Subscribe to get all the news, info and tutorials you need to build better business apps and sites
We'll update you weekly with all the latest news and tips you need to develop and deploy today's business apps.
There are lots of file transfer protocols to choose from, but one that’s rarely discussed in depth is AS2. In this article, we take a deeper look at AS2, how it stacks up against SFTP, and why you would choose one or the other.
In our computerized world, things tend to be reduced to binary as often as possible. 1 or 0. On or Off. Positive or Negative. Access Granted or Access Denied. That shouldn't always be the case.
Security policies are prone to change, and you need to keep your users up-to-date on those changes so that they won't violate the terms of the policy, but doing so is often easier said than done.
Progress and Ipswitch are proud to announce the release and general availability of MOVEit 2019.1, the newest iteration of the industry leading MOVEit secure managed file transfer (MFT) solution used by thousands of IT professionals to provide complete visibility,...
Efficient collaboration and peer-to-peer file sharing are important for any job, but you don't want to do it in a way that leaves data unprotected.
Large scale data migrations is a grueling process. This is why multiple failovers and automation in a managed file transfer tool will be your best option in avoiding data loss or corruption.
Just 28% of gov.uk domains have implemented new email security standards from the Domain-based Message Authentication, Reporting and Conformance (Dmarc) protocol, according to a study from data security company Egress.
We're excited to announce the latest version of our managed file transfer (MFT) solution, MOVEit 2019! We’ve included a bunch of new features that make it easier to use, provide more flexible security options and make scaling to cloud services like Microsoft Azure...
Ipswitch has recently released its new MOVEit Transfer connector to MuleSoft’s Anypoint Exchange. This connector will enable MuleSoft customers to easily integrate secure managed file transfer capabilities into their Mule applications, leveraging the power of Ipswitch’s...
How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?