
Security breaches are occurring at an alarming rate as cybercriminals continue to successfully infiltrate the IT infrastructures of organizations across many industries.
Adam Bertram | | Automation | IT Insights
Changes can make infrastructure better or can bring it to its knees. Change management is a crucial part of managing infrastructure in an IT pro’s world. When you do make changes, are you sure you changed the right setting? Are you sure that change you made didn’t affect...
Jeff Edwards | | File Transfer | IT Insights
We’re proud to announce that Software Reviews, a division of research and advisory firm Info-Tech Research Group Inc., has named MOVEit® managed file transfer software as a Data Quadrant Gold Medalist in their new Managed File Transfer Category Report.
Jeff Edwards | | IT Insights | Security
With the EU’s General Data Protection Regulation (GDPR) now in effect, GDPR preparedness should be top of mind for businesses everywhere, not just those based in the European Union (EU). This GDPR overview will take you through the basics, including the seven principles...
Prateek Singh | | Automation | IT Insights
Amazon Web Services enables you to create a custom defined virtual network also know as Amazon VPC or Amazon Virtual Private Cloud, which, just like any traditional network in a data center, is highly scalable and easily configurable using programming languages like...
Application programming interfaces, otherwise known as APIs, are an important aspect of any piece of software or platform. If you think about all the data that passes through an application these days, it is hard to think of a time when APIs weren’t an integral part of...
Jeff Edwards | | File Transfer | IT Insights | Security
Just 28% of gov.uk domains have implemented new email security standards from the Domain-based Message Authentication, Reporting and Conformance (Dmarc) protocol, according to a study from data security company Egress.
Greg Mooney | | Security
I got a chance to sit down with Kevin Conklin, the VP of Marketing at Ipswitch to talk more about the new MOVEit 2019 release and how the new MOVEit is now integrated with Mulesoft’s Anypoint Exchange.
Ah, the cloud. It's changing the face of IT forever, and while it's at it, it's providing us with a never-ending stream of acronyms.
Mark Towler | | File Transfer | IT Insights
We're excited to announce the latest version of our managed file transfer (MFT) solution, MOVEit 2019! We’ve included a bunch of new features that make it easier to use, provide more flexible security options and make scaling to cloud services like Microsoft Azure...
IT keeps schooling you about the dangers of Dropbox, Google Drive, OneDrive, and other online file-sharing services. But you still need to collaborate with your colleagues as well as your customers and business partners.
John Picinich | | Automation | File Transfer | IT Insights
Ipswitch has recently released its new MOVEit Transfer connector to MuleSoft’s Anypoint Exchange. This connector will enable MuleSoft customers to easily integrate secure managed file transfer capabilities into their Mule applications, leveraging the power of Ipswitch’s...
Prateek Singh | | Automation | IT Insights
Amazon Web Services offers a very popular object storage service known as Amazon S3 (Simple Storage Service) that enables you to store data, files, images and even videos in highly available containers called ‘buckets’ which are also easy to access endpoints using any...
Jeff Edwards | | Automation | File Transfer | IT Insights
Your IT team strives to deliver non-stop, high-performance services in support of your organization. It can be surprising how big of a role file transfer services can play in that effort.
Dan Franciscus | | Automation | Security
Before Windows Server 2008, Active Directory password policies were done with default domain group policy, and there could only be one policy for an entire Active Directory domain. This is very limiting if users would like to give different policies to different users,...
How is it that so many organizations focus on perimeter defense but do little to protect the target data inside that perimeter? Wouldn’t it be wonderful to protect sensitive data even if the network is breached?
Adam Bertram | | Automation | IT Insights
Everyone has a morning routine that proceeds nearly the same way every day. We get up, brush our teeth, take a shower and put our clothes on. Every morning, this predictable routine repeats itself. It's like clockwork. It rarely, if ever changes. Think of your morning...
Michael O'Dwyer | | Automation | Security
We all know it and are no doubt tired of hearing it, but in today’s global technological landscape, there is an ongoing and increasing danger of being hacked.
Adam Bertram | | Automation | Cloud | IT Insights | Security
When working with Microsoft Azure, you'll inevitably come to a point to where you need to access material stored locally on premise.
Greg Mooney | | Automation | Security
Automation is not always AI, but AI is an automated system. It’s easy to get the two terms confused because they both run off the same thing—data. However, the differences are far-reaching, and it’s important to know the differences between AI and Automation.
Let's stay in touch! Register to receive our blog updates.
Let's stay in touch! Register to receive our blog updates.