EnterpriseDT Blog

What are digital certificates?

In How does public key encryption work?, it was explained that there needs to be a way of reliably associating public keys with their owners. Using someone's public key to …

7 min read Read More

What is encryption?

The first post in our series about new secure network protocols concerns the most important concept required for understanding security, encryption.

5 min read Read More

How does public key encryption work?

Public key encryption is briefly explained in the first post of this series, here, but it is of such importance in SSL/TLS and SSH that a more detailed explanation is …

7 min read Read More

New blog series on secure network protocols

This blog series will explain how secure network protocols work. It will explain what encryption is, what cryptographic hashes are, and how they are both used to secure data transmission. …

3 min read Read More

The CompleteFTP roadmap for 2015

CompleteFTP, our secure FTP server for Windows, has quite a long development history, and has undergone considerable change since its inception. HTTP support, clustering, a multi-protocol gateway, file sharing and …

3 min read Read More

HTTPS or SFTP - which is best?

We were recently asked by a CompleteFTP user which was the best protocol to use for file transfers - HTTPS or SFTP. In particular, the user was interested in large …

6 min read Read More

The POODLE SSL vulnerability resolved

By now most people will have heard of the POODLE SSL vulnerability, a flaw in the SSL 3.0 protocol that affects FTPS and HTTPS. We've recently blogged about POODLE in …

2 min read Read More