The Importance of File Transfer and Antivirus Security
Business-to-business (B2B) digital file transfer refers to the process of transferring electronic files between two or more businesses. This can include documents, images, videos, and other types of digital content. B2B file transfer is commonly used for sharing important information, such as financial data or …
3 File Size Limits with SharePoint
SharePoint refers to a few different products and technologies, all great when it comes to quality and the capabilities it offers. The security features, updates, and other features are exceptional. Highly customizable, many organizations use SharePoint to create websites. They use it to store, organize, …
How to Prevent Data Breaches
As more companies move into a digital, cloud-based world, it’s become more common to hear of security breaches. The best way to protect against the cost and negative consequences that come with data breaches is to take precautionary measures to prevent them. There are many …
What is SOC 1 vs SOC 2?
SOC stands for “System and Organization Controls”, formerly Service Organization Control reports. SOC covers a suite of reports from AICPA that CPA firms can issue in connection with system controls at an organization. In total, there is SOC 1, SOC 2, SOC 3, and SOC …
IBM Support Portal – Updating Your Case Notifications Preferences
To update your profile settings: Visit the IBM Support Site at https://ibm.com/mysupport. If you are not already signed into the community, click the user icon in the upper-right corner of any community page, then click Log In, and then sign in with your username and password. Figure …
What Does StrongDM Do?
The way people manage access to infrastructure has changed since the cloud. There are a plethora of servers, database management systems, and cloud providers. Trying to piece all of these platforms together can waste valuable time and damage the customer experience. Instead, companies need a …
What Does Zero-Day Vulnerability Mean?
When someone detects that a software or hardware contains a potential security issue, the vendor is notified appropriately in order to take action. Software companies will fix the code and distribute a patch or software update. However, if someone else has detected a vulnerability and …
HA Redis Configuration
Introduction: HSTS 4.1.1 included a re-architected of HA Redis this configuration is for 4.1.1 or later. The configuration steps below apply to new installs as well as the previously configured cluster being upgraded from a version prior to 4.1.1. The cluster consists of an odd …
Using Lua Scripts with IBM Aspera High-Speed Transfer Server
Introduction IBM Aspera High-Speed Transfer Server (HSTS) includes embedded support for executing Lua scripts in response to transfer events. Learn more about Lua at https://www.lua.org/. HSTS makes information available about the transfer session and file events within a session. This allows you to record information …
Working with AWS Glacier and Aspera on Cloud
Introduction IBM Aspera on Cloud (AoC) is a SaaS offering that provides a friendly user-oriented web interface for collaboration and sharing on top of Aspera’s industry-leading FASP protocol for high-speed data transfer. AoC allows organizations to easily attach and transfer to and from their existing …