Best Practices

Ad Hoc File Sharing

 Companies should consider more solutions and services that manage collaborative interactions and proactively apply encryption, access control, authentication, digital loss prevention and content management.   

Automated File Transfers

  IT teams that rely on a tangle of legacy scripts and manual processes to accomplish file transfer workflows are less agile, and more error prone and likely to expose sensitive data in a security breach.  

Enterprise File Synch and Share (EFSS)

  Regardless of efforts to enhance security, EFSS services mostly remain outside of IT control.  

File Non-Repudiation

Non-repudiation is the ability to prove that the file uploaded and the file downloaded are identical.  

File Transfer Compliance

Offers 8 technical controls that are key to passing file transfer compliance audits.

File Transfer Scripts

 Automating repetitive file transfer tasks via PowerShell scripts can save IT Pros a ton of time and eliminate human error, but you need to follow these best practices.   


GDPR (General Data Protection Regulation) should be applicable across the 28 EU member states by the end of 2017. Are your data security practices in compliance with GDPR?  

Configuration Manager

Network Health

Software that can proactively assess and manage overall network, system and applications health should form a vital component of your organization's network monitoring strategy.  

MFT Gateway

An MFT Gateway allows security administrators to shelter data in a private network to meet advanced compliance requirements.

Secure Healthcare File Transfer

Transferring clinical data from one facility to another? Sending rich-media medical files to an attending physician? You'll need to do it securely and in compliance with HIPAA.  

Security and Compliance Frameworks

Companies in highly-regulated industries can adopt a security framework like PCI or COBIT to manage compliance initiatives.


FIPS 140-2 is a standard published by the U.S. National Institute of Standards and Technology (NIST) to ensure security, quality and compatibility of online services.

Virtual Infrastructure Management

 Discovery and inventory of virtual machines is essential to maintain security, and simplify troubleshooting and routine maintenance.  

Best Practices: IT Management for Healthcare Services

Best Practices: Log Management & Compliance for the Healthcare Industry

Safe Harbour Regulations

Recently US organizations have come under fire for not adhering to Safe Harbor and recent court cases have put the future of Safe Harbor into question. 

File Transfer Logging

  When considering what kind of logging you'll need, start with those internal and external needs as drivers.   

MFT Software

MFT (Managed File Transfer) software provides the security, reliability, and control required by businesses moving large volumes of sensitive or protected data. 

Network Management Dashboards

Network management dashboards are ideal for trend predictions, performance analysis and for spotting security issues.   

SFTP Server

FTP Software

What is, how to use and how to find FTP software.

How to Shift Gears from Manual to Automatic File Transfers Without Scripting

Every IT team wants to steer clear from the inefficiencies and costs that come from managing file transfer scripts needed to support important business functions. Below we showcase a customer's automation success story and a video on script-free file transfer automation.

How to Avoid Downtime and Keep Operations Running with Network Monitoring

Considering that industrial robots keep production moving at Klein Steel, a systems failure would cause everything to come to a grinding halt. Below we showcase this steel manufacturer’s network monitoring success story and a video on delivering continuous availability through network topology maps and performance analysis. 

How to Stay Ahead of Network Vulerabilities

Every IT team has to stay ahead of network vulnerabilities, especially those with a lot at stake. Below we showcase how a casino keeps its network properly configured to keep the back door shut tight along with a video on automated configuration management.   

How to Achieve High Availability and Meet SLAs with Managed File Transfer

IT teams, especially those in regulated industries, must protect files in transit and at rest. Below we showcase West Corporation’s success with using managed file transfer technology to deliver high availability AND security with a video on on delivering high availability while meeting service level agreements (SLAs).

How to Replace Open Source Network Monitoring

Integrating multiple IT environments and building out major application platforms requires something a lot better than an open source network monitoring product for performance management and troubleshooting.

How to Make File Transfer Easy for Users

Like many companies, Continental Automotive relied on complex and unwieldy file transfer processes. With users requesting many one-time-only transfers, they were spending too much time and money creating scripts for what should be a simple, automated, and secure process. 

Network Mapping Tool

Network mapping tools enable the visualization of network device connectivity and logical network structure. 

SNMP Monitor

IP Address Management

Network Device Discovery

SNMP Management Software


Network Device Monitoring

Bandwidth Monitor

Bandwidth Utilization


Asset Inventory

Bandwidth Monitoring

Monitoring bandwidth usage is a vital aspect of any network management strategy.