Blog

What is a key exchange?

Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in a key exchange. What's that?

Topics: Secure File Transfer, SFTP, FTPS, key exchange

Understanding the limitation of IRS' "Get transcript" Multi-Step authentication

Overview The multi-step authentication system used to secure the IRS "Get Transcript" application required several pieces of data that only the taxpayers could have known. But even that wasn't strong enough to prevent the recent data breach. That's because the system had one serious limitation.

Topics: News, Secure File Transfer

A key takeaway from the IRS data breach

Recently, we learned that the total number of accounts that may have been compromised in the IRS data breach might have exceeded 330,000. That alone's already more than twice the original estimates when the breach was first disclosed in May. But aside from the growing numbers, there are a couple more details that really stand out.

Topics: News, Secure File Transfer

The impact of system downtime - 5 consequences

Overview The cost and impact of system downtime is rapidly rising. This is primarily due to businesses' increasing dependence on data and technology. In the past, if a server went down, people simply reverted to manual methods. Or, because transactions weren't as fast and voluminous back then, they simply waited until the service would go back up again. Could you imagine dealing with network downtime now? Many large enterprises can't. Here are 5 reasons explaining the impact of system downtime.

Topics: JSCAPE MFT

FTP automation without using scripts

Overview FTP automation is usually achieved by employing scripts or batch files. There's an easier way to do it.

Topics: JSCAPE MFT, Business Process Automation, Triggers, FTP

Benefits of a scheduled file transfer and how to set one up

Overview Scheduled file transfers can help you make more efficient use of time, computing resources, and bandwidth. If you want to know how to set one up, check out this post.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Triggers

SMTP vs IMAP vs POP3 - knowing the difference

Overview Your ability to send and receive emails is largely due to 3 TCP protocols: SMTP, IMAP, and POP3. If you've got a couple of minutes to spare, now's a good time to know what they are and how they differ from one another.

Topics: Secure File Transfer, FTP

How to use public key authentication with partners

Overview Several months ago, we published a tutorial crafted to help network/server administrators prepare trading partners for SFTP automation. That article lacked one important feature found in SFTP - public key authentication. So today, we've devoted one full tutorial that focuses on that.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Tutorials, Secure File Transfer, SFTP

Using sftp -r

While using SFTP on the command line, there might be instances when you'll want to upload or download an entire directory and all the the files and subdirectories underneath it. To accomplish that, you'll need the recursive argument -r.

Topics: SFTP

12 file transfer protocols for businesses

Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you can choose from. Below this list, we've also added brief descriptions of these data transfer types to make your choice easier. FTP (File Transfer Protocol) HTTP (Hypertext Transfer Protocol) FTPS (FTP over SSL) HTTPS (HTTP over SSL) SFTP (SSH File Transfer Protocol) SCP (Secure Copy) WebDAV (Web Distributed Authoring and Versioning) WebDAVS TFTP (Trivial File Transfer Protocol) AS2 (Applicability Statement 2) OFTP (Odette File Transfer Protocol) AFTP (Accelerated File Transfer Protocol)

Topics: Secure File Transfer, SFTP, FTPS, Accelerated File Transfer, transfer protocols