Resources

Blog

How Important is Auditing Your File Transfers?

  Image When you send someone a file using FTP, how do you know (and later prove) that it was successfully sent? Consider the Complexities It might be possible to save a screenshot as long as the process was simple and you can see all the commands on a single screen. But what if your commands start getting complex? And if you start...
Blog

Analysis On Improving Throughput Part 1: Disk IO

This post is the first of a series and continues in Part 2: Memory In light of the release of FileCatalyst Direct v3.0, I thought I’d write a few articles about the road to achieving 10Gbps speeds. It seems to me the best place to start is with the endpoint of the transfer: the storage media. Why? Before we even think about the file transfer protocol, we have to be sure that...
Blog

SFTP vs. FTPS: What's the Best Protocol for Secure FTP?

Image What is Secure FTP? SFTP vs. FTPS: Secure FTP Authentication SFTP vs. FTPS: Secure FTP Implementation SFTP vs. FTPS: Speed SFTP vs. FTPS: Security Watch a Demo An increasing number of organizations are looking to move away from transferring data with FTP (a standard file transfer protocol). In the beginning stages of...
Blog

Driving Securely Through the Cloud

  Image Cloud computing is not for everything and not for everyone, but it has made a permanent mark in the lexicon of technology services. And there is a lot of hype around cloud computing and what it can do for organizations. To be fair, it is a very powerful tool. But it’s important to work out how you can use it most effectively...
Blog

Are You Next in Line for a Data Breach?

  Image A Data Breach is Closer Than You Think As the percentage of data breaches increase, the risk of organizations losing your sensitive data also increases. No one wants to receive the news that some or all of their personally identifiable information (PII) was stolen. Sure, there are people who are victims of various phishing...
Blog

The Culture of Data Security

  Image Here at Fortra, we hear a lot of buzz about protecting both customer and company data, but it's alarming how many IT departments and enterprise users are still not protecting their data correctly. According to the Ponemon Institute, fewer than 50 percent of organizations have comprehensive encryption protection in place. ...
Blog

What Makes FTP an Outdated Security Method

  Image Why is FTP an Outdated Protocol? FTP was designed as an easy mechanism for exchanging files between computers at a time when networks were new and information security was an immature science. In the 1970s, if you wanted to secure a server from unwanted access, you simply locked the computer room door. User access to data...
Blog

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

  Image Comply with Data Security Requirements Highly sensitive data is exchanged between organizations on a constant basis making data security compliance more vital than ever to keep communication flowing. For instance, if a business routinely transmits financial information to their bank including payroll direct deposits and...
Blog

CriticalPast Introduces One of the World’s Largest Online Archives

Image On the 3rd of June, CriticalPast announced the launch of CriticalPast.com, an absolutely astonishing archive of historic footage and photographic images:  From the press release on Business Wire: CriticalPast’s library of more than 57,000 video clips is drawn from government sources and digitized, making it easy for users to...