
Overview There are a couple of reasons why you’ll want to map file transfer server drives to Samba shares. Maybe your users…
Learn More

Overview The most widely used secure file transfer protocols, SFTP and FTPS, get their security from underlying protocols. SFTP from SSH and…
Learn More

Overview In order to conduct Electronic Data Interchange (EDI) transactions with a trading partner, businesses need a way of transmitting their EDI…
Learn More

Despite FTP’s vulnerabilities, many Windows users still use FTP clients for transferring files over the Internet. If you really have to keep…
Learn More

Overview In our previous post, we showed you how to use two triggers to upload a second file only if the first…
Learn More

Overview Passwords (even strong ones) can sometimes fall into the wrong hands. To minimize the risk of granting access to an impersonator…
Learn More

JSCAPE is pleased to announce the release of AnyClient 4.2. This release includes several new features and enhancements, highlights of which include:
Learn More

Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in…
Learn More

Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP) are both widely accepted alternatives to the enduring but highly vulnerable File…
Learn More

Overview Several months ago, we published a tutorial crafted to help network/server administrators prepare trading partners for SFTP automation. That article lacked…
Learn More

While using SFTP on the command line, there might be instances when you’ll want to upload or download an entire directory and…
Learn More

Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you…
Learn More

Most of these file transfer protocols should already be running on your network. Can you identify their respective default port numbers?
Learn More

Overview SCP (Secure Copy) is a quick, easy way to transfer files securely between two Linux machines. If you don’t mind using…
Learn More

Overview Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite…
Learn More

A growing number of businesses are finding it imperative to get certain products out in the market FAST. To beat extremely tight…
Learn More

Overview The strength of an encryption largely depends on two components: 1) the cipher and 2) the length of the key. We…
Learn More

Overview Digital signatures help enforce security during data transfers. They’re mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we’ll be…
Learn More

Overview: Symmetric vs. Asymmetric Encryption Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality…
Learn More

JSCAPE is pleased to announce the release of updated versions of it’s Secure FTP Factory (9.2), Secure iNet Factory (9.3) and SSH…
Learn More

Overview In today’s data-driven world, the accuracy, integrity, speed, confidentiality, and availability of data matters a lot to businesses. That’s why it’s…
Learn More

Used at the start of a Secure File Transfer Protocol (SFTP) session, an SFTP key is a type of credential you load…
Learn More

Overview: SFTP Command Line Although GUI SFTP file transfer clients are more intuitive to use, some people still prefer to use SFTP…
Learn More

Overview To support both regular and sensitive data transfers, businesses typically reinforce their FTP service with a secure file transfer protocol like…
Learn More

For enterprise organizations, sharing sensitive data is a natural part of business processes. Organizations frequently send files like payroll records, contracts, healthcare…
Learn More

Overview SFTP is a secure method for transferring files between two computers. SFTP can stand for either SSH File Transfer Protocol or…
Learn More

Overview Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don’t fit…
Learn More

Once the crooks have obtained our login credentials, they can just simply login to our FTP server and grab whatever files they…
Learn More

Although plain File Transfer Protocol (FTP) has been the data transfer solution of choice for several decades, it’s no longer fit for…
Learn More

Overview: Secure File Transfer Systems Normally, when people send files over the Internet, they do it through email, FTP, or cloud-based file…
Learn More

JSCAPE is pleased to announce the release new versions of it’s Secure FTP Factory (9.0), Secure iNet Factory (9.0) and SSH Factory…
Learn More

In addition to the information below, we’re offering a free trial when you contact your account manager. SCP is another old SSH…
Learn More

If you’re a programmer, you’ve already learned dozens of TLA’s (Three Letter Acronyms). If a phrase has four words, of course, we…
Learn More

When two little kids want to exchange a secret, a lot of negotiation is necessary: “Promise you won’t tell? Cross your heart…
Learn More

Here’s some philosophy to go with the Secure FTP Factory library. There are some things in life that you should never do…
Learn More

JSCAPE is pleased to announce the release of Secure FTP Factory for Java 8.8.0
Learn More