Recently, we learned that the total number of accounts that may have been compromised in the IRS data breach might have exceeded 330,000. That alone's already more than twice the original estimates when the breach was first disclosed in May. But aside from the growing numbers, there are a couple more details that really stand out.
Topics:
News,
Secure File Transfer
Overview The cost and impact of system downtime is rapidly rising. This is primarily due to businesses' increasing dependence on data and technology. In the past, if a server went down, people simply reverted to manual methods. Or, because transactions weren't as fast and voluminous back then, they simply waited until the service would go back up again. Could you imagine dealing with network downtime now? Many large enterprises can't. Here are 5 reasons explaining the impact of system downtime.
Topics:
JSCAPE MFT
Overview FTP automation is usually achieved by employing scripts or batch files. There's an easier way to do it.
Topics:
JSCAPE MFT,
Business Process Automation,
Triggers,
FTP
Overview Scheduled file transfers can help you make more efficient use of time, computing resources, and bandwidth. If you want to know how to set one up, check out this post.
Topics:
JSCAPE MFT,
Managed File Transfer,
Business Process Automation,
Triggers
Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP) are both widely accepted alternatives to the enduring but highly vulnerable File Transfer Protocol (FTP). Since both protocols run on Secure Shell (SSH), IT professionals working with SSH-oriented platforms, such as Linux or UNIX, are often faced with the dilemma of choosing between the two when implementing secure file transfers. If you’re in a similar predicament, this post should help you make the right choice.
Topics:
Secure File Transfer,
SFTP,
File transfer,
SCP
Overview Your ability to send and receive emails is largely due to 3 TCP protocols: SMTP, IMAP, and POP3. If you've got a couple of minutes to spare, now's a good time to know what they are and how they differ from one another.
Topics:
Secure File Transfer,
FTP
Overview Several months ago, we published a tutorial crafted to help network/server administrators prepare trading partners for SFTP automation. That article lacked one important feature found in SFTP - public key authentication. So today, we've devoted one full tutorial that focuses on that.
Topics:
JSCAPE MFT,
Managed File Transfer,
Business Process Automation,
Tutorials,
Secure File Transfer,
SFTP
While using SFTP on the command line, there might be instances when you'll want to upload or download an entire directory and all the the files and subdirectories underneath it. To accomplish that, you'll need the recursive argument -r.
Topics:
SFTP
Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you can choose from. Below this list, we've also added brief descriptions of these data transfer types to make your choice easier. FTP (File Transfer Protocol) HTTP (Hypertext Transfer Protocol) FTPS (FTP over SSL) HTTPS (HTTP over SSL) SFTP (SSH File Transfer Protocol) SCP (Secure Copy) WebDAV (Web Distributed Authoring and Versioning) WebDAVS TFTP (Trivial File Transfer Protocol) AS2 (Applicability Statement 2) OFTP (Odette File Transfer Protocol) AFTP (Accelerated File Transfer Protocol)
Topics:
Secure File Transfer,
SFTP,
FTPS,
Accelerated File Transfer,
transfer protocols