• Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Special Offers
Business Intelligence Info
  • Business Intelligence
    • BI News and Info
    • Big Data
    • Mobile and Cloud
    • Self-Service BI
  • CRM
    • CRM News and Info
    • InfusionSoft
    • Microsoft Dynamics CRM
    • NetSuite
    • OnContact
    • Salesforce
    • Workbooks
  • Data Mining
    • Pentaho
    • Sisense
    • Tableau
    • TIBCO Spotfire
  • Data Warehousing
    • DWH News and Info
    • IBM DB2
    • Microsoft SQL Server
    • Oracle
    • Teradata
  • Predictive Analytics
    • FICO
    • KNIME
    • Mathematica
    • Matlab
    • Minitab
    • RapidMiner
    • Revolution
    • SAP
    • SAS/SPSS
  • Humor

FTPS, SFTP and PGP Encryption: Core Components of a Secure File Transfer Strategy

October 24, 2018   Big Data
blog FTPS SFTP PGP FTPS, SFTP and PGP Encryption: Core Components of a Secure File Transfer Strategy
Townsend Security avatar 1531769865 54x54 FTPS, SFTP and PGP Encryption: Core Components of a Secure File Transfer Strategy

Townsend Security

October 24, 2018

Syncsort recently acquired the IBM i encryption and security products of Townsend Security. The article below is an update to their popular blog post on SFTP, FTPS and PGP encryption.

3 Core Components to Securing Data in Motion

One simple way to ensure the security of your data is to use a secure managed file transfer solution to protect and secure transfers as they move on or off your system using strong encryption. There are two primary mechanisms used for transferring the data:

FTP with SSL (FTPS)

FTPS is a file transfer protocol that has been updated to support encrypted sessions.

Implemented based on industry standards and integrated with the IBM i Digital Certificate Manager (DCM), new IBM i platforms have DCM installed by default. Our own solution, Alliance FTP Manager, adds things like intelligent firewall negotiation and proxy server support to make those connections easier to deploy, as well as integrated logging to make sure that the sessions are properly logged to comply with regulations and enable successful compliance audits.

Secure File Transfer Protocol (SFTP)

SSH (Secure Shell) FTP , also called Secure File Transfer Protocol (SFTP), is a Linux and UNIX facility that also exists in the IBM i platform to provide encrypted transfers to and from your IBM i platform.

SSH FTP (SFTP) is easier to manage from a firewall point of view than SSL FTP (FTPS) based on how it encrypts, establishes, and maintains sessions. Syncsort fully supports password-based SFTP in batch mode and is the only vendor who fully implements that capability according to the standard.

The third critical components to a including data in motion in your secure file transfer strategy is file encryption using Pretty Good Privacy (PGP).

Pretty Good Privacy (PGP)

PGP encryption protects data at rest, and it is also critical to providing privacy for data communications. When you move data securely across the internal network or across the internet, you need to be sure that it’s properly encrypted at its destination. FTPS- and SFTP-encrypted sessions are great at protecting data when in transit; however, when that data lands on an FTP server, it may not be inside a firewall and could be exposed.

PGP is the most widely deployed encryption to protect data, and it plays a fundamental role in managed file transfer. It is commonly used across a spectrum of enterprise industries including retail, financial services, health care and insurance.

Related: AES vs PGP Encryption: What is the Difference?

blog banner webcast securing data at rest in motion FTPS, SFTP and PGP Encryption: Core Components of a Secure File Transfer Strategy

Commercial PGP Encryption

The commercial version of PGP — created by the original developers and now supported by Symantec — is fully implemented in our Alliance FTP Manager solution. Commercial PGP encryption offers several features important to enterprise clients, such as:

  • Support for additional Decryption Keys (ADK) allows you to encrypt a file and send it to multiple people without using the same key. You can encrypt the file and add your own decryption key, which allows you to recover that data as part of a discovery process to prove what data was actually sent to a recipient.
  • Key server support in addition to local PGP encrypted key stores on the IBM i platform and for z/OS mainframe.
  • Support for Self-Decrypting Archives (SDA) for multiple platforms.
  • Commercial PGP has been through multiple rounds of FIPS 140-2 certification over the years. Both the source code and the application have been thoroughly vetted by independent security professionals numerous times, and that code has been open for public review.

Beyond the three core components for secure file transfer, you need three additional items to confirm that the encryption being used is defensible and has been reviewed by security professionals:

  1. Good audit trails
  2. Real-time system logging integrated with the IBM i security audit journal (QAUDJRN)
  3. Certifications through NIST and FIPS 140-2

Syncsort’s Alliance FTP Manager offers the three core components of a secure file transfer solution and address all three additional requirements to ensure your data is secure when in motion.

For more information about encryption, watch our webcast: Securing Sensitive IBM i Data At-Rest and In-Motion

Let’s block ads! (Why?)

Syncsort Blog

Components, Core, encryption, File, FTPS, Secure, SFTP, Strategy, Transfer
  • Recent Posts

    • Ba’al comes to CPAC, Ted Cruz jokes about his Cancun trip
    • Optimizing data migration/integration with Power Platform
    • AI Weekly: Biden calls for $37 billion to address chip shortage
    • NOT WHAT THEY MEANT BY “BUILDING ON THE BACKS OF….”
    • Why Healthcare Needs New Data and Analytics Solutions Before the Next Pandemic
  • Categories

  • Archives

    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • March 2020
    • February 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    • December 2016
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • April 2016
    • March 2016
    • February 2016
    • January 2016
    • December 2015
    • November 2015
    • October 2015
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
© 2021 Business Intelligence Info
Power BI Training | G Com Solutions Limited