Blog

Blog

SFTP vs. FTPS: The Key Differences

With so many options for transferring files, it can be confusing to answer the most important question: what is the best way to secure your company’s data during transfer?Use this article as an introduction to the differences between two mainstream secure FTP protocols, SFTP and FTPS, and which is the best choice to protect your file transfers.What's...
Blog

No Such Thing as a Free File Transfer, Part 2: Cost-effective Security

With new corporate data breaches in the news seemingly every day, it’s no surprise that security is a top concern for IT professionals. However, file transfers are an area where many companies are still vulnerable.Most file transfers still use FTP, a protocol that comes with inherent risks. Other common file transfer solutions, like file sharing...
Blog

No Such Thing as a Free File Transfer, Part I: How MFT Saves Time

Every business engages in some kind of information exchange, whether it’s a small retailer attaching an invoice to an email or a hospital sending hundreds of patient records between departments. Some methods of exchanging files, like a basic FTP server or a file sharing app, seem like an inexpensive way to deal with your transfers. In the...
Blog

Four Modern Alternatives to FTP Explained

Read about the latest alternatives to FTP: Five Secure File Transfer Alternatives to FTP Today's data-driven world is demanding, requiring accuracy, speed, integrity and above all -- security. It's a tall order to fill, and in the past, many organizations relied heavily on the legacy FTP protocol to transmit files. But over time, FTP alternatives have become necessary as the security of...
Blog

3 Steps to Safeguarding Company Data and Limiting Risk

Security professionals of today are inundated with headlines about the potential consequences of a data breach.Making headlines for a data breach can cost you – and more than just reparations or a fine. Data breaches are the worst of bad press and can impact your finances for years to come.As security professionals work to manage vast amounts of data...
Blog

SHA-2 and TLS Security for AS2 Transfers

SHA-2 and TLS Security for AS2 Transfers It’s crucial for organizations to take the time to upgrade the security used to protect their AS2 data transfers. In order to be compliant with the latest security standards, you need to be using a modern AS2 solution. Related Reading: AS2 Protocol Software for Client & Server Transfers The Story...
Blog

What is AS2? Common Protocol Explained

For those that ask "What is AS2?," AS2 is an abbreviation for Applicability Statement 2, which is a popular file transfer protocol that allows businesses to exchange data with their trading partners.AS2 protocol combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing...
Blog

SFTP Server in the DMZ or Private Network

Many organizations have an SFTP server installed where their trading partners can connect to securely upload and download sensitive files. SFTP Server in the DMZ Traditionally SFTP Servers have been installed in the DMZ (or public facing) segment of the network since organizations were fearful of opening inbound ports into the Private (internal) network. ...
Blog

Could Your FTP Server Pass a Compliance Audit?

If an auditor showed up to your office tomorrow and wanted to examine your file transfer security policies and procedures for compliance, how confident are you that your organization would pass with flying colors?If there’s any doubt that your file exchange process can meet stringent compliance requirements, a secure managed file transfer solution...
Blog

What Is Your High Availability Plan for Your SFTP Server?

As organizations and their trading partners become more and more integrated, it's critical that file transfers perform without delays or disruptions. For instance, a document containing a batch of transactions could traditionally be delivered within a window of several hours without causing any issues. But today, in the effort to make business...
Blog

Keeping File Transfers Secure from Hackers and Cyber Threats

Keep Your Files Secure In the battle to secure information, it helps to know a little bit about how it can be compromised. Using FTP is one way to expose critical vulnerabilities and can allow credentials to be hacked. However, these holes in security can also be easily closed if you know how. How Hackers Discover Vulnerabilities Here's how...
Blog

How to Solve 4 Common Email Security Challenges

Yes. Emailing someone is still one of the easiest ways to share data. However, there are some important caveats to sharing files this way that can put your organization’s file transfers at risk.Email File Transfer ChallengesThese are the four big challenges that organizations should be aware of when transmitting files via email.Email is sent "in the...
Blog

Are Insurance Companies Managing Their Risk of Data Breach?

Insurance companies are the experts at analyzing and managing risk. They identify, quantify, and set pricing based on the calculated costs of risk. Naturally, the higher the perceived risk, the higher the cost to mitigate the potential losses.Yet, here is the irony. While those in the insurance industry excel at evaluating risk management for their...
Blog

Is Your Company Letting Data Slip Through the Cracks?

Many Americans have spent the last few days frantically searching for receipts and other documentation to finish their taxes before April 15th — only to realize they get a one-month reprieve this year.Despite that sigh of relief, there's no doubt that some of those people thought they knew exactly where to find what they needed, and were dismayed to...
Blog

How Important is Auditing Your File Transfers?

When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start sending quite a few...
Blog

SFTP vs. FTPS: What's the Best Protocol for Secure FTP?

What is Secure FTP? SFTP vs. FTPS: Secure FTP Authentication SFTP vs. FTPS: Secure FTP Implementation SFTP vs. FTPS: Speed SFTP vs. FTPS: Security Watch a Demo An increasing number of organizations are looking to move away from transferring data with FTP (a standard file transfer protocol). In the beginning stages of research, questions...
Blog

Are You Next in Line for a Data Breach?

A Data Breach is Closer Than You ThinkAs the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen.Sure, there are people who are victims of various phishing scams, but it's more likely...
Blog

The Culture of Data Security

Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute, fewer than 50 percent of organizations have comprehensive encryption protection in place.Prevention vs. RemediationData...
Blog

What Makes FTP an Outdated Security Method

Why is FTP an Outdated Protocol?FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data was controlled by the basic...