Blog

Blog

Why You Should Implement a Third Party Vendor Assessment Program

  Image Third party vendors are incredibly useful. They allow businesses to automate certain processes they can’t do themselves, like implement payroll services to compensate employees, and bridge gaps in their technology. But while the money, time, and brainpower freed up by outsourcing tasks is a huge positive, third party vendors...
Blog

10 Easy Ways to Protect Your Data at Work

In a recent survey of UK workers, over half the employees who participated across 1,000 organizations admitted that they open suspicious email attachments. More than 80% also said they open strange attachments if the sender appears to be someone they know, and “one in five said the business they work for has no policy on how to handle email attachments, or they have not been...
Blog

What is MFT and How Does It Work?

Compared to using a variety of standalone FTP and SFTP tools and scripts, managed file transfer (MFT) technology allows professionals to streamline how data is transferred. MFT helps organizations send and receive files in the cloud and across their private networks, create and control workflows, automate business processes, and centralize management from a single system. ...
Blog

7 Steps to Protect Yourself Against Corporate Spear Phishing

Anyone with an email account is used to spam. It happens one day: you get that first unsolicited email, and then a flood of ads, flash sale offers, and foreign bank transaction requests rushes into your inbox. In that moment, the battle for your virtual sanity begins. But while spam emails are mostly harmless—you tend to see them from a mile away and respond accordingly...
Blog

A Reflection on NAB: Media Industry Trends, Challenges and How the Industry is Responding

Image After getting back from the NAB show this year, I have been thinking about some of the media industry trends that present changes, as well as the opportunities. The industry as a whole has been in a state of change: the content itself is rapidly becoming larger, workflows are changing and becoming more dispersed, the way we...
Blog

Top Takeaways from the 2017 Cybersecurity Trend Report

Image Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog.Do you ever wish you knew how other businesses are dealing with today’s security threats? The...
Blog

The State of File Transfer Security

Note from the Editor: This article shares highlights from an older report. For the latest on data security and best practices for keeping file transfers safe, visit our Data Security page or check out the latest additions to our blog. The 2017 Cybersecurity Trends Report was recently released by Crowd Research Partners. The report covers many aspects of cybersecurity...
Blog

TransferAgent Brings the Power of Filecatalyst to the Simplicity of a Web Browser

I just finished watching a webinar our president, John Tkaczewski, gave on the new version 4.9.9 of FileCatalyst Workflow and it was a great learning experience. He gave an in-depth overview of TransferAgent and outlined its features past and new. It was really interesting stuff, so I thought I would write a blog article that outlines some of these new features. Consider this a...
Blog

SSL and file transfers, the marriage of all marriages

The support team here at FileCatalyst team polled our customers who are using FileCatalyst Central v3.6 and asked what type of improvements they would like to see in our next release of Central. Security was a topic of interest to our customers, and they were asking us about the things we are doing in terms of security. With this in mind, we have taken steps with SSL that has...
Blog

Still Using SHA-1 to Secure File Transfers? It’s Time to Say Goodbye

  Image Securing information is rising in importance for organizations worldwide. Using outdated technology is extremely risky, yet many organizations continue to do so because of legacy systems that don’t allow them to upgrade, lack of resources and time to upgrade, or they are simply unaware of the risks. The commonly used SHA-1...
Blog

Moving Big Data in the Oil & Gas Industry

Did you know it takes over $100 million to drill a deep-water well? Holding true to the cliched phrase oil and gas companies know all too well: it takes money to make money. The deep digging associated with the oil and gas industry requires equally deep pockets. When it comes to making the big business decisions required in the oil and gas industry, major companies like Shell,...
Blog

How To: Change Emulation Mode in Internet Explorer to Load TransferAgent Properly

Any FileCatalyst application that previously used embedded Java applets in a browser has a migration path to FileCatalyst TransferAgent. Moving forward with this solution, we have been able to bring functionality of this product Google Chrome v42 and newer. Firefox v40 and newer. Internet Explorer v10 and newer. In Internet Explorer, users have found that the...
Blog

Bringing content to life with Aframe

If you’ve ever tried to send a large video file, you know what a time consuming process it can be. For the production pros using Aframe – the world’s most powerful video collaboration platform – they need to transfer thousands of videos every day. Imagine how long this would take using standard FTP. Image Image ...
Blog

3 Steps to Safeguarding Company Data and Limiting Risk

  Image   Security professionals of today are inundated with headlines about the potential consequences of a data breach. Making headlines for a data breach can cost you – and more than just reparations or a fine. Data breaches are the worst of bad press and can impact your finances for years to come. As security...
Blog

Picking up right where we left off with the 2016 Rio Olympic Games

Over the years, we have had the privilege of working with many customers and partners who have benefited from the FileCatalyst technology and this year, that privilege continues. Once again, NBC Sports and FileCatalyst join forces to deliver seamless coverage of the 2016 Rio Olympic Games. During the Games, NBC Olympics will utilize FileCatalyst technology to move data over a...
Blog

Teleportation, time travel and covered wagons

After the death of Leanord Nimoy this year, I found myself cruising the internet reading about him, about Star Trek, about sci-fi in general. I came across an article about teleportation that really caught my interest. This article pointed out that researchers had worked out how many bits of information were stored in a human being. It was an astounding 2.6 Tredecillion bits ...
Blog

An introduction to data gravity

A couple of months ago, our President and Co-Founder John Tkaczewski had the honour of presenting an introduction to data gravity at the NAB virtual conference. While the concept of data gravity has been around for a few years, it isn’t talked about very often, especially in relation to our business – file transfer. Coined in 2010 by Dave McCrory, the basic concept of...
Blog

FileCatalyst: What does it do (part 3)

Think of the internet as garden hose. Now let’s say that this hose has a kink and the amount of water flowing through the hose is constricted. By bringing in acceleration technology, the kink is removed and now the flow can be as much as the hose can take. The diameter of the hose will be your bandwidth, the higher the diameter the more data we can push, but we can’t push...
Blog

The effect of digital technology adoption in the oil and gas industry

A recent article by CIO UK points out how digital technology is rising exponentially in the oil and gas sector. From seismic imaging to e-learning, 80% of senior executives in the industry believe digital advancements have revolutionized how they work. The remaining 20% believe digital technology has had a tangible impact. No matter who you ask, it’s evident the adoption is...