Blog

How to Use Public Key Authentication with Partners | JSCAPE

Overview

Several months ago, we published a tutorial crafted to help network/server administrators prepare trading partners for SFTP automation. That article lacked one important feature found in SFTP - public key authentication. So today, we've devoted one full tutorial that focuses on that.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Tutorials, Secure File Transfer, SFTP

Using sftp -r

While using SFTP on the command line, there might be instances when you'll want to upload or download an entire directory and all the the files and subdirectories underneath it. To accomplish that, you'll need the recursive argument -r.

Topics: SFTP

12 File Transfer Protocols for Businesses

Overview: File Transfer Protocols for Businesses

Still wondering which file transfer protocol is right for your business? Here are a dozen you can choose from. Below this list, we've also added brief descriptions of these data transfer types to make your choice easier.

  1. FTP (File Transfer Protocol)
  2. HTTP (Hypertext Transfer Protocol)
  3. FTPS (FTP over SSL)
  4. HTTPS (HTTP over SSL)
  5. SFTP (SSH File Transfer Protocol)
  6. SCP (Secure Copy)
  7. WebDAV (Web Distributed Authoring and Versioning)
  8. WebDAVS
  9. TFTP (Trivial File Transfer Protocol)
  10. AS2 (Applicability Statement 2)
  11. OFTP (Odette File Transfer Protocol)
  12. AFTP (Accelerated File Transfer Protocol)

Topics: Secure File Transfer, SFTP, FTPS, Accelerated File Transfer, transfer protocols

Can You Identify The Port Numbers of These 12 File Transfer Protocols?

Most of these file transfer protocols should already be running on your network. Can you identify their respective default port numbers?

Topics: SFTP, FTPS, AS2, FTP

Various Linux SCP Examples To Get You Started With Using Secure Copy

Overview

SCP (Secure Copy) is a quick, easy way to transfer files securely between two Linux machines. If you don't mind using the command line and all you want is a simple way to upload or download files on Linux, this series of SCP examples should be all you'll need to learn how to do it.

Topics: Tutorials, Secure File Transfer, SFTP

Meeting AES 256 Encryption Requirements For Data In Transit

Overview

Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite useful. Here, we'll show you how to enable FTPS, SFTP, HTTPS, WebDAVS, OFTP, and AS2 file transfers with AES 256 bit encryption. Does that look like something you can use? Read on!

Topics: JSCAPE MFT, Secure File Transfer, SFTP, FTPS, AS2

File Transfers Have a Much Bigger Impact On Time-To-Market Than You Think

A growing number of businesses are finding it imperative to get certain products out in the market FAST. To beat extremely tight deadlines, most of them employ IT systems to accelerate business processes. Whenever these processes require file exchanges across departments, cities, or continents, file transfer systems start to play a crucial role. And that role doesn't just involve moving files from point A to point B.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Secure File Transfer, SFTP, FTPS, AS2

What is a Cipher? | Understanding Encryption Algorithms

Overview

The strength of an encryption largely depends on two components: 1) the cipher and 2) the length of the key. We already discussed key lengths in an older post. So today, let's talk about the other component.

Topics: JSCAPE MFT, Secure File Transfer, SFTP, FTPS

What is a Digital Signature?

Overview

Digital signatures help enforce security during data transfers. They're mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we'll be talking about the basic concepts behind digital signatures, where they're used, how they work, and why they're always an integral part of highly secure file transfers.

Topics: JSCAPE MFT, Secure File Transfer, SFTP, FTPS, AS2

Symmetric vs Asymmetric Encryption

Overview: Symmetric vs. Asymmetric Encryption

Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality of data while in transit. So why the need for two kinds of encryption? What is the difference between symmetric and asymmetric? In this post, we take a closer look at the main functions of symmetric and asymmetric encryption, their strengths, their weaknesses, and why we'd prefer having both.

For an in-person look and your free trial, click here.

Topics: JSCAPE MFT, File Transfer Clients, Secure File Transfer, SFTP, FTPS