November 3rd and 4th, Utrecht, Jaarbeurs  We're happy to announce that BlueFinch takes part in TBX Event (Tech, Business, Accelerate), the long-awaited successor to the IT exhibition Infosecurity.nl, Data & Cloud Expo.  Rooted in the belief that with the right IT solutions your business challenges can be resolved and the digital transformation in your organisation...

Today, data is a valuable commodity. It has value to the organisations who own it and to those looking to exploit it through illegal activity. Data can be sensitive information about customers and employees, financial or strategic information, product designs or intellectual property, or any...

A simple and complete platform to improve your IT defence. While the majority of companies face the demands of a hyperconnected society, cyberattacks are evolving exponentially. According to an Opinion Matters/VMware study, "76% of all companies fear the occurrence of a major cyber incident in...

Protecting customer data from loss and leakage has become a top priority for enterprises over the past decade. Recent HelpSystems research with CISOs in global financial service organisations found that almost one-third believe data breaches have the potential to cause the most damage over the...

How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their...

Recently BlueFinch has officially partnered with The Hague Security Delta (HSD). HSD is the leading security cluster in Europe with important regional hubs in The Hague, Twente, and Brabant. In a combined effort with all other partners BlueFinch wants to stimulate innovation in security and...

Applicability Statement 2 (AS2) is a popular file transfer protocol that allows businesses to exchange data with their trading partners. AS2 combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing the strengths of each of...