Overview Before any files can be securely sent over protocols like FTPS, HTTPS, and SFTP, the two communicating parties must engage in a key exchange. What's that?
Topics:
Secure File Transfer,
SFTP,
FTPS,
key exchange
Overview: File Transfer Protocols for Businesses Still wondering which file transfer protocol is right for your business? Here are a dozen you can choose from. Below this list, we've also added brief descriptions of these data transfer types to make your choice easier. FTP (File Transfer Protocol) HTTP (Hypertext Transfer Protocol) FTPS (FTP over SSL) HTTPS (HTTP over SSL) SFTP (SSH File Transfer Protocol) SCP (Secure Copy) WebDAV (Web Distributed Authoring and Versioning) WebDAVS TFTP (Trivial File Transfer Protocol) AS2 (Applicability Statement 2) OFTP (Odette File Transfer Protocol) AFTP (Accelerated File Transfer Protocol)
Topics:
Secure File Transfer,
SFTP,
FTPS,
Accelerated File Transfer,
transfer protocols
Most of these file transfer protocols should already be running on your network. Can you identify their respective default port numbers?
Topics:
SFTP,
FTPS,
AS2,
FTP
Overview Not many organizations require AES 256 encryption to secure their sensitive documents. But those who do might find this post quite useful. Here, we'll show you how to enable FTPS, SFTP, HTTPS, WebDAVS, OFTP, and AS2 file transfers with AES 256 bit encryption. Does that look like something you can use? Read on!
Topics:
JSCAPE MFT,
Secure File Transfer,
SFTP,
FTPS,
AS2
A growing number of businesses are finding it imperative to get certain products out in the market FAST. To beat extremely tight deadlines, most of them employ IT systems to accelerate business processes. Whenever these processes require file exchanges across departments, cities, or continents, file transfer systems start to play a crucial role. And that role doesn't just involve moving files from point A to point B.
Topics:
JSCAPE MFT,
Managed File Transfer,
Business Process Automation,
Secure File Transfer,
SFTP,
FTPS,
AS2
Overview Digital signatures help enforce security during data transfers. They're mainly responsible for establishing authentication, data integrity, and non-repudiation. Today, we'll be talking about the basic concepts behind digital signatures, where they're used, how they work, and why they're always an integral part of highly secure file transfers.
Topics:
JSCAPE MFT,
Secure File Transfer,
SFTP,
FTPS,
AS2
Overview Hashes are essential to secure file transfers. You can find them in operations involving passwords, file integrity checks, digital signatures, digital certificate thumbprints or fingerprints, and others. But what are hashes? In this post, we'll introduce you to hashes, the concept of hashing, and its applications in various areas of security.
Topics:
JSCAPE MFT,
Secure File Transfer,
FTPS
Overview: Symmetric vs. Asymmetric Encryption Secure file transfer protocols generally employ a combination of symmetric and asymmetric encryption to preserve the confidentiality of data while in transit. So why the need for two kinds of encryption? What is the difference between symmetric and asymmetric? In this post, we take a closer look at the main functions of symmetric and asymmetric encryption, their strengths, their weaknesses, and why we'd prefer having both. For an in-person look and your free trial, click here.
Topics:
JSCAPE MFT,
File Transfer Clients,
Secure File Transfer,
SFTP,
FTPS
Overview Server to server file transfers are usually associated with enterprise business processes. Interestingly, some of these file transfers actually don't fit the bill. In this post, we'll share some tips on how you can enhance your server to suit the stringent requirements of the enterprise.
Topics:
JSCAPE MFT,
Managed File Transfer,
Business Process Automation,
Secure File Transfer,
SFTP,
Triggers,
FTPS,
AS2
Overview: Secure File Transfer Systems Normally, when people send files over the Internet, they do it through email, FTP, or cloud-based file sharing services. That's perfectly fine if the files you send don't contain sensitive information. But if they do, you would have to employ a secure file transfer solution in order to prevent possible attackers from intercepting, viewing, stealing, or altering the information you transmit.
Topics:
Secure File Transfer,
SFTP,
FTPS