Blog

What is an SFTP client & how do i use one?

Overview: How to Use an SFTP Client In this tutorial, I'm going to show you how to use an SFTP client to connect with an SFTP server and then upload and download files with it. In addition, I will talk about host keys and how they are used to verify the server's identity. Finally, I will also demonstrate how to load up a private key and take advantage of public key authentication.

Topics: File Transfer Clients, Tutorials, Secure File Transfer, SFTP

SFTP simplified

Overview SFTP is a secure method for transferring files between two computers. SFTP can stand for either SSH File Transfer Protocol or Secure File Transfer Protocol. This post will introduce you to the major functions of SFTP, its differences and similarities with FTP, its basic usage, and other important characteristics.

Topics: Secure File Transfer, SFTP, FTP

10 ways to make server to server file transfers for enterprise use

Overview Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don't fit the bill. In this post, we'll share some tips on how you can enhance your server to suit the stringent requirements of the enterprise.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Secure File Transfer, SFTP, Triggers, FTPS, AS2

Redefining the FTP server

Overview Your perception of an FTP server may be in need of an overhaul and you probably need to know why.

Topics: JSCAPE MFT, Secure File Transfer, FTP

Why your business needs an SSH secure file transfer client

Once the crooks have obtained our login credentials, they can just simply login to our FTP server and grab whatever files they find.

Topics: File Transfer Clients, Secure File Transfer, SFTP

Securing HIPAA EDI transactions with AS2

Overview One of the main goals of the Health Insurance Portability and Accontability Act (HIPAA) is to improve efficiency in the US health care industry. To achieve this, HIPAA mandates the use of electronic data interchange (EDI) in health care transactions and requires HIPAA covered entities to adopt national standards when implementing EDI.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Secure File Transfer, AS2

Laws that could impact your choice of file transfer software

Overview Choosing a file transfer software might seem like a trivial exercise. Any application capable of delivering files to your intended recipient should fit the bill, right? Well, not all the time. If your company belongs to the healthcare or financial services industry, is publicly traded, or handles credit card information, then there are a couple of security requirements you need to take into consideration.

Topics: JSCAPE MFT, Secure File Transfer, FTP

Exploring use cases for managed file transfer

Overview One thing we often discover when talking with clients is that many of their company's file sharing tasks are actually accomplished using a mishmash of solutions. Some employees send files through email. Others use FTP. Some subscribe to cloud-based file sharing services like DropBox and Google Drive. And still others rely on specialized methods like custom scripts or programs.

Topics: Ad-Hoc File Transfers, Managed File Transfer, Business Process Automation, Secure File Transfer

How to achieve truly secure FTP — 7 essential tips | JSACPE

Although plain File Transfer Protocol (FTP) has been the data transfer solution of choice for several decades, it’s no longer fit for today’s business environments. With so many business processes now involving sensitive data, file transfer workflows are now at risk of various threats. And because plain or standard FTP is inherently plagued with serious vulnerabilities, it’s important to replace it with more secure alternatives. In this post, we’ll talk about how you can take advantage of two secure FTP options and make them even more suitable for transferring sensitive information.

Topics: Secure File Transfer, SFTP, FTPS, FTP

How secure mobile file storage & sharing refines your BYOD strategy

Overview Pretty soon, your business will have to adopt some form of BYOD policy. That policy is bound to include several provisions for securing company-owned data that may have found their way into your employees' personal mobile devices. Among many others, you'll also need to establish guidelines for secure file transfers, storage, and sharing in order to protect that data.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer