If you have ever worked in the IT industry over the past 20 years, and have dealt with data storage for any amount of time, you probably are aware of the acronym “MFT.” You know it stands for master file table, a “table of contents” if you will, containing information on every file within a NTFS hard drive. (more)
“Uncertainty and expectation are the joys of life.” An English playwright and poet offered this observation over 300 years ago, but it applies equally well to data security issues we will face in 2014. With concern about cyber security at an all-time high, enterprises of all sizes are naturally anxious about what may come next. Given such widespread uncertainty, government at all levels will get involved in an effort to “solve” perceived problems. Consequently, data security and related privacy issues will be the focus for 2014, and beyond. (more)
In 2014, the managed file transfer community will no doubt be faced with many data security/data management challenges, which we will cover and discuss throughout the year. But for now, we would like to take a moment to reflect on the tremendous year we had in 2013. (more)
High availability can invoke feelings of insecurity when it comes to evaluating your managed file transfer software resources, but it need not be such a scary prospect. In its simplest form, high availability allows you to ensure that your system will be operational as close to 100% of the time it needs to be. (more)
As the winter trade show season begins, we have packed up the bTrade trade show booth and are heading across the country to meet with prospects and customers.
Here are three reasons we love tradeshows: (more)
We presented at a gathering of IT professionals where the topic of discussion was data security. Our presentation focused on how a managed file transfer solution can address issues relating to “governance, risk and compliance,” or “information governance” (IG) as it has become to be known. During the presentation, we learned that a good number of people were unfamiliar with the concept of IG. So, to avoid any confusion, we will start by defining IG. (more)
The door has closed on 2013, but as I look back at the last data breach of the year, the theft of records for 40 million U.S. based Target store customers has fast become the second largest retail data breach in U.S. history.
The breach was reported December 18 by the website Krebs on Security, and Target later confirmed that hackers had access to the company’s network from November 27 through December 15. Initially, Target confirmed that customer information (names, credit card numbers, etc.) was the only data accessed, but later announced that encrypted PIN (Personal Identification Number) data was taken as well. (more)
Catch up on the latest Managed File Transfer news from bTrade.