Logo Logo Logo Logo Logo

+31 (0)88 258 33 46

  • Home
  • Solutions
  • Company
    • Vacancies
  • News
  • Support
  • Contact
  • English
  • Home
  • Solutions
  • Company
    • Vacancies
  • News
  • Support
  • Contact
  • English

04 Aug AS2, AS3, AS4 : What are the differences between these protocols?

Posted at 12:47h in Managed File Transfer, Professional Services

If you think these three protocols are simply sequential updates from the 1990s’ AS1 protocol you’d be mistaken. Each protocol brings its own distinct features to the data transmission table. Here’s a few key differences between them. By Nikolina KendešThe specifications of AS2AS2 (Applicability Statement 2)...

Read More
What are the different types of transfer protocols available?

15 Mar What are the different types of transfer protocols available?

Posted at 12:14h in Data Protection, Managed File Transfer

Before implementing a secure file transfer solution, it is good to know the basics of protocols that are involved in the secure transmission of data.by Eloïse GruberFTPThe FTP file transfer protocol is a popular transfer method that has been around for decades. FTP exchanges data...

Read More
Sitemap

Solutions
Company
Vacancies
Support
News
Contact

Contact

BlueFinch-ESBD Netherlands B.V.
Laan van Zuid Hoorn 60
2289 DE Rijswijk
The Netherlands

+31 (0)88 258 33 46
info@bluefinch.com

Legal

Privacy Statement
Cookie Policy

 

DigiTrust ISO27001 Certification Seal

Leave your mail for our newsletter

    © 2011-2023 BlueFinch-ESBD Netherlands B.V.

    Linkedin | Twitter | Email

    Manage Cookie Consent
    We use cookies to optimize our website and our service.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage vendors Read more about these purposes
    View preferences
    {title} {title} {title}
    Why Automating Encryption and Decryption Makes Good Cybersecurity Sense

    bf-ga-why-automating-encryption-decryption-makes-good-cybersecurity-guide-20210913

    Download the MFT Buyers Guide

    We know finding the right file transfer solution for your organisation isn’t an easy process. There are dozens of details to consider, from industry and compliance concerns to critical cybersecurity needs, and they can make choosing a vendor complex. In this ultimate buyer’s guide, you’ll find the information you need to successfully evaluate different managed file transfer solutions. We cover:

     

    • The benefits and features of MFT

    • Which questions to ask MFT vendors

    • How to determine your budget

    • And much more

      Request a quote for Data Classification

       

      Error: Contact form not found.

      Request a quote for Data Loss Prevention

       

      Error: Contact form not found.

      Request quote for Secure File Transfer

       

      Error: Contact form not found.