Blog

Using Tags To Restrict Administrative Access to Certain Data In Your MFT Server

Overview

In our last post, we talked about how you could get more granular when delegating administrative privileges on your MFT Server by using what we call Administrative Roles. Today, we teach you how to get even more granular by employing Administrative Tags.

 

 

 

Topics: JSCAPE MFT, Managed File Transfer, Tutorials, Secure File Transfer

Get More Granular When Delegating Admin Privileges On Your MFT Server

Overview

Many MFT server deployments are being managed by multiple administrators. But because these admins usually have different tasks and responsibilities, there's been a growing clamor for greater granularity when delegating admin privileges. That granularity has finally arrived.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer

Key Provisions of the Trans-Pacific Partnership | JSCAPE

Overview

The Trans-Pacific Partnership has drawn a tsunami of reactions both for and against it. For sure, it's going to be a game changer in global trade. But how does it concern us?

Business transactions are now accompanied by massive data exchanges. It's thus expected for the agreement to tackle the conduct of those data exchanges as well. In this post, we take a look at the agreement's provisions on data transfers and try to understand how they might affect current practices.

Topics: News, JSCAPE MFT, Secure File Transfer

SSL vs SSH - A Not-So-Technical Comparison

Overview

The most widely used secure file transfer protocols, SFTP and FTPS, get their security from underlying protocols. SFTP from SSH and FTPS from SSL. Let's compare the two.

Topics: Secure File Transfer, SFTP, FTPS

Adding Email Notification To A File Transfer Server Antivirus Upload Scan

Overview

When your server antivirus detects malware infection on a recent file upload, what would you like it to do? In our case, we prefer it to email us an alert notification. That way, we wouldn't have to check the logs periodically to see if a virus was found. This post details how we'd achieve that.

Topics: JSCAPE MFT, Managed File Transfer, Tutorials, Secure File Transfer

Automating An Upload Virus Scan Using A Windows File Transfer Server And Kaspersky

Overview

A couple of years ago, we wrote a 3-part tutorial showing how you could automate FTP virus scans with Kaspersky Antivirus. That article, which was written based on a Linux environment, is in need of an update. But before we make changes there, here's a similar article that Windows users should find suited for them.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Tutorials, Secure File Transfer

How To Use A Windows FTP Client For Secure Downloads

Despite FTP's vulnerabilities, many Windows users still use FTP clients for transferring files over the Internet. If you really have to keep using that archaic file transfer protocol, at least do it securely. Here's what we suggest when using a Windows FTP Client for secure downloads.

Topics: JSCAPE MFT, Secure File Transfer, SFTP, FTPS, FTP

SSL vs. TLS | Knowing the Difference Between SSL and TLS

SSL vs. TLS Overview

SSL and TLS have many similarities. That's why, in most software applications, they're configured together as "SSL/TLS". However, there are several differences between SSL and TLS well, which is what we're going to talk about now.

Topics: Secure File Transfer

Demystifying SMTP ports: When to use port 25, 587, 465 or 2525

When you’re tasked with configuring Simple Mail Transfer Protocol (SMTP) settings to connect to an email server, you need to get two main values right. Otherwise, your email delivery processes will fail. These values are the endpoint’s domain name or IP address and its port number. Getting the correct domain name or IP address is usually straightforward. The SMTP port number? Not always.

Topics: Secure File Transfer, FTP, SMTP ports, port 587, port 25

What Is Two Factor (2 Step) Authentication? | JSCAPE

Overview

Passwords (even strong ones) can sometimes fall into the wrong hands. To minimize the risk of granting access to an impersonator who might have managed to obtain someone else's username and password, you might need to employ what is known as two factor authentication (2FA). What is it?

Topics: Secure File Transfer, SFTP