al B2B Secure File Sharing Blog | FTP Today | Secure File Sharing

x Close

Take a Tour

Secure File Sharing Blog

B2B File Sharing Blog

Secure file sharing software information, file sharing trends and announcements.

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

Comparison: Buy vs. Rent an FTP Server

Organizations that regularly handle, store and share sensitive information often rely on file transfer protocol — FTP for short. These organizations — like law firms, financial institutions, medical providers, government agencies and others — are forced to make a decision. Is it better to buy vs. rent an FTP server? There’s a clear answer to this question for organizations that need an FTP server to securely manage sensitive information and documents. Here’s a rundown of what FTP servers are used for, how they are different from HTTP servers, plus the costs and benefits to consider when debating whether to buy vs. rent an FTP server.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Secure File Sharing The Cloud

File Share Best Practices for 2021 and Beyond

Cybercrime has skyrocketed in the last 18 months. Malware, phishing and other tactics are widely known, and IT teams go to great lengths to protect their organizations from these attacks. But companies that aren’t following file share best practices could also be at risk.

Read More
Secure File Sharing

Get the answers to your secure file sharing questions!

Are you trying to select a new file sharing solution, but you have a few questions first? Explore these common questions about file sharing solutions and find out their answers.

Blog Feature

Cyber and Data Security DFARS FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST PCI Secure File Sharing The Cloud

FTP Today Partnership with Carahsoft for GOVFTP Cloud

In a press release last year, Carahsoft announced FTP Today has joined the Carahsoft Cloud Purchasing Program (CPP). The program is for government contractors who rely on CarahPoints to purchase the software and tools necessary to run their business. Continue reading to find out what this could mean for you!

Read More

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

Drive Mapping: Everything You Need to Know

On more than one occasion, our clients have asked if it’s possible to map files directly to a computer drive from the FTP Today application, whether that be The FTP Cloud or the GOVFTP Cloud. The process of this is called ‘drive mapping’ throughout the industry, and it is simple to accomplish. Today, we’re going to walk you through how drive mapping works, options for drive mapping, and finally, how to do so with FTP Today. 

Read More

Blog Feature

Announcements Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Latest Features Secure File Sharing The Cloud

What is an API (Application Programmable Interface)? The Basics & Benefits

Recently, FTP Today launched a new feature as part of our platform called an Application Programming Interface, otherwise known as an API. Don’t be intimidated by the name! An API is useful for many things, and if your organization has access, it’s something you should take advantage of. This blog is meant to give an overview of what an API is and how it works.

Read More

Blog Feature

Cyber and Data Security FTP Cloud FTP Solutions File Sharing Best Practices GOVFTP Cloud Government Compliance ITAR Secure File Sharing The Cloud

Single Sign-On (SSO) Explained: What is SSO, How it Works, Why it Improves Security & More

In recent years, FTP Today has received many questions from our customer base regarding Single Sign-On, otherwise known as SSO. This blog is meant to educate the reader on definitions and use cases as the technology has become widely adopted across organizations of all sizes for administration and security purposes.

Read More

Blog Feature

FTP Cloud FTP Solutions GOVFTP Cloud Secure File Sharing

Compare File Sharing Solutions Before Committing: Free Trials for Your Proof of Concept

Are you looking for a secure FTP hosting option  or a file sharing solution that will fit your company's needs? A simple internet search will show you the sheer number of options available. How will you choose the right one?  A smart way to ensure you pick the ideal file sharing solution for your business is to schedule free trials, so you get a feel for the solution and its capabilities. This is called Proof of Concept (P.O.C.). It’s also wise to see how each solution stacks up against the competition.   Let’s look at the Pros and Cons of different  secure file sharing solutions  and their Free Trials to determine which one is ideal for your business. Here are the top players, listed alphabetically.

Read More

Blog Feature

CMMC Cyber and Data Security DFARS FTP Solutions GOVFTP Cloud Government Compliance ITAR NIST Secure File Sharing

How GOVFTP Cloud Managed File Transfer Compares to Microsoft SharePoint GCC

You might be asking yourself, “why are collaboration platforms competing with Managed File Transfer (MFT)?” Great question. Normally, they don’t, and to be honest -- they shouldn’t. These are not the same. The commonality regarding these two is mainly that files can be stored or sent within MFT and MFT as-a-Service (MFTaaS) platforms, as well as within collaboration platforms. However, as we’ll see later, it’s not without difficulty if you’re trying to use a collaboration tool like Microsoft O365 as a MFTaaS tool.

Read More

Blog Feature

Cyber and Data Security Secure File Sharing

Why Use SSH-Key Authentication for SFTP Instead of Password Authentication?

When you think of user access security, you might think of traditional security measures, like submitting your username and password. While these basic security measures may have protected you in the past, they’re not quite strong enough to withstand advanced attacks from today’s hackers.  Thus, many organizations are turning to SSH-key authentication to provide a greater level of security for SFTP solutions compared to traditional password measures. In this article, we’ll look at what SSH-Key Authentication entails, and how this security measure protects your data better than other options. 

Read More