Blog

John V.

Recent Posts

9 best practices for secure document transfers in business operations

When you transfer documents as part of business operations, security is crucial. The growing volume of sensitive information involved in these activities puts businesses at greater risk of a data breach. If that information falls into the wrong hands, your business could suffer from reputational damage, lawsuits, regulatory penalties and other business-impacting consequences.

Topics: security

How to choose a SaaS secure file transfer service for your business

Enterprise organizations must streamline how they share content and protect sensitive files. Old file transfer systems cannot keep up with new demands, including stricter regulations, greater uptime and global access. Many organizations are now moving to secure file transfer solutions in the cloud. This shift is growing in industries like healthcare, finance and government, which rely on strong file security and system availability.

Topics: JSCAPE SaaS

Using SFTP with the Cloud

For several decades, SFTP, which stands for Secure File Transfer Protocol or SSH File Transfer Protocol, has been arguably the most widely used solution for transferring sensitive data across the internet. In the past few years, however, we’ve seen increased adoption of what’s known as SFTP cloud.

Topics: JSCAPE MFT, SFTP, File transfer

SSH file transfer protocol 101: what it is and when to use it

When it comes to securely transferring files over the internet, the SSH File Transfer Protocol (SFTP) stands out as one of the most trusted and reliable solutions available. Its core security features make it extremely popular among organizations that handle sensitive data. Many of our customers, spanning diverse sectors such as financial services, healthcare, retail, manufacturing, logistics, defense, research, aerospace and e-commerce, rely on SFTP to ensure the confidentiality and integrity of their data transfers.

Topics: File transfer, ssh

7 alternatives to an SFTP platform you probably didn’t know

Many of our customers use Secure File Transfer Protocol (SFTP) for their business file transfers. While SFTP is certainly a good choice for organizations looking to securely transfer multiple files or large files directly to their intended recipient, it’s not the only solution suited for that purpose. In this post, we’ll review seven secure FTP alternatives and discuss their advantages and disadvantages compared to what many consider the de-facto standard for secure, multi-file and large file transfers.

Topics: SFTP, sftp server

Why UDP file transfers are up to 100x faster than TCP

Moving large files farther: Why UDP file transfers are 100x faster than TCP The total time required to transfer large files over the internet can take ages. It gets even worse if your recipient is halfway across the globe. While many organizations transfer files through popular transmission control protocol (TCP)-based methods like file transfer protocol (FTP), secure file transfer protocol (SFTP) and hypertext transfer protocol (HTTP), you can actually achieve shorter transfer times with the user datagram protocol (UDP). So, just how much faster can UDP be?

Topics: Accelerated File Transfer

WebDAV vs. FTP: which is better for transferring files?

While the Web Distributed Authoring and Versioning (WebDAV) protocol is more closely associated with collaboration activities, it’s also equipped with file transfer functionality. But how good is it as a file transfer solution? Can it, for instance, match the capabilities of the File Transfer Protocol (FTP)? Let’s find out.

Topics: webdav, webdav server

Forward proxy vs. reverse proxy servers

Forward proxies and reverse proxies intermediate between clients and servers to improve security, control, policy enforcement and network performance. Forward proxies act on behalf of clients, whereas reverse proxies act on behalf of servers. In this post, we’ll take a closer look at the similarities and differences between these two important network security solutions. The information you’ll gain from this post can help you streamline your network-dependent business processes and improve your organization’s security posture.

Topics: JSCAPE MFT, Reverse Proxy, proxy server, Forward proxy, load balancing, reverse proxy server

How to protect FTP passwords from brute force attacks

"Always use strong passwords." - You probably don't pay too much attention to this advice, do you? A lot of people don't either. That's why brute force is still one of the favorite techniques for breaking into any password-protected system, including FTP servers behind firewalls. It's really not very difficult to carry out. Let's discuss brute force attacks and how to protect your FTP passwords from them.

DSA vs. RSA encryption - which works best for file transfers?

Overview: DSA vs. RSA During the process of generating server keys, client keys, or PGP keys in the JSCAPE MFT Server Manager, you're asked to choose between two supported key algorithms: RSA or DSA. Which one should you choose?

Topics: RSA 4096, DSA, RSA vs DSA, DSA vs RSA