
Overview In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of…
Learn More

Overview As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure…
Learn More

When users attempt to connect to your Secure File Transfer Protocol (SFTP) server for the first time, they’ll see an alert indicating…
Learn More

Overview: How to Retrieve Email Messages & Attachments In this tutorial, we’ll show you how to enable your local server to automatically…
Learn More

Overview Most US states now have their own data breach notification law. If your business operations involve the storage and transfer of…
Learn More

Overview Will Brexit have a significant impact on data transfers involving personal information? While it’s hard speculate what the impact will be,…
Learn More

Overview Results from Ponemon’s 2016 Cost of Data Breach Study show that the price of these incidents continues to rise and that…
Learn More

Overview An automated SFTP download is one of the most efficient ways of downloading data from a remote server over a secure,…
Learn More

Overview Last week, while responding to one of the tickets at our HelpDesk, I noticed that the port number used wasn’t standard.…
Learn More

Atlanta, GA, May 25, 2016 – Stonebranch, a modern workload automation solution provider that simplifies mission-critical IT business processes, and JSCAPE, a…
Learn More

Overview Although you can run AS2 over HTTPS in order to provide encryption, authentication, data integrity, and non-repudiation to your EDI exchanges,…
Learn More

Overview Over the last few months, we’ve been receiving a growing number of inquiries on how to enable support for SHA2 certificates…
Learn More

Overview Some organizations that deal with exceptionally sensitive information need to employ very stringent access restrictions to their internal networks. While a…
Learn More

Overview There are a couple of reasons why you’ll want to map file transfer server drives to Samba shares. Maybe your users…
Learn More

Overview Some time in the past, we showed our readers how to set up a managed file transfer server so that it…
Learn More

Overview The latest release of JSCAPE MFT Server (9.3) has a new way of storing all configuration and message data; one that…
Learn More

Overview In our last post,we talked about how you could get more granular when delegating administrative privileges on your MFT Server by…
Learn More

Overview Many MFT server deployments are being managed by multiple administrators. But because these admins usually have different tasks and responsibilities, there’s…
Learn More

Learn More

Overview The Trans-Pacific Partnership has drawn a tsunami of reactions both for and against it. For sure, it’s going to be a…
Learn More

Overview As of this writing, the United States and European Union are in the thick of negotiations for a new Safe Harbor…
Learn More

Overview There are two ways of exchanging EDI messages. You can do it directly or you can course it through a third…
Learn More

Overview The most widely used secure file transfer protocols, SFTP and FTPS, get their security from underlying protocols. SFTP from SSH and…
Learn More

Overview In order to conduct Electronic Data Interchange (EDI) transactions with a trading partner, businesses need a way of transmitting their EDI…
Learn More

Overview: What EDI Is Although already in existence for about 40 years, EDI is not yet as widespread as it ought to…
Learn More

This post talks about the benefits of setting up automated file synchronization between two servers and how to do it using JSCAPE…
Learn More

Overview Most industries in the US use the EDI X12 standard for electronic data interchange. So if you’re looking to perform automated…
Learn More

Overview When your server antivirus detects malware infection on a recent file upload, what would you like it to do? In our…
Learn More

Overview A couple of years ago, we wrote a 3-part tutorial showing how you could automate FTP virus scans with Kaspersky Antivirus.…
Learn More

Overview> We already taught you how to set up your MFT server to automatically delete old files and zip old files. Would…
Learn More

Despite FTP’s vulnerabilities, many Windows users still use FTP clients for transferring files over the Internet. If you really have to keep…
Learn More

SSL vs. TLS Overview SSL and TLS have many similarities. That’s why, in most software applications, they’re configured together as “SSL/TLS”. However,…
Learn More

Overview In our previous post, we showed you how to use two triggers to upload a second file only if the first…
Learn More

Overview In this tutorial, we’ll show you how to set up automated file transfers wherein a second file is uploaded only if…
Learn More

Just an infographic to help you quickly understand what a managed file transfer server does. If you found this useful, feel free…
Learn More

When you’re tasked with configuring Simple Mail Transfer Protocol (SMTP) settings to connect to an email server, you need to get two…
Learn More

Overview Passwords (even strong ones) can sometimes fall into the wrong hands. To minimize the risk of granting access to an impersonator…
Learn More

Overview The departure of Avid Life Media (Ashley Madison’s parent company) CEO Noel Biderman wasn’t the first time an executive resigned due…
Learn More

JSCAPE is pleased to announce the release of AnyClient 4.2. This release includes several new features and enhancements, highlights of which include:
Learn More

Overview Ever since amendments were made to the Federal Rules of Civil Procedure to introduce eDiscovery, litigants and litigators have been struggling…
Learn More

Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in…
Learn More

Overview The multi-step authentication system used to secure the IRS “Get Transcript” application required several pieces of data that only the taxpayers…
Learn More

Recently, we learned that the total number of accounts that may have been compromised in the IRS data breach might have exceeded…
Learn More

Overview The cost and impact of system downtime is rapidly rising. This is primarily due to businesses’ increasing dependence on data and…
Learn More

Overview FTP automation is usually achieved by employing scripts or batch files. There’s an easier way to do it.
Learn More

Overview Scheduled file transfers can help you make more efficient use of time, computing resources, and bandwidth. If you want to know…
Learn More

Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP) are both widely accepted alternatives to the enduring but highly vulnerable File…
Learn More

Overview Your ability to send and receive emails is largely due to 3 TCP protocols: SMTP, IMAP, and POP3. If you’ve got…
Learn More

Overview Several months ago, we published a tutorial crafted to help network/server administrators prepare trading partners for SFTP automation. That article lacked…
Learn More