SSH File Transfer Protocol 101: What It Is and When to Use It
David Perez | | File Transfer | IT Insights
Picture this: "Webhosting Company loses 13 million plaintext passwords" in bold at the head of a blog or a paper.
David Perez | | File Transfer | IT Insights
Picture this: "Webhosting Company loses 13 million plaintext passwords" in bold at the head of a blog or a paper.
Mark Towler | | File Transfer | Security
Thanks to input from MOVEit users the latest release includes also: Expanded Single Sign-On (SSO), MS SQL 2019 Support, Gateway Multi-Org Support & more!
Greg Mooney | | Automation | File Transfer | Security
Electronic file transfer, abbreviated EFT is a procedure that follows an electronic format and protocol to exchange different types of data files.
Adam Bertram | | File Transfer | Security
Transferring files quickly and securely in a modern business environment is a challenge with various devices, methods, and environments an individual may find themselves in.
Greg Mooney | | File Transfer | Security
Talk about an awkward situation—you and a customer collaborate online, sharing a view of a contract and trying to agree on the payment schedule.
Arun Vishwanath | | Cloud | File Transfer | Security
Vulnerabilities in cloud-sharing services stem from the usage of multiple cloud services because of which users need to keep adapting and adjusting their exceptions.
Greg Mooney | | File Transfer | Security
Keeping files and data secure when more users are working remotely is, of course, a concern. That's why a SaaS managed file transfer solution is critical.
Michael O'Dwyer | | File Transfer | Security
Like it or not, today’s world is a connected one, and data is shared at an alarming rate between mobile device users, company networks, and cloud services (including social networks).
Adam Bertram | | File Transfer | Security
Secure Shell (SSH) has been used for many years to remotely access systems, and a common need has been to transfer files to those systems, along with a standard terminal connection.
Michael O'Dwyer | | File Transfer | Security
Nope, I haven’t lost my mind. “One is secure, the other isn’t,” you claim. But there’s more to it than that.
Michael O'Dwyer | | File Transfer | Security
Sending large files by email was never a practical solution as there are too many variables involved between the sender and recipient.
Adam Bertram | | File Transfer | IT Insights
In this article, we will explore common scenarios and how Robocopy can be used to make system administrators' lives easier. Using version 10.0.18362 for this article and is the version that comes with Windows 10 1903.
Greg Mooney | | File Transfer | Security
The importance of online collaboration took a quantum leap as the COVID-19 pandemic forced just about every office worker to stay at home.
Greg Mooney | | File Transfer | Security
Large scale data migrations are a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.
Greg Mooney | | File Transfer | Security
The latest news and lockdowns around the world may seem drastic to some managers, but the reality is that working from home is the future for all office workers.
Greg Mooney | | File Transfer | Security
At its simplest, File Transfer Protocol (FTP) is a rudimentary method of moving files from one location on a network to another.
Michael O'Dwyer | | File Transfer | Security
No. Fastest completion time ever OR maybe we need to go into more detail? Okay, to explain my conclusion, I need to go back to the origins of both protocols.
Jeff Edwards | | Cloud | File Transfer | Security
The cloud is a fact of life in 2019. From basic cloud collaboration tools to storage buckets on massive cloud platforms like Azure and AWS, most businesses perform thousands of cloud file transfers every day, whether they’re aware of it or not. For businesses and IT...
Jeff Edwards | | File Transfer | Security
By now, you should know that controlling access to sensitive files, devices, tools, and network areas is of utmost importance in cybersecurity, but you should also know that it’s not enough to simply control how users access resources. It’s equally important to be able...
Jeff Edwards | | File Transfer | Security
If you're using secure file transfer tools, chances are you're security conscious. Maybe you're working in a highly-regulated industry, or perhaps you don't want your company on the front page of the newspaper for getting hacked. Whatever the case, if you're securing...
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.