File Security

What Kind of File Transfer Solution Do You Need?

Car Keys and New Car

So, what kind of file transfer solution do you need?  It can be a seemingly tricky question, with all the options on the market today.  More and more services emerge with what’s been called the “sync bubble”, and we all know what happens to bubbles.  No need for confusion, or […]

Also posted in Managed File Transfer, Person-to-Person | Leave a comment

Ipswitch Conversations at RSA Conference

There is so much to absorb at RSA Conference.  The largest gathering of security vendors, solution providers and practitioners in the U.S. certainly didn’t disappoint as the Moscone Center was buzzing with security education and of course lots of thought provoking conversations. Many of the people I spoke with shared […]

Also posted in Cloud Computing, Compliance, Customers, Data Breach, Managed File Transfer, Person-to-Person, RSA, Security, Visibility | Tagged , , , , , , , | Leave a comment

Allowing consumer-grade file sharing technologies is risky business

Looking back at 2011, we saw more and more employees using consumer-grade (and often personally owned) file sharing technologies such as USB drives, smartphones, personal email accounts, and file sharing websites to move sensitive company information.  We’ve learned that employees will “do what they need to do” to be productive […]

Also posted in Data Breach, Enforcement, MOVEit, Person-to-Person, Security, Visibility, WS_FTP Server | Tagged , , , , , , , , , , | Leave a comment

Encryption: Transport versus File

This morning I was asked if I recommended using transport encryption or file encryption to protect company files and data. My answer:  “Use both of them, together!” For starters, here’s a real quick summary of both encryption types: Transport encryption (“data-in-transit”) protects the file as it travels over protocols such […]

Also posted in Compliance, Data Breach, FTP, Managed File Transfer, Security | Tagged , , , , , , , , , | Leave a comment

Data Breach Primer – What Does it all Mean?

Hey SEC, it’s Frank Kenney at Ipswitch. I don’t mean to rock the boat but I had a few quick questions regarding your recent announcement that you are requiring companies to notify their customers of a breach or risk of breach. What’s a “breach”? Does it mean the bad guys […]

Also posted in Data Breach, Security, Visibility | Tagged , , , , , , | Leave a comment

Hackers break browser SSL/TLS Encryption

Word has quickly spread that a serious weakness has been discovered in the Secure Sockets Layer (SSL) protocol that allows attackers to silently decrypt data that’s passing between a web server and an end-user browser. All reports indicate that this vulnerability affects the SSL protocol itself and is not specific […]

Also posted in Security | Tagged , , , , , , , , , | Leave a comment

Senator to businesses: Protect data or pay

As George Hulme recently wrote, the vision of Senator Richard Blumenthal’s data breach legislation is simple enough:  Protect individuals’ personally identifiable information from data theft, and penalize firms that don’t adequately secure their customers’ information. Clearly, there’s a need for organizations to better secure confidential and private customer information.  It […]

Also posted in Data Breach, Enforcement, Managed File Transfer, Management, Security, Visibility | Tagged , , , , , , | Leave a comment