Blog

Perimeter Defense: The Reverse Proxy

By Michael Ryan, CEO of South River Technologies Nearly all businesses protect vital internal assets by means of a firewall: a software- or hardware-based solution that sits between the corporate LAN and the external internet. These firewalls are designed to limit, regulate, and monitor traffic that passes between the public internet and the private corporate […]

What is PCI Compliant File Transfer and Storage?

Accepting credit card payments is standard practice in most businesses. In order to protect cardholder data, any business that accepts, processes, transfers or stores credit card data must comply with the Payment Card Industry Data Security Standard (PCI DSS). Often referred to simply as “PCI,” this standard was developed by a consortium of credit card issuers […]

Do you need Managed File Transfer, or Just an FTP Server?

There are a remarkable number of file server products on the market, offering a wide range of configuration options. FTP Servers have earned a reputation for being outdated and unsecure.  This isn’t entirely undeserved. But it’s still a highly used technology, as is the more modern and secure SFTP protocol So what do you really […]

What is Managed File Transfer?

Managed File Transfer (MFT) is server software that performs secure data transfers, with added features that provide automation, validation, and reporting. MFT servers ensure that file exchanges with other systems and servers, as well as with end users, are accomplished with minimum manual effort and maximum accountability. MFT servers include advanced visibility to monitor data […]

Cloudy with a chance of data loss: Has corporate IT lost control?

There is real danger that the current climate of freedom and flexibility enjoyed by many enterprise businesses using cloud computing could be overshadowed by a storm looming on the horizon. The unsanctioned use of consumer-oriented file-sharing services across businesses is a growing concern for IT departments everywhere. Often referred to as the ‘Dropbox problem’ by […]

PGP Encryption – Why should I use it?

What is PGP? PGP stands for Pretty Good Privacy, which is easy to remember, but also not terribly descriptive. PGP is a way of encrypting data that’s stored on workstations or servers. Its most popular use is to secure email attachments, since email is not sent over a secure protocol. PGP is a free tool […]

What is Two-Factor Authentication?

When you attempt to access data on a server, an authentication process goes on behind the scenes to prove you have permission to access data. This can be as simple as entering a password. Some servers even allow anonymous access, which allows anyone to request data (this is terribly insecure, however, and unacceptable in secure […]

What is SSL?

SSL Secures Transactions and File Transfers While FTP paved the way for common-use applications of file transfer, here it is a legacy protocol with many unpluggable security holes. Certain measures can be taken to make FTP more se,  such as turning off anonymous access and heightening the security of your firewall, but this doesn’t make […]

The Corporate Firewall

Corporate networks today rely on a router and/or firewall to protect their computers or LAN from unauthorized external access. Firewalls provide security by filtering or redirecting inbound traffic. A firewall can be implemented as software or hardware and works by examining packets of information passing into a network through ports. We explored packets a bit […]

UNC Paths for Data Storage and Networking

Scalability is a hot topic in server technology today. Large companies want to use their hardware to maximum efficiency. They want servers that handle both everyday file exchange and spikes of high traffic. At the most basic level, order a server must have access to the data a user needs and the capacity to deliver […]

Contact us today if you’d like to discuss your needs with an experienced MFT consultant.

Contact Us