Technology and Software

Why do I need Managed File Transfer? Isn’t FTP enough?

Possibly not. The Internet’s venerable File Transfer Protocol (FTP) is usually supported by Managed File Transfer (MFT) systems, which can typically use FTP as one of the ways in which data is physically moved from place to place. However, MFT essentially wraps a significant management and automation layer around FTP. Consider some of […]

Also posted in Advanced File Services, Auditing, Enforcement, FTP, Integration, Interactions, Ipswitch, Ipswitch Products and Services, Managed File Transfer, Management, MessageWay, MOVEit, Person-to-Person, Social Media, Visibility, WS_FTP Professional, WS_FTP Server | Tagged , , , , , , , , , , , , , , , , | Leave a comment

When transferring files, isn’t all encryption the same?

Definitely not. To begin with, there are numerous kinds of encryption—some of which can actually be broken quite easily. One of the earlier common forms of encryption (around 1996) relied on encryption keys that were 40 bits in length; surprisingly, many technologies and products continue to use this older, weaker form of encryption. […]

Also posted in Auditing, Compliance, Data Breach, Enforcement, File Security, FTP, Integration, Interactions, Ipswitch, Ipswitch Products and Services, Managed File Transfer, Management, MessageWay, MOVEit, Person-to-Person, Security, Visibility, WS_FTP Professional, WS_FTP Server | Tagged , , , , , , , , , , , , , , , | Leave a comment

FTP is unsecure and generally unmonitored

SC Magazine just published a short article titled “FTP described as unsecure and generally unmonitored”. In the article, fellow Managed File Transfer (MFT) vendor Axway correctly points out that “usernames, passwords, commands and data can be easily intercepted and read while files transferred via FTP are uploaded or downloaded without […]

Also posted in Enforcement, FTP, Managed File Transfer, Management, Visibility | Tagged , , , , | Leave a comment

Good Morning! You’ve Been Breached!

In my many travels visiting customers and IT professionals around the world, I ask a simple question, “What do you do when you have to send a file to someone that’s just too big?”  They ask me how big is big?  I say too big for your email or even […]

Also posted in Cloud Computing, Data Breach, Person-to-Person, Security | Tagged , , , , , | Leave a comment

iCloud & Apple: Flattening Routes to Market

Yesterday Apple officially announced the availability of its new cloud-based music service. There have been weeks of speculation as industry insiders became aware of payments made to various record companies and labels for the licensing of music to power Apple’s new cloud offering. But there’s a lot more at stake […]

Also posted in Cloud Computing | Tagged , , , , , | Leave a comment

We warned you!

Ipswitch has been cautioning companies about the dangers of private/confidential information being sent through Google (and other hosted and person-to-person services), both from a security and a responsibility perspective. Last week’s GMail hack further drives home the point that organizations must proactively manage and have visibility into what information is […]

Also posted in Cloud Computing, Data Breach, Enforcement, File Security, Integration, Person-to-Person, Security, Visibility, Webcasts | Tagged , , , , | Leave a comment

Cloud security is the new great debate

Last week I ranted a bit about the importance of governing your cloud vendors.  At about the same time, Ipswitch’s Frank Kenney participated in a panel discussion on cloud security at the Interop conference in Las Vegas. As you know, there is great debate over whether cloud services are secure […]

Also posted in Cloud Computing, File Security, Managed File Transfer, Security, Visibility | Tagged , , , , , , , , , , | Leave a comment