let's talk about the other component. 

Read More

Topics: Security, OpenPGP, SFTP, FTPS

What is a Digital Signature?

Posted by John Carl Villanueva on Thu, Mar 26, 2015 @ 06:38 PM


Digital signatures help enforce security during data transfers. They're mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we'll be talking about the basic concepts behind digital signatures, where they're used, how they work, and why they're always an integral part of highly secure file transfers.

Read More

Topics: JSCAPE MFT Server, Secure File Transfer, SFTP, FTPS, AS2

Symmetric vs Asymmetric Encryption

Posted by John Carl Villanueva on Sun, Mar 15, 2015 @ 02:35 AM


Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality of data while in transit. So why the need for two kinds of encryption? In this post, we take a closer look at the main functions of symmetric and asymmetric encryption, their strengths, their weaknesses, and why we'd prefer having both.

Read More

Topics: Security, File Transfer Clients, OpenPGP, SFTP, FTPS

What Port Does SFTP Use?

Posted by Van Glass on Mon, Jan 12, 2015 @ 07:01 PM

SFTP (SSH File Transfer Protocol), not to be confused with FTPS (Secure FTP), runs on top of the SSH (Secure Shell) protocol and by default uses port 22 for communications.  An SFTP server may however be configured to listen on a different port other than the default port.  Listening on a port other than the default port is a common tactic used to reduce the number of attacks, in particular scripted brute-force password attacks.

Read More

Topics: SFTP

Setting Up SFTP Public Key Authentication On The Command Line

Posted by John Carl Villanueva on Wed, Jan 07, 2015 @ 02:44 AM


SFTP provides an alternative method for client authentication. It's called SFTP public key authentication. This method allows users to login to your SFTP service without entering a password and is often employed for automated file transfers. In this post, we'll walk you through the process of setting up this kind of authentication on the command line. It's really easier to do this on a GUI-based interface but if you simply love doing things on the terminal, this post is for you.

Read More

Topics: JSCAPE MFT Server, Tutorials, Secure File Transfer, SFTP

How To Set Up An SFTP Reverse Proxy

Posted by John Carl Villanueva on Tue, Dec 16, 2014 @ 01:15 AM


An SFTP reverse proxy adds another layer of security to SFTP services. In addition to SFTP's ability to encrypt data in transit and provide 2-factor authentication, an SFTP reverse proxy brings in several other security-related benefits such as hiding user credentials and the identities of your internal servers. An SFTP reverse proxy can be easy to set up and this post will show you how.

Read More

Topics: JSCAPE MFT Gateway, Tutorials, Secure File Transfer, SFTP, Reverse Proxy, JSCAPE Reverse Proxy

Business Benefits Of An SFTP Server

Posted by John Carl Villanueva on Thu, Dec 11, 2014 @ 12:20 AM


In today's data-driven world, the accuracy, integrity, speed, confidentiality, and availability of data matters a lot to businesses. That's why it's imperative for file transfer systems to be capable of meeting the highest standards in regards to those aforementioned qualities. In this post, we examine the typical SFTP server and point out what kind of benefits you'll get from it as a method for delivering business critical data.

Read More

Topics: JSCAPE MFT Server, Managed File Transfer, Secure File Transfer, SFTP

Setting SFTP Algorithms On Your SFTP Server

Posted by John Carl Villanueva on Wed, Dec 10, 2014 @ 02:07 AM


In this post, we'll talk about the algorithms included in a typical SFTP server and explain their basic functions. We'll cover algorithms for key exchanges, ciphers, MACs, and compressions. After that, we'll dive into the JSCAPE MFT Server Manager Web GUI and show you where you can configure those SFTP algorithms there.

Having a basic understanding of these algorithms and knowing where to configure them will enable you to strengthen your SFTP server's security or troubleshoot certain client connection issues.

Read More

Topics: JSCAPE MFT Server, Managed File Transfer, Tutorials, Secure File Transfer, SFTP

What Is An SFTP Key?

Posted by John Carl Villanueva on Tue, Dec 09, 2014 @ 02:20 AM


What good is an encrypted data transfer if the information it protects still falls into the wrong hands in the end? SFTP is best known for its ability to encrypt data while in transit. But while data-in-motion encryption can secure confidential information as it traverses the network, encryption can't prevent an impostor from carrying out the download himself. For that purpose, you'll want your users to authenticate with the right password and the right SFTP key.



In this post, we'll talk about the role of SFTP keys (a.k.a. private keys) in the overall security of the SFTP protocol, how it works, where to use it, and other bits of information regarding this important element of SFTP.

Read More

Topics: Security, AnyClient, Secure File Transfer, SFTP

Using SFTP On The Command Line

Posted by John Carl Villanueva on Mon, Dec 08, 2014 @ 01:26 AM


Although GUI SFTP clients are more intuitive to use, some people still prefer to use SFTP through the command line. That's understandable. If you're already familiar with all the commands you need, a command line interface can be so much faster and powerful than any GUI-based counterpart. In this post, we're going to introduce you to the SFTP command line and show you how it can be quite a handy tool as long as you're willing to roll up your sleeves and get dirty.

Read More

Topics: Security, Tutorials, Secure File Transfer, SFTP

Subscribe via E-mail

Download Now
Free Consultation
Request Demo

Latest Blog Posts

What Is A Cipher?
How To Zip Old Files On Your File Transfer Server
Monitoring Reverse Proxy Services