Spendrups Bryggeri AB, founded in 1897, is the largest and most well-known family-owned and independent brewery in Sweden. Four million hectolitres of beverages are produced annually by the company, which employs 1100 people. These beverages are bottled and distributed to Swedish restaurants, the monopoly retail...
Many of the most revolutionary technological advances, such as AI, IoT, and remote/hybrid work, have been made possible by the widespread adoption of cloud computing. Cloud computing eliminates the need to purchase and maintain the costly hardware and software systems normally necessary for such resource-intensive...
Your auditor sends a copy of your company’s recent financial statements to his firm to verify another clean pass. Because he’s worked there for years, he sends the file to his partner without encrypting it and leaves for the day. On his way home, his...
Cyberwatch 12.0 is the new version of the vulnerability management and compliance monitoring platform, and has been released end of September 2022. This article introduces you to the main features of this major Cyberwatch update. By Maxime Alay-Eddine Introduction of a new simpler, clearer, more...
When your network starts to contain a lot of duplicated, outdated, or negligible data, it does suffer the productivity and the organisation of records. The good news is that you can remedy this situation with the right tools. by Ron Diebels How does this impact...
Implementing a Data Classification solution into your environment will do wonders for your cyber security stance. While Data Classification is the logical start of creating a security policy, it is just one piece of the puzzle. By simply marking information and giving it that all important identity, you’re on the right track, but what...
There is no doubt we live in an information-intensive world, one in which getting the right data quickly is often pivotal to an organization’s success. Moving files from point A to point B requires many considerations, but when it comes to large, mission-critical files that...
Before trying to better understand what enterprise data security is, it’s best to know the meaning of data security in a broader sense. In essence, data security is everything that surrounds the protection of digital data from destructive forces or unwanted actions of unauthorized users,...
If you work in cybersecurity, the chances are that you will have come across the phrase Zero Trust over the past few years. It’s become a real industry buzzword, but there is substance behind the noise on this occasion. To the outsider, it’s a term...
As cybersecurity technology continues to advance, some might ask whether secure Managed File Transfer (MFT) is fading away as a viable option for organisations to use for their file transfer needs. If organisations do choose to utilize MFT for their secure file transfer purposes, they...
While cyberattacks and malware make headlines, one of the biggest security threats companies face comes from trusted users with privileged access to sensitive data. Many companies report that internal attacks are becoming more frequent and that they feel vulnerable to them. by Eloise Gruber Security...
Before we dive into this topic, let’s have a quick look what Self-Service actually means. “Self-service is the practice of serving oneself, usually when purchasing items. Common examples include … at buffet-style restaurants, where the customer serves their own plate of food from a large,...
We are pleased to announce the merger between ESBD and BlueFinch. After more than seven years of collaboration it was time to combine our knowledge, services, and solutions for securing your data. With the merger BlueFinch and ESBD continue as the BlueFinch-ESBD Group: a European...
Malaga, June 10, 2022 –The first BBES Group yearly convention in Malaga brought together all the familiar faces in a stunning décor and was filled with inspiring sessions and lots of fun. Since the BBES Group was founded one and a half years ago, it...
by Eloise Gruber Use case #1 – Manufacturing sector This particular company is a leading manufacturer of production machines for wood. It had to ensure that all data relating to the machines it produces remained secure. The company wanted to quickly detect security breaches and...
BlueFinch together with HelpSystems, was present as a sponsor to the e-Crime & Cybersecurity Nordics 2022 on the 24th of May in Stockholm. By Ekron Dries It turned out to be a great day full of interesting panel discussions by CISO’s from leading companies like...
By Eloise Gruber Use Case #1 – Healthcare sector This healthcare facility had a dual need for file transfers: to provide security and to manage the growth of file exchanges with other institutions. The company had initially set up an in-house tool that stored files...
How COVID-19 impacted organizations’ data security – and how leaders are feeling today in the face of increased threats. The COVID-19 pandemic permanently changed cybersecurity, from cloud migration to remote work to security at the edge, and at the same time, threats have increased. With...
24th May, Stockholm, Sweden “Can anyone prove they’re secure? Everyone is a third party. So, if businesses will increasingly only work with the cybersecure, how can you prove you are? Especially if your third parties aren’t…..” BlueFinch is pleased to announce the participation in the...
The pen test and the vulnerability scanner are two essential practices for the implementation of a successful security strategy. However, do you know the differences and complementarities of these two cybersecurity mechanisms? by: Eloïse Gruber What is a “vulnerability scanner”? Vulnerability scanner is a software...
The long anticipated version 7 of the award-winning GoAnywhere MFT was released last week, bringing new features and many improvements, that will certainly appeal many of our customers. For those who can’t wait, the 7.0 BETA is already available for download and can be installed...
Whether it’s protecting sensitive data or controlling your company’s outbound content, implementing a DLP (Data Loss Prevention) solution will help maintain data visibility and control in line with your corporate policy. Let’s see together the crucial role of DLP in the security of your data....
A company shares, analyses and collects a multitude of information, which is now largely dematerialized. This digital data is valuable because it allows the smooth running of the internal and external organization of the company. This data constitutes an important part of the company’s capital In...
Transferring files over the internet is a common task in today’s digital world and it’s important to find and use protocol that fits your organisation’s needs. by: Ekron Dries A protocol is a set of rules and messages between a sender and a receiver. It...
Vulnerabilities are part of digital life. They are the result of the increasing complexity of code and system, coupled with gaps in the cybersecurity practices of designers and users. While it is impossible to completely eradicate vulnerabilities in code and system, improving their processing offers...
The software you use in your business is like the oil that keeps your car running smoothly. It’s taken for granted when it’s doing its job properly, but as soon as something goes wrong, things can come grinding to a shuddering halt. Based on our...
BlueFinch is excited to share the news with all of our customers and partners that we have been awarded with the Top Growth Partner Award for 2021! This achievement is the result of a positive and constructive relationship with both customers and HelpSystems as one...
Denmark has had a legal deposit law in place since 1781, which is used to collect printed cultural heritage. Legal deposit has now been expanded to include digital publications, as well as radio and television content. One of their tasks as Denmark’s national library is...
Filling out a form is an act of trust. When you ask people to fill out a form to collect the information you need to operate your business, individuals are trusting you to keep the data you collect safe and secure. Whether it is patients submitting...
Wondering how DMARC affects email? Here’s a comprehensive guide explaining what DMARC is, how it affects email, and why your company needs it for security. By Ekron Dries What is DMARC? What does DMARC stands for? DMARC, short for Domain-based Message Authentication, Reporting and Conformance,...
Majority of companies shares, analyses, collects and archives a multitude of information. Today, for the most part, in a dematerialized way. This digital data is valuable because it makes possible to carry out the smooth running of the internal and external organisational aspects of the...
Despite massive growth in data security spending, the number of data breaches is increasing. With constant changes in how and where work is done—thanks in part to growth in both cloud computing and mobile device usage—the threats are changing, too. And so are the strategies...
We live in the age of digitalization where businesses are seeking new ways to lower costs while improving their efficiency. Cloud services like Microsoft Azure stand as a true testament to this concept. Microsoft provides a smart solution for modern-day storage problems which is Azure...
Phishing emails can steal sensitive data and cost companies’ reputation. However, protecting a company from these scammers doesn’t need to be difficult. Phishing emails are a social engineering attack used to steal your personal information like passwords or credit card numbers. The victim receives an email...
Remote working, a rise in security incidents, evolving regulatory pressures; these are challenges faced across all industries today. Securing digital communications has never been more important. Hybrid working has placed an enormous strain on IT resources and, in addition to shouldering the responsibilities of their...
Data classification tools not only help organisations to protect their data, but they also help users understand how to treat different types of data with different levels of sensitivity. Automation plays a central role in data governance and helps to maintain the required balance between...
First, we would like to thank all our colleagues, customers and partners for making 2021 such a memorable year and we wish you and your families a happy, prosperous and healthy New Year. by Ekron Dries 2021 has been the year of wins for BlueFinch,...
Understandably, the terms data security and data privacy are frequently muddled together and sometimes used interchangeably. While they are naturally connected, they are also unique and separate concepts. by Richard Verkaik To help ensure the data your customers and employees entrust to your organisation is...
Data plays an increasingly important role in our society. This requires a variety of measures to deal with this, to process and store data, and to protect it. Managed File Transfer (MFT) is a solution for the secure transfer of sensitive and large files, as well as the exchange of incoming and outgoing...
The General Data Protection Regulation (GDPR) is a regulation approved by the European Parliament. It applies to all organisations that handle and process EU citizens’ data,
This month, we talk about another customer case where an existing and expensive solution was successfully replaced with GoAnywhere MFT. Read about the business drivers, the challenges and learn more about the migration to success in this article. by Eloïse Gruber Customer industry: Banking & Finance What were...
Data breaches are one of the worst nightmares of every IT security professional. Regardless of the level of IT security applied by the company, your employees’ actions during digital communication remain the weakest link in data security. Many reports state that more than 60% of all data...
With a continuous news stream about security incidents and new regulations for privacy protection, it’s more important than ever for organisations to think seriously about data privacy and data security together. By: Ekron Dries If we look at IT security, most organisations have a strong focus on perimeter defence: building walls to block...
Conferences and Trade Shows. They were never really gone, but that time of the year is back again and so is BlueFinch. Two important gatherings were attended in late October and early November, TBX event and E-crime & Cybersecurity Nordics. TBX Event 2021 Finally, after more than a year of pandemic isolation, we were able to speak to people in...
Not sure what encryption software is used for – or maybe just when to use each type? Discover common file transfer scenarios and which data encryption protocol best fits your needs. By Ekron Dries What is Data Encryption Software? Data encryption software, also called file encryption...
In this article, we look at the common areas of concern we hear from customers using the Office 365 Enterprise E5 and Microsoft E5 platforms and look at how the ClearSwift Secure Email Gateway (SEG) can be used to provide enhanced Adaptive Data Loss Prevention (A-DLP) protection and...
Titus enhances the effectiveness of your personal data protection and privacy program by identifying what data you have, how sensitive it is, and how it should be handled by your security stack. By Nikolina Kendes Industry and analyst research have indicated that identifying and classifying...
November 3rd and 4th, Utrecht, Jaarbeurs We’re happy to announce that BlueFinch takes part in TBX Event (Tech, Business, Accelerate), the long-awaited successor to the IT exhibition Infosecurity.nl, Data & Cloud Expo. Rooted in the belief that with the right IT solutions your business challenges can be resolved and the digital transformation in...
We spend the majority of our time on the internet reading short snippets of information about cyber security which makes it difficult to really understand the holistic view. Reading books, however, is an excellent way to get some additional and unique insight into the industry....
Today’s businesses operate in a truly cloud-centric world and storing data in the cloud is a task that most modern IT teams need to handle. At BlueFinch, we help hundreds of customers automate and secure their file transfers. In the process, we learn a lot...
Many current cyber threat trends hinge on change and uncertainty caused by the COVID-19 pandemic. Whether it’s a panicked email recipient falling for a phishing scheme, innovations in ransomware, or simply remote workforces offering larger surfaces to attack, the goal of each is to find...
The data protection landscape and its associated compliance environment changed fundamentally with the implementation of the European-wide GDPR in May 2018, with many other privacy regulations following suit around the globe. It is no longer about what organisations think they need to be doing in order to control their data,...
GoAnywhere MFT has a whole suite of features that were designed to be flexible and to meet customer’s needs. There is a lot of functionality packed into it and for good reason. Organisations have a wide range of needs and a wide variety of compliance...
Although they share similarities, there are some key differences between these two protocols, let’s find out which one is better, AS2 or AS4! by Ekron Dries What is AS2? AS2 (Applicability Statement 2) is a protocol specification that’s used to transmit sensitive data securely and...
Today, data is a valuable commodity. It has value to the organisations who own it and to those looking to exploit it through illegal activity. Data can be sensitive information about customers and employees, financial or strategic information, product designs or intellectual property, or any...
If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. By Nikolina Kendeš The specifications of AS2 AS2...
BBES Group proudly announces that its website is online. Born in October 2020, the international group specialized in data security now boasts a new, rich website: https://bbes-group.com. The site aims to represent all the services and the solutions currently available in data security, ranging from data classification to managed file transfer, from automation to data loss prevention. Global...
A simple and complete platform to improve your IT defence. While the majority of companies face the demands of a hyperconnected society, cyberattacks are evolving exponentially. According to an Opinion Matters/VMware study, “76% of all companies fear the occurrence of a major cyber incident in...
A few years ago, HelpSystems added Agent capabilities to their GoAnywhere Managed File Transfer solution. This extra functionality greatly enhanced an already extensive suite of security and automation features by including encryption at rest and in transit, batch and ad-hoc file transfer, peer-to-peer file collaboration,...
We are approaching a time when people will start returning to the workplace. Yet with many organizations now embracing a “remote-first” model, where employees will work at home either all or some of the time, what will this mean for cybersecurity? by Daan Jacobs Battling...
Organisations face a constant need to be on the alert and protective of sensitive data. Rather than cobble together a piecemeal solution strategy, relying on a trusted solutions provider that offers a suite of integrated, scalable data security solutions can provide relief. Knowing what data needs to...
API’s have emerged as a modern way of making digital systems “talk” to each other without the need for complex and expensive translation and transformation software. When linked via an API, two (or more) systems or applications can send and receive data using standard formats...
While data protection has become a priority, auditing and classification are now essential practices for companies. Find out everything you need to know about this new approach to cybersecurity… by Daan Jacobs Valuable resources Over the years, cyberattacks aimed at stealing personal data from businesses...
Protecting customer data from loss and leakage has become a top priority for enterprises over the past decade. Recent HelpSystems research with CISOs in global financial service organisations found that almost one-third believe data breaches have the potential to cause the most damage over the...
If rounding up the many methods used to transfer files at your organisation feels a bit like herding cats, block off time on your calendar for this important webinar. When transferring sensitive data, “doing your own thing” can have unpleasant consequences. There is an easy...
Enterprise file sharing solutions are already a great way to encrypt sensitive data in motion, but encryption alone is not enough. Can you ensure that sensitive information is not accidentally transmitted? Are you able to audit who is sending what? And last, but not least, are...
For the second year in a row, our MFT solution GoAnywhere has been awarded as best Managed File Transfer product in the market. This research conducted by SoftwareReviews, is based on the feedback of actual users of the application and emphasizes on user experience and vendor support. by Ron Diebels The report exists of 849 reviews, evaluating all relevant software vendors in the Managed File...
How do you transfer sensitive files? Business requirements and security standards have increased in recent years across industries and continents, but many organizations have struggled to keep up. Manual scripts, legacy tools, and single-use software are still utilized by IT and security teams despite their...
In my career as IT Architect, I have often designed solutions to set up a communication channel with partner companies to exchange confidential information. Only providing a secure transport path does not seem to cut it but maybe PGP Encryption could be possible solution. by...
Although the deed of incorporation was officially signed on May 20, the official start date of BlueFinch was May 1st, 2011. Actually May 2nd, as this was the Monday that we all gathered at our fresh new office in Aalsmeer, very close to Schiphol Airport....
Over the last thirteen years I have earned my crust as an “IT architect”. In this job I assist organisations in the planning and implementation of changes in the IT landscape. While most people believe the difficulty lies in designing and communicating the needed changes, a pernicious problem occurs in the stages prior
The rise of globally dispersed workforces and new work from home requirements are placing extraordinary pressure on every organisation’s cybersecurity. And wherever there is upheaval, cyber criminals thrive.
Before implementing a secure file transfer solution, it is good to know the basics of protocols that are involved in the secure transmission of data. by Eloïse Gruber FTP The FTP file transfer protocol is a popular transfer method that has been around for decades....
The Hague, January 4, 2021 – Data security companies BlueFinch, BlackBridge, ESBD and Systematik joined in the creation of the European company BBES Group. by Ron Diebels It is great news to learn of the combination of these 4 companies specialized in the integration of...
We are very proud to announce that we are now ISO 27001 certified, making BlueFinch meet the highest recognised security standard.
Since last June, Europe has had a new data protection giant: the BBES Group, an alliance between ESBD (France), Blackbridge (Italy), BlueFinch (Netherlands) and Systematik (Germany). With greater strike force, it will enable the four companies to offer better service to their customers at a...
In verband met de groei van ons bedrijf zijn wij op zoek naar een Data Exchange Specialist / Product Owner die het team van BlueFinch komt versterken.
Iedere organisatie heeft te maken met een buitenwereld - Een periferie van zakelijke partners, filialen, klanten en medewerkers. Bedrijven versturen en ontvangen dagelijks grote hoeveelheden bestanden, variërend van betalingstransacties tot patiëntendossiers.
In order to stop viruses, malware and malicious content from penetrating your organisation, GoAnywhere MFT can be integrated with antivirus solutions by making use of the standard ICAP protocol.
Recently BlueFinch has officially partnered with The Hague Security Delta (HSD). HSD is the leading security cluster in Europe with important regional hubs in The Hague, Twente, and Brabant. In a combined effort with all other partners BlueFinch wants to stimulate innovation in security and economic development.
The release of GoAnywhere managed file transfer (MFT) solution version 5.5 allows organizations to deploy MFT agents across the enterprise to automate, secure and audit all of their file transfers from a single, centralized location. This new innovation adds to an already extensive suite of security and automation features including encryption at rest and in transit, batch and ad-hoc file transfer, peer-to-peer file collaboration, and more.
Webinar: Introducing Adaptive Redaction. Protecting critical information without harming productivity or communication flow.
Want we hebben allemaal te maken met een buitenwereld. Een periferie van partners, leveranciers, filialen en klanten. Het delen van informatie, in welke vorm dan ook, is van alle tijden. En dat geldt in toenemende mate ook voor de risico’s ervan.
Applicability Statement 2 (AS2) is a popular file transfer protocol that allows businesses to exchange data with their trading partners.AS2 combines the use of several secure and widely used technologies including HTTPS, SSL Certificates, S/MIME, and file hashing. By utilizing the strengths of each of them,
Low-cost file transfer tools allow mid-market businesses to make simple data exchanges both internally and externally. As your company grows, however, trading partners demand enterprise-level systems to improve reliability and data security.
Linoma Software unveils GoAnywhere MFT™ (Managed File Transfer), version 5.0 of its GoAnywhere secure file transfer software. The upgrade combines the workflow automation capabilities of Linoma’s popular GoAnywhere Director solution with secure file transfer protocol (FTP) features from GoAnywhere Services into a single product.
nfo-Tech Research Group, an IT research and analysis company, has released a report naming Linoma Software’s GoAnywhere managed file transfer (MFT) solution as having the highest Value Score of the MFT vendor group in Server-to-Server and Ad Hoc Enterprise use cases.
ICE Services AB is a world-class supplier of business process outsourcing services for Rights Management companies. Based in Bromma Sweden, ICE Services AB took advantage of the GoAnywhere API for file upload and download integration with their music-documentation database, which is used to maintain and house ownership information for all musical works used throughout Europe.
With large data breaches taking center stage in the media, many businesses have begun paying close attention to internal practices and taking action to improve internal systems and processes. As a result, an increasing number of businesses (people) who rely on data transfers are looking to move away from standard FTP in favor of a more secure method.
Too many organizations have underestimated the value of mission-critical business documents. Some employees may take great risks with sensitive or proprietary information and hope that nothing bad happens.
Linoma Software is pleased to announce GoAnywhere™ Services version 4.0 with an overhauled interface and a new GoDrive file system for person-to-person file sharing and synchronization.
I regularly visit organisations that are in a state of complete disarray due to an explosion of new file-transfer and software interfaces. This can simply be because the IT Department has attempted to quickly respond to multiple requests and to demands from the business.
GoAnywhere OpenPGP Studio™ is a free desktop tool that makes it easy to protect sensitive files using the popular Open PGP encryption standard.
Aalsmeer , November 27, 2013 - BlueFinch, ICT specialist in the field of complex ICT infrastructures that are based on IBM technology, introduces a comprehensive system tool for AIX configuration, diagnostic and reporting. SystemScan AIX enables organizations to carry out a thorough inspection of the installation and configuration of their AIX environment.
Linoma Software is ontwikkelaar van managed file transfer- en encryptie-oplossingen. Deze oplossingen worden op de eerste plaats gebruikt om gevoelige data te beschermen, maar tevens om te voldoen aan data security-reguleringen zoals PCI DSS, HIPAA/HITECH, SOX en GLBA.
Safestone Technologies, wereldleider op het gebied van compliance- en beveiligingssoftware voor IBM Power Systems, introduceert Compliance Center voor Linux.
BlueFinch, ICT specialist in the area of Finance and Banking, has been appointed by IBM as IBM Business Partner.
BlueFinch has entered into a co-operation with the American ICT supplier Linoma Software. This partnership enables BlueFinch to resell and to use the products of Linoma in the projects of its clients.