x Close

Take a Tour

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Martin Horan

Founder of FTP Today and an expert in secure file transfer and Internet protocols. A software and IT geek since a young age, Martin has successfully led his companies through the digital age by spotting market niches and filling them with quality IT services.

Blog Feature

FTP Solutions

How to Evaluate if a Cloud-Based FTP Solution is Right for Your Business

Does your organization need a cloud FTP solution? File sharing is a key aspect of many businesses, but unless you have a uniform, secure way to share files, your data could be at risk.

Read More

Blog Feature

Government Compliance

NIST 800-171 Assessment for DoD Contractors and Subcontractors

Conducting  a security assessment is an essential part of keeping your data protected. It’s not just enough to implement security measures; you need to regularly assess the measures you have in place to determine their effectiveness.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

File Sharing Best Practices

File Sharing Standards Your Team is Failing to Implement

Establishing file sharing standards within your organization creates the necessary security guidelines needed to keep your data protected. However, without the proper file sharing standards in place, your data could be at risk.

Read More

Blog Feature

Government Compliance

AMRDEC SAFE Alternatives for Secure File Sharing

Was your organization a previous user of AMRDEC SAFE (Army Aviation and Missile Research, Development, and Engineering Center - Safe Access File Exchange)? If so, you’ve now been forced to seek out alternative secure file sharing solutions to replace the defunct AMRDEC SAFE. Because AMRDEC SAFE was shut down due to major lapses in security protocols, your organization should find an option that can stand up to the security threats that you face today and ones that you’re sure to face in the future.

Read More

Blog Feature

Government Compliance

Your Complete NIST 800-171 Checklist

If your organization handles controlled unclassified information (CUI), you know how crucial it is to keep that data protected. NIST (National Institute of Standards and Technology) 800-171 was written specifically for organizations like yours to provide guidance on appropriate handling of sensitive data.

Read More

Blog Feature

Government Compliance

NIST 800-171 Questionnaire: Are You Complying With These Access Control Factors?

Are you complying with NIST (National Institute of Standards and Technology) SP 800-171? Because there are so many security controls you must have in place, it can be difficult to determine if you are in total compliance.

Read More

Blog Feature

Government Compliance

14 Questions to Answer on Meeting CUI Security Requirements

Are you looking for clarification on the CUI (Controlled Unclassified Information) security measures recommended in National Institute of Standards and Technology Special Publication (NIST SP) 800-171? These government guidelines can often seem complex, and it can be a challenge to determine the extent to which you have aligned with their policies. Parsing through the business requirements and risk assessments associated with appropriate CUI security protections can be a drain on your time and resources.

Read More

Blog Feature

Government Compliance

NIST Security Controls Assessment Guide

Does your organization have security controls in place, but you’re unsure if they’re effective or align with NIST (National Institute of Standards and Technology) guidelines? NIST Special Publication 800-53 was created by NIST as a benchmark for successful security control assessments.

Read More

Blog Feature

Government Compliance

How to Comply with NIST 800-171

The National Institute of Standards and Technology (NIST) Special Publication 800-171 provides organizations with guides on how to store, share, and protect controlled unclassified information (CUI). To meet NIST 800-171 requirements, there are four areas where you should focus your efforts – access controls, activity monitoring and management, user behaviors, and data security measures. These are the areas where mistakes could open the door for a data breach.

Read More

Blog Feature

Government Compliance

6 Steps to Implement NIST 800-171 Requirements

Has your company taken steps to be compliant with NIST 800-171 regulations? December 31, 2017 was the deadline for companies to be compliant and implement NIST 800-171 requirements. However, many companies may have missed the deadline or have only met some of the compliance requirements, but not all.

Read More