Blog

John V.

Recent Posts

Choosing the right SFTP hosting for advanced file transfer workflows

Most Secure File Transfer Protocol (SFTP) hosting services can handle basic file transfer tasks, but not all are suitable for advanced workflows. For instance, if you just want the ability to upload files from a local system to a remote server or download files from that server, almost any SFTP hosting service should suffice. However, if you also need robust automation, integration and regulatory compliance capabilities, you have to be more selective in picking the right service.

Topics: SFTP

Protect cardholder data: PCI DSS compliance guide

In the highly regulated financial services industry, it's crucial to maintain compliance with information security standards. Doing so establishes trustworthiness, mitigates data security risks and prevents costly fines and penalties stemming from non-compliance. One of the most important standards in this sector is the Payment Card Industry Data Security Standard (PCI DSS), which lays out an extensive framework of requirements to safeguard the storage, processing and transmission of payment card data.

Topics: security

How to use SFTP compression

File Transfer Protocol (FTP) has very few advantages over Secure File Transfer Protocol (SFTP). However, if you measure the transfer speed between an FTP client and an FTP server and compare that with the speed between an SFTP client and an SFTP server in exactly the same network conditions, the FTP transfer usually comes out faster.

Topics: SFTP

How to generate client certificates for SSL/TLS authentication

When we use Transport Layer Security (TLS), we typically do so to protect our data while transmitting it over the network and to ensure that our users are connecting to the right server. These two operations, i.e., data-in-transit encryption and server authentication, rely on a TLS artifact known as the server certificate. That being said, TLS also supports another operation that uses a different type of digital certificate. It's called client certificate authentication, and it relies on client certificates.

Topics: Client certificate

5 ways JSCAPE ensures 24/7/365 security and compliance for banking file transfers

Banking institutions, including commercial, retail and investment banks, frequently exchange files with various trading partners, which typically include customers, clearinghouses, corporate clients, other financial institutions, regulatory authorities and other organizations. Many of these files are crucial to time-sensitive business processes. Most also contain sensitive information, making them subject to governance and data privacy/protection laws and regulations, such as:

Topics: JSCAPE MFT

How to protect consumer data and ensure data security for banks with JSCAPE

Banks store, process and transfer vast amounts of sensitive consumer data. This may include financial information, credit card data, personally identifiable information (PII), loan details and transaction data. Since these types of sensitive data are critical to business processes or subject to regulatory compliance mandates, they need to be protected.

Topics: JSCAPE MFT

10 hidden costs of inadequate file transfer security

Advanced secure file transfer solutions, like managed file transfer (MFT) servers, are no doubt more expensive than run-of-the-mill file transfer software. In fact, you can get a File Transfer Protocol (FTP) server or even a Secure File Transfer Protocol (SFTP) server for free. Many operating systems already have SFTP servers built-in, so they’re readily available at no additional cost.

Topics: Managed File Transfer, Accelerated File Transfer

Why more IT professionals are switching from basic SFTP server software to MFT

Topics: JSCAPE MFT, SFTP

How to set up an FTP scheduler for windows

Scheduled file transfers offer significant operational, strategic and technical benefits. They allow your IT staff to save time and improve productivity. They also help ensure that data transfers for time-sensitive business processes are consistently carried out on time. Lastly, they enable you to maximize computing resources and network bandwidth when you schedule the transfers to run after office hours.

Topics: FTP, FTP Server

File transfer data breach risk: real or overstated?

Managed file transfer (MFT) vendors often highlight security as a key differentiator between MFT and traditional file transfer solutions. With their vast array of enterprise-grade security controls, MFT solutions are understandably more capable of protecting data and file transfer workflows. But are all these controls truly necessary?

Topics: Managed File Transfer, File transfer