Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) are two cryptographic software tools that enable data encryption, authentication, and integrity. These tools primarily secure email communications and transfer files. In the case of the latter, PGP and GPG can be particularly useful in providing data-in-motion security for unencrypted file transfer protocols like FTP and HTTP. They also provide data-at-rest encryption for files stored in a file transfer server.Read More
As 2023 comes to a close, JSCAPE is excited to announce more integrations for MFT Server and MFTaaS, as well as a wider variety of protocols for MFTaaS. With this update, easily connect to more of your existing solutions while maintaining a strong security posture.
Topics: JSCAPE MFT
JSCAPE 2023.1 | Managed File Transfer as a Service (MFTaaS)
JSCAPE is now available in SaaS, expanding the choices of environments in which to deploy the solution: on-premises, private cloud, hybrid or SaaS. This SaaS solution (also known as Managed-File-Transfer-as-a-Service or MFTaaS) is perfect for organizations that have limited IT bandwidth, limited office space, security or compliance concerns or fully remote employees – especially those that want to reduce their burden in managing and troubleshooting their MFT solution.Read More
Topics: JSCAPE MFT
As one of the easiest-to-use managed file transfer solutions available, JSCAPE MFT is able to support a variety of users, including those that need to work using languages other than English.Read More
Topics: JSCAPE MFT
In response to security incidents which have impacted other managed file transfer (MFT) providers over the past year, Redwood has significantly increased its security posture across all File Transfer products.Read More
Topics: Managed File Transfer
Managed File Transfer (MFT) has become an essential component of secure data exchange for businesses. Whether you are transferring sensitive financial information, confidential customer data, or critical intellectual property, selecting the right MFT solution is crucial. The security of your data and the trustworthiness of the solution are paramount considerations. Given recent breaches that have affected several MFT solutions, we will discuss important security criteria that should be considered.Read More
Overview: Forward Proxy vs. Reverse Proxy
We've talked about reverse proxy servers and how they can be good at protecting the servers in your internal network. Lately, however, we've realized that some people think we're talking about forward proxy servers or that the two are the same, but they're not. This post will explain the differences between forward and reverse proxy use cases.Read More
Automated SFTP file transfers are traditionally done through scripts, but there's a much easier way. In this tutorial, we'll show you how to automate SFTP file transfers without scripting a single line of code.Read More
In an earlier quickstart guide to setting up an AS2 server, we featured a manual method for sending EDI messages. Because EDI transactions are best carried out automatically, we thought it would be a good idea to show you how to implement real-time transactions on the same solution we used in that post.
AS2 (applicability statement 2) uses public keys and private keys to encrypt files being transferred between IP addresses. With AS2, security, authentication, message integrity and privacy are ensured with encryption, digital certificates and nonrepudiation techniques. AS2 provides greater security for your EDI data than standard FTP, supporting synchronous and asynchronous MDN (message disposition notification) and digital signatures.
Plus, with JSCAPE's AS2 server you can send files regardless of file size and content type.Read More
In this tutorial, we'll walk you through the basic steps of how to set up and configure an AS2 server.
AS2 uses public keys and private keys to encrypt/decrypt file transfers, strengthening security around sensitive documents and information. While AS1 relied on SMTP, AS2 uses S/MIME and HTTP/S to move data between IP addresses. With AS2, security, authentication, message integrity and privacy are ensured with encryption, digital certificates and nonrepudiation techniques.
Below are the initial steps that will eventually allow you to carry out EDI transactions with an increasing number of trading partners already using this popular B2B file transfer protocol.Read More