Resources

Blog

Overcoming Distance and File Size When Transferring Files

Image How UDP-based Technology Helps with Long Distance and Large File Transfers “Relying on TCP-based file transfer protocols such as SFTP, HTTP, or FTPS on their own if you need to send files lightning-fast, from remote locations, or off-shore, can put you at a strategic disadvantage, as those protocols lack the acceleration and...
Blog

How Are You Doing with PCI DSS v4.0 Compliance?

Image As of March 31, 2024, organizations in the payments industry will need to comply with all new PCI DSS v.4.0 requirements. Find out what the new obligations will be, how to tie them into your enterprise, and how Fortra can help. For many organizations, 2024 will be a big year. Aside from focusing on increasing revenues, market...
Blog

Load Balancing Keeps Files Moving, Processes Running

Image Dreaded network bottlenecks and the ensuing risk of downtime are anxiety-producing situations for many IT teams. Afterall, uptime is how business gets done and when that fails, the domino effect can have serious repercussions. Load balancing, however, can act as a preventative, to keep network traffic flowing. What is Load...
Blog

How MFT Helps the Insurance Industry Secure Files

Image Insurance industry insiders know an insurance policy is one of the few products purchased that most people hope to never have to put to use. Afterall, “using” your insurance means that an adverse event has occurred – an auto accident, medical crisis, storm damage, or any number of situations where not having a policy in place...
Blog

What is a TFTP Server?

Image What is a TFTP Server?  TFTP, or Trivial File Transfer Protocol lives up to its name as it is a lightweight, simple protocol used to send files across a network. The server of this “trivial” protocol allows computers in and out of an organization’s network to exchange files using TFTP. As a lightweight protocol, there is less...
Blog

What We Learned in Our Inaugural State of Cybersecurity Survey

Image No one knows the challenges of securing an organization like the professionals who carry that responsibility daily. We set out to better understand the things they deal with and what they plan to focus on in our inaugural 2024 Fortra State of Cybersecurity Survey. Here are five key takeaways from the survey.  81% Call Phishing...
Blog

Building Strong Software Through Third-Party and Internal Testing

Image In my last post I wrote about protecting the supply chain and how strong bricks make strong walls, referencing how creating software with strong internal components and securely crafted code adds strength to the enterprises using that software. When considering any component being added into an environment, evaluating its...
Blog

On-Premises vs. Cloud: Which File Transfer Method is Best for You?

Image If your organization is debating between on-premises and cloud deployment for your business-critical file transfer needs, there are a few considerations around compliance, resources, and infrastructure to help you determine which option makes the most sense for your organization.  “If you’re already using an on-premises...
Blog

How MFT Solves Email Attachment Problems

Managed File Transfer (MFT) future-proofs an organization’s ability to send files at the speed of business and break free of the limiting constraints of email attachments.
Blog

MFT Security Champions: First Responders for Solution Security

Image What is a Security Champion? Software users have expectations that the solution they choose to execute key business functions is continually being assessed for security, among other attributes. One role within security-conscious organizations that helps proactively meet those expectations is that of Security Champion. ...
Blog

Sharing Financial Files: Benefits of MFT

Image Financial file matters matter. Not only are these files a top priority to the banks and financial institutions that handle millions of transactions daily, they also matter to the industry’s compliance regulators, and to the public trusting that their financial information is secured. How organizational and personal financial...
Blog

Protecting the Supply Chain: Strong Bricks Make Strong Walls

Image When I was young, we had toy bricks made of cardboard that were great for tiny hands. They were lightweight and easy to stack, and we created many walls, forts, and towers. As wonderful as these were, they would do little to protect against an attacking army. For that, we’d need strong material and sound construction for defense...
Blog

MFT Software Demos: Maximize Your Time

Image When it comes to selecting software that can have a major impact on how your organization conducts business and secures its most valuable data, you can look at the process much like you do when considering a new vehicle. While a test drive of that shiny new ride can help confirm your expectations for speed and performance, a...
Blog

Transferring Government Files: MFT Addresses Biggest Challenges

Image Whether big government or small, assuring the security of files in the public sector is of utmost importance for security, as well as assuring any information from citizens is protected. According to 2021 US Census data, there are 90,000 government entities. Protecting the data these agencies handle is admittedly a big lift. ...
Blog

FTP vs. SFTP: Considerations for Secure File Transfer

Image Businesses today rely on the safe transfer of data to operate securely in today’s digital economy. There are several protocols that can be used for this purpose, and each offers a different benefit to your organization. File Transfer Protocol (FTP) has been around longest and is the default file transfer method for many...
Blog

Secure Cloud File Transfers: Best Practices for Organizations

Image In today's data-driven world, organizations increasingly rely on the cloud to transfer files securely and efficiently. Whether you are working in a pure cloud environment, a hybrid setup, or leveraging Managed File Transfer as a Service (MFTaaS), ensuring the security of your file transfers is paramount. In this blog, we'll...
Blog

Considerations for Cloud File Transfers

Image Whether your organization is debating on moving your file transfer process entirely to the cloud, adopting a hybrid environment, or using a hosted SaaS solution, review the considerations below to help better clarify and get the organizational support needed for a cloud-based file transfer solution.  There are no absolute right...
Blog

Fast File Transfer: Obstacles and Options

Image Fast, faster, and fastest. With technology comes the benefit of speed to get through tasks easier and yes, faster. Transferring files is no exception. Organizations want and need files to get to their destination quickly and reliably. What Might Slow Down a File Transfer? Getting that business-critical file where it needs to...
Blog

11 Popular File Transfer Protocols Explained

Edited on 5/8/2024 Check out the brief video below, which quickly covers these 11 file transfer protocols, their uses, and the security that comes along with them:  1. FTP 7. TCP 2. FTPS 8. AS2 3. SFTP 9. AS3 4. SCP 10. AS4 5 HTTP 11. PeSIT 6. HTTPS       As organizations have become...