Blog

John V.

Recent Posts

Easy Sarbanes-Oxley Act (SOX) compliance through secure protocols

Following major corporate scandals, most notably the high-profile cases of Enron, WorldCom and Tyco, the United States Congress responded by enacting the Sarbanes-Oxley Act of 2002 (SOX). The rationale for this federal law, which introduces provisions for stringent financial reporting, internal controls and corporate governance, was to restore investor confidence in the capital markets and prevent corporate fraud. Today, publicly traded companies must ensure the accuracy of their financial statements to avoid regulatory penalties, reputational damage and legal repercussions.

Topics: security

How to develop automated file transfer workflows: A step-by-step guide for IT teams

Once your organization embarks on a digital transformation journey, there’s no turning back. Your leaders will now be on a never-ending mission to further improve and streamline business processes. As enablers of digital transformation, IT teams are expected to turn ambitious visions into reality. Well, I’m sure you’re up to the challenge. Why else would you be here?

Topics: Managed File Transfer

What to consider when setting up DMZ's reverse proxy & firewall

There are a number of things to consider when setting up the reverse proxy and firewalls in your DMZ. These things are going to have a significant impact on the performance and security not only on your file transfers but for your entire network in general, so you really need to weigh the advantages and disadvantages of each set up before deciding how you are going to put everything together. Let's talk about it when you request a free trial.

Topics: JSCAPE MFT, Secure File Transfer, FTP, Reverse Proxy

SCP vs. SFTP: 9 key comparisons

Secure Copy Protocol (SCP) and Secure File Transfer Protocol (SFTP) are both widely accepted alternatives to the enduring but highly vulnerable File Transfer Protocol (FTP). Since both protocols run on Secure Shell (SSH), IT professionals working with SSH-oriented platforms, such as Linux or UNIX, are often faced with the dilemma of choosing between the two when implementing secure file transfers. If you’re in a similar predicament, this post should help you make the right choice.

Topics: Secure File Transfer, SFTP, File transfer, SCP

SFTP vs. FTPS: Which file transfer software is best for business use?

What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage remote Linux, UNIX and macOS machines in a secure manner. Most of these systems already have built-in support for OpenSSH, an open source implementation of SSH. Even later versions of Windows Server support OpenSSH.

Topics: SFTP, FTPS

How to use reverse proxy to keep sensitive data out of the DMZ

Overview Deploying a reverse proxy and making use of DMZ streaming is an excellent way of keeping sensitive data out of your DMZ. Consequently, it can also help in achieving regulatory compliance.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer, Reverse Proxy

How to secure PCI-DSS FTP compliance

Overview PCI-DSS (Payment Card Industry Data Security Standard) contains a couple of requirements that practically discourage organizations who handle credit card data from using FTP for their file transfers. In this post, we'll examine those requirements more closely to see what the options are for those who still find it difficult to ditch this antiquated technology.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer

11 proven tactics to safeguard file transfers and prevent data breaches

File transfer environments, with their many moving parts and frequent handling of sensitive data, require multiple layers of security. Here are 11 proven security tactics we’ve outlined for quick consumption. Feel free to go over them while on the go.

Topics: Secure File Transfer

5 signs your MFT vendor is capable of mitigating zero-day data breaches

Zero-day exploits are currently one of the most prevalent cyber attacks impacting file transfer solutions. We won’t go into specifics, but a recent file-transfer-related data breach that impacted almost a million individual records was caused by a zero-day exploit.

Topics: JSCAPE MFT

EDI integration with trading partners: 6 best practices

Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI). EDI, which enables the automated exchange of business documents in a standard format, has significantly improved the accuracy, efficiency and timeliness of business processes.

Topics: EDI