Blog

John Carl Villanueva

Recent Posts

Securing internal networks during eDiscovery using a reverse proxy

Overview When your company undergoes eDiscovery, there can be numerous file exchanges between your organization and people who normally wouldn't have access to your internal network. In this post, we'll show you how you can carry out these exchanges without exposing other parts of your network to external users.

Topics: JSCAPE MFT, Reverse Proxy

Why your business needs an SSH secure file transfer client

Once the crooks have obtained our login credentials, they can just simply login to our FTP server and grab whatever files they find.

Topics: File Transfer Clients, Secure File Transfer, SFTP

You know it’s time to implement server to server file transfer when..

Overview Many business processes involve file exchanges. Bid and proposal submissions, loan applications, legal filings, financial reporting, data backup and recovery, supply chain integration, B2B collaboration, and several business transactions all require the movement of files. Although ad hoc file transfers usually get the job done, there are really situations that require server to server file transfers. Those particular situations are the focus of our discussion today.

Topics: Ad-Hoc File Transfers, Managed File Transfer, Business Process Automation, Triggers, AS2

Securing HIPAA EDI transactions with AS2

Overview One of the main goals of the Health Insurance Portability and Accontability Act (HIPAA) is to improve efficiency in the US health care industry. To achieve this, HIPAA mandates the use of electronic data interchange (EDI) in health care transactions and requires HIPAA covered entities to adopt national standards when implementing EDI.

Topics: JSCAPE MFT, Managed File Transfer, Business Process Automation, Secure File Transfer, AS2

Laws that could impact your choice of file transfer software

Overview Choosing a file transfer software might seem like a trivial exercise. Any application capable of delivering files to your intended recipient should fit the bill, right? Well, not all the time. If your company belongs to the healthcare or financial services industry, is publicly traded, or handles credit card information, then there are a couple of security requirements you need to take into consideration.

Topics: JSCAPE MFT, Secure File Transfer, FTP

Exploring use cases for managed file transfer

Overview One thing we often discover when talking with clients is that many of their company's file sharing tasks are actually accomplished using a mishmash of solutions. Some employees send files through email. Others use FTP. Some subscribe to cloud-based file sharing services like DropBox and Google Drive. And still others rely on specialized methods like custom scripts or programs.

Topics: Ad-Hoc File Transfers, Managed File Transfer, Business Process Automation, Secure File Transfer

How secure mobile file storage & sharing refines your BYOD strategy

Overview Pretty soon, your business will have to adopt some form of BYOD policy. That policy is bound to include several provisions for securing company-owned data that may have found their way into your employees' personal mobile devices. Among many others, you'll also need to establish guidelines for secure file transfers, storage, and sharing in order to protect that data.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer

A faster way to send big files essential to manufacturing

Overview With time-to-market gradually becoming a crucial competitive advantage, many manufacturers whose trading partners are located across the globe have started looking for faster ways of exchanging mission-critical files. Common file transfer methods such as email, cloud-based file sharing and FTP are turning out to be too slow for sending detailed CAD models and other massive files integral to manufacturing processes.

Topics: Managed File Transfer, Secure File Transfer, Accelerated File Transfer

10 essential attributes of secure file transfer systems

Overview: Secure File Transfer Systems Normally, when people send files over the Internet, they do it through email, FTP, or cloud-based file sharing services. That's perfectly fine if the files you send don't contain sensitive information. But if they do, you would have to employ a secure file transfer solution in order to prevent possible attackers from intercepting, viewing, stealing, or altering the information you transmit.

Topics: Secure File Transfer, SFTP, FTPS

How to share files with a virtual paralegal

Overview Vast technological advancements in the Internet are spawning new breeds of professionals who have learned to take advantage of the Internet's ubiquity, connectivity, and speed. Among these professionals are legal support individuals known as virtual paralegals.

Topics: JSCAPE MFT, Managed File Transfer, Secure File Transfer