JSCAPE MFT Server encrypted file transfer protocols like SFTP and those secured through TLS (e.g. HTTPS, FTPS, AS2, OFTP, and WebDAVS) can be configured for FIPS compliance. Since this is a function that isn't switched on by default, you might wonder if it's necessary to enable it at all.Read More
Managed File Transfer and Network Solutions
There will be times when you'll want to transfer files over a secure connection. One option is to use FTPS (FTP over SSL) which provides data-in-motion encryption through SSL (Secure Sockets Layer). When you setup an FTPS service in JSCAPE MFT Server, you'll notice that you actually have 3 modes to choose from explicit SSL, forced explicit SSL and implicit SSL.
This post was originally published on May 6, 2012 but was updated and republished on November 4, 2018.
The security of any SSL/TLS-protected connection largely depends on the client and server's choice of cipher suites. If you use file transfer protocols like HTTPS, FTPS, and AS2 but don't know what cipher suites are, you will want to read this post.Read More
Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn't it a bit early to start using the 4096-bit keys that have become increasingly available in encryption-enabled applications? It depends.Read More
Last time, we tackled the problem system administrators encounter when their passive FTP or FTPS connections have to pass through a NAT firewall or router. A similar problem can happen when you're dealing with the same type of connections and a reverse proxy. It gets even more complicated when you have to deal with both external and internal users. Let me show you how to deal with that.Read More
It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more difficult once you start using the secure version of FTP, known as FTPS. In this post, we’ll talk about the problem you’ll usually encounter when your FTPS server is behind a firewall and your client is attempting to perform a file transfer using passive mode or PASV.Read More
Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS, SFTP, and HTTPS, data integrity/message authentication is usually achieved through a mechanism known as HMAC. In this post, we explain what HMAC is, its basic inner workings, and how it secures data transfers.Read More
In our last post, we talked about the importance of applying the CIA Triad to enterprise file transfers. Interestingly, one of the most widely used file transfer protocols, FTP, fails to meet the security goals of that triad. If you're using FTP in your business operations, it's high time to find an alternative. This post introduces you to some of the top options.Read More
As one of the basic building blocks of information security, the CIA Triad is likewise a vital piece in establishing secure enterprise file transfers. In this post, we explain what the CIA Triad is and how you can apply it to your B2B data transfers.Read More