One of the ongoing goals for this blog is to provide our readers with pertinent articles in the world of managed file transfer and data security. I recently read an article written by Charlie Osborne a blogger for ZDNet’s blog Zero Day, entitled: “The top ten most common database security vulnerabilities”. (more)
Comments Off on Ten Database Security Vulnerabilities That Can Leave Your Company Open to Attack
After explaining to a friend the type of work I do as a bTrade managed file transfer (MFT) specialist, he said: “Moving data from one place to another is pretty simple.” Generally speaking, he is correct. But as the saying goes, the devil is in the details.
You need to know the details of your file transfer scenarios in order to deploy a truly effective “managed” file transfer system. Today, I want to go over three of the basic types of file transfer—B2B (Business to Business), A2A (Application to Application) and Ad hoc transfers. (more)
Comments Off on Three Basic Managed File Transfer Scenarios
Anyone involved in the search for a Managed File Transfer (MFT) solution knows that the MFT process is becoming increasingly complex. Previously, we’ve discussed some crucial aspects of the MFT process. Today, I’d like to introduce you to another key issue--the volume and frequency of file transfers. (more)
Comments Off on Managed File Transfer Maxim: Know Your File Transfer Frequency/Volume