Blog
Why is Cybersecurity Important
Cybersecurity is becoming more important due to the increasing frequency and sophistication of cyber threats. It plays a critical role in protecting …
What is Container Security?
It’s essential for organizations to assess their systems to identify all possible vulnerability points as security threats and opportunities to tamper with …
What Should a Company Do After a Data Breach?
It’s not just big companies that experience data breaches. Mid-sized and smaller companies are also facing the same issues each year when …
What is CVE in Cybersecurity?
Common Vulnerabilities and Exposures (CVE) is a database of public information on security issues. A CVE number identifies one vulnerability from that …
What Is Filtering In Cybersecurity?
Content filtering is one of the most common security solutions used for businesses. The primary function of filtering in cybersecurity is to …
Is SFTP Encrypted?
Transferring files is a crucial part of business for most large companies. When it comes to transferring larger files or large volumes …
Alternative to FTP: The Top Secure Alternatives to FTP
File Transfer Protocol, FTP, refers to a method to transfer files between devices over a network. Originally used as a way for …
What is Cloning in Cyber Security?
Even as more businesses educate users on cybersecurity best practices, attackers find new ways to bypass training . They trick employees into …
Learning About Cyber Security
As technology continues to evolve, the demand for cybersecurity grows with it. Whether it’s being used to protect people’s home computers or …
What is Digital Asset Management?
Digital asset management (DAM) is how businesses store, share, organize, find, and retrieve digital files from their library of content, media, images, …
Trend Micro Cloud One Suite of Offerings
Security in the cloud is crucial to any company looking to keep its applications and data protected from cyber threats. Maintaining a …
What is Whaling in Cyber Security?
Whaling, or whaling phishing, is a cyber attack that occurs when the attackers utilize “spear phishing” methods to go after large, high-profile …
PacGenesis Partners with Top-Tier Technology Companies
PacGenesis is your trusted advisor for finding and implementing business solutions focused on digital file movement and security. We’re passionate about solving …
What is Role-Based Access Control?
An employee’s role in an organization determines the permission that individuals are granted and ensures lower-level employees can’t access sensitive information or …
3 File Size Limits with SharePoint
SharePoint refers to a few different products and technologies, all great when it comes to quality and the capabilities it offers. The …
Account Onboarding
Welcome, we’re glad to have you as an Aspera customer of PacGenesis, Inc! We hope to make your adoption of Aspera as …
How to Prevent Data Breaches
As more companies move into a digital, cloud-based world, it’s become more common to hear of security breaches. The best way to …
What is Observability vs Monitoring?
Observability and monitoring are often referenced when discussing IT software development and operations strategies. They both play key parts in keeping systems, …
What is Zero Trust Architecture?
Zero Trust is an approach to cybersecurity that secures an organization by eliminating implicit trust and validating every stage of a digital …
IBM Aspera Mobile Released
IBM Aspera Mobile v1.0 has been released for iOS and Android. This single app replaces all previous Aspera mobile apps and supports …
IBM Aspera Faspex 5 Released
Introduction Aspera Faspex is a widely-used web application with an easy-to-use email-like interface for sending and receiving digital packages, utilizing the FASP …
IBM Support Portal – Updating Your Case Notifications Preferences
To update your profile settings: Visit the IBM Support Site at https://ibm.com/mysupport. If you are not already signed into the community, click the …
What is the Difference Between Proxy vs Reverse Proxy
Businesses often use proxy servers to help prevent cyber attackers from accessing their private networks. It is an “intermediary” between end-users and …
What Does Zero-Day Vulnerability Mean?
When someone detects that a software or hardware contains a potential security issue, the vendor is notified appropriately in order to take …
What Does Data Breach Mean?
A data breach is a cybersecurity incident where malicious insiders or external hackers gain unauthorized access to data or sensitive information, including …
Privileged Access Management
In today’s complex IT environments, Privileged Access Management (PAM) plays a critical role in protecting sensitive data, systems, and accounts. PAM is …
Faspex Newest Patch Level
IBM Aspera Faspex announced the latest release of the Faspex 5.0.1 and Faspex 4.4.1 Patch Level 12. Both of these releases resolve …
Cybersecurity and Media Streaming Companies
Aspera IBM Aspera focuses on overcoming the limitations that exist when moving big files over long distances. IBM Aspera is a software …
What is AWS
AWS, or Amazon Web Service, is a cloud platform that offers several on-demand operations to help corporate companies scale and grow. It …
What Clouds are Supported by Aspera and PacGenesis?
Aspera FASP high-speed transport platform provides businesses with a secure form of transportation for files, directories, and other large data sets to, …
Accessing the Faspex 5 Utility Application
Introduction IBM Faspex 5 is the latest version of the popular Faspex web application, with modern architecture and an updated user interface. …
Changing the Configuration of a Running Watch Folder
Introduction IBM Aspera High-Speed Transfer Server (HSTS) and High-Speed Transfer Endpoint (HSTE) include a powerful Watch Folder feature that allows users to …
PacGenesis Announced as a 2022 IBM Champion Award Winner
Austin, TX, April 15, 2022 – PacGenesis is excited to announce they have won the IBM Champion Award for 2022, a program …
How to Use SFTP
As technology continues to evolve, the movement of data, information, and content is paramount to most industries. In many cases, transferring a …
Why Do Companies Conduct Cybersecurity Risk Assessments?
Cybercrime has become one of the largest threats to industries, especially in the digital age. Cybercriminals have sophisticated technology and techniques to …
What is Network Latency?
When there is a request sent to a server across the internet, there is a series of network reactions involved. A typical …
What is End-to-End Encryption File Sharing
Data transfer and file sharing are crucial to running a business in the digital age, but it has led to challenges for …
Aspera Shares Automated Backups
Introduction IBM Aspera Shares is a web application that enables companies to share content in the form of files and directories of …
Aspera HSTS (High-Speed Transfer Server) Automated Backups
Introduction Your Aspera transfer server is a powerful, customizable hub for your high-speed transfer activity. Configuration settings allow you to control which …
Log File Locations for IBM Aspera Web Applications
Introduction IBM offers several customer-managed web applications that extend functionality and enable workflows around high-speed data transfer. Aspera Faspex and Aspera Shares …
Configuring Transfer Hostnames for Faspex and Shares
Introduction IBM Aspera Faspex and IBM Aspera Shares are web applications that give a friendly web interface for end-users to transfer data …
Aspera Faspex Automated Backups
Introduction IBM Aspera Faspex is a file exchange application built on IBM Aspera High-Speed Transfer Server as a centralized transfer solution. With …
OneDrive for Business File Size Limit
Remote work and learning has increased, which means there is a need to reliably and securely transfer and share large files like …
PacGenesis Attending the NAB Conference 2022
PacGenesis will be attending the 2022 NAB Show from April 24th-26th in Las Vegas, Nevada. They will be showcasing the latest digital …
Which Remote File Access Protocol is an Extension of SSH?
SSH protocol, also referred to as Secure Shell, is a method for remote login from one computer to another. It provides an …
What Is Cybersecurity?
To combat these modernized attacks, cybersecurity is an ever-evolving segment of data protection that looks to minimize the threat of data attacks, …
A Beginners Guide to Digital Asset Management Workflows
Over the last few years, the creation of creative content has expanded beyond the limits of manual processing. Legacy solutions have become …
How to Transfer iPhone ProRes Files
Released with the iPhone 13 Pro and iPhone 13 Pro Max and utilizing iOS 15.1 or later, the Camera app can record …
7 Reasons to Use Cloud Over On-Premise File Sharing
If your business is trying to decide whether to send and share files on-premise or in the cloud, it’s important to not …