Blog

How to achieve truly secure FTP — 7 essential tips | JSACPE

Although plain File Transfer Protocol (FTP) has been the data transfer solution of choice for several decades, it’s no longer fit for today’s business environments. With so many business processes now involving sensitive data, file transfer workflows are now at risk of various threats. And because plain or standard FTP is inherently plagued with serious vulnerabilities, it’s important to replace it with more secure alternatives. In this post, we’ll talk about how you can take advantage of two secure FTP options and make them even more suitable for transferring sensitive information.

Topics: Secure File Transfer, SFTP, FTPS, FTP

What is SAML? | Security Assertion Markup Language

Overview: What is SAML? Since version 8.8, JSCAPE MFT Server (now at v9.1) has already supported SAML Web SSO. Although we introduced SSO and its benefits in previous posts, we never went into the details of specific Web SSO standards like SAML and OpenID (another supported Web SSO). But in order to take advantage of any of our Web single sign-on features, you'll need to have at least some basic understanding of each of these two standards. Today, you can start with SAML or Security Assertion Markup Language.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer

Using DLP to protect credit card data - part 2

If you followed the steps in Part 1, then you should now have a DLP-enabled group. That group directory will have the capability to detect files stored in it that contain certain credit card numbers. If a member of that group attempts to download such a file, the server will prevent the download from taking place and fire a "DLP rule matched" event. In the screenshot below, a user is prevented by JSCAPE's DLP from downloading a file containing MasterCard numbers.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Secure File Transfer

The SSH/SFTP key fingerprint and its role in server authentication

When users attempt to connect to your Secure File Transfer Protocol (SFTP) server for the first time, they’ll see an alert indicating that their client doesn’t recognize the host it’s connecting to. The warning usually includes a line that shows a key fingerprint and a prompt that asks the user whether to proceed with the connection attempt or not. Here are two examples illustrating what we’re referring to.

Topics: Secure File Transfer, SFTP, key fingerprint, ssh, Authentication

What to consider when setting up DMZ's reverse proxy & firewall

There are a number of things to consider when setting up the reverse proxy and firewalls in your DMZ. These things are going to have a significant impact on the performance and security not only on your file transfers but for your entire network in general, so you really need to weigh the advantages and disadvantages of each set up before deciding how you are going to put everything together. Let's talk about it when you request a free trial.

Topics: JSCAPE MFT, Secure File Transfer, FTP, Reverse Proxy

How To Automate An SFTP File Transfer

Automated secure file transfer protocol (SFTP) file transfers are traditionally done through scripts, but there's a much easier way. In this tutorial, we'll show you how to automate SFTP file transfers without scripting a single line of code.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Tutorials, Secure File Transfer, SFTP, Triggers

Groups and their role in regulatory compliance - part 1

Overview Here's something that's particularly useful if you want to provide access control to JSCAPE MFT Server directories based on need to know and according to job responsibilities. It's called Groups. JSCAPE managed file transfer server Groups are named sets of virtual directories and file system permissions that may be assigned to multiple user accounts. You can use them to comply with certain laws and regulations like PCI-DSS, HIPAA, and SOX.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer

SCP vs. SFTP: 9 key comparisons

Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP) are both widely accepted alternatives to the enduring but highly vulnerable File Transfer Protocol (FTP). Since both protocols run on Secure Shell (SSH), IT professionals working with SSH-oriented platforms, such as Linux or UNIX, are often faced with the dilemma of choosing between the two when implementing secure file transfers. If you’re in a similar predicament, this post should help you make the right choice.

Topics: Secure File Transfer, SFTP, File transfer, SCP

8 reasons why you should use a reverse proxy in your DMZ

Overview Why use a reverse proxy? By placing a reverse proxy in your DMZ, you can move your file transfer servers to your internal network where they will be less vulnerable to attacks from the Internet. But that's just the tip of the iceberg. There are still more benefits of using a reverse proxy you might not be aware of.

Topics: JSCAPE MFT, Secure File Transfer

Why and How You Should Verify An SSH/SFTP Client Key's Fingerprint Before Using It

In one of our previous posts, we talked about the importance of authenticating an SFTP host before logging into it and how to use the host's RSA key fingerprint to carry out the authentication. The same principle applies when you import a user's client key for public key authentication. If you'd like to walk through it with an expert, request a free trial.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer, SFTP