Your guide to Cerberus’s SFTP server resources

Your guide to Cerberus’s SFTP server resources

Cerberus FTP Server by Redwood has been in business for more than 20 years. During this time, we’ve published a lot of information on the SFTP protocol, how to optimize SFTP servers and more. In this post, we’ve organized all of our SFTP content into helpful guides so...
SFTP server and SSH keys: Your complete guide

SFTP server and SSH keys: Your complete guide

Introduction: How SSH connections, authentication and encryption work First, it’s important to understand the relationship between SSH and SFTP (which uses SSH as its transport layer). When a client attempts to connect to an SFTP server, the following steps occur: 1....
Is an SFTP server also an MFT server?

Is an SFTP server also an MFT server?

With so many file transfer solutions on the market, it can be a bit confusing to understand which features are included in which types of servers (and protocols). For example, an MFT server like JSCAPE by Redwood can also operate as an SFTP server, but the Enterprise...
SFTP Port Management Guide

SFTP Port Management Guide

While SFTP port management is simpler than FTP port management, it’s still a common question you may have when setting up your SFTP server. This post addresses questions about SFTP port management and provides advice on changing from the default port 22. What port...
How to set up an SFTP server

How to set up an SFTP server

Setting up an SFTP server is much easier than it used to be, but still comes with some important details that can trip up even a seasoned administrator. So today we’re discussing a step-by-step guide for setting up an SFTP server. Enable SSH SFTP (or Secure File...

Your Guide to SFTP Monitoring

Introduction   If your organization uses an SFTP server, you should be using SFTP monitoring to ensure your data remains secure. But “SFTP monitoring” is a catchall term that can cover everything from authentication to network access to compliance requirements....

What is AES 256 Encryption & How Does it Work?

Encrypted file transfer in a solution like Cerberus FTP Server is simple to implement, but with a number of encryption and cipher options available, it can be helpful to understand exactly how your data is secured. Today, we’ll review the Advanced Encryption Standard...

Multiple Host Keys in SSH

In Cerberus FTP Server 13.1, we have implemented support for multiple SSH host keys. This user-requested feature allows enabling one or more of the currently supported key types: RSA, DSA, ECDSA, EdDSA 25519 and EdDSA 448. In order to allow this feature, we have...
Complete Guide to SFTP – Part 1: Concepts

Complete Guide to SFTP – Part 1: Concepts

SFTP, formally known as the SSH2 File Transfer Protocol, is a (relatively) new secure file transfer protocol that continues to evolve into a more widespread data standard due to its ease of use, straightforward configuration, and robust file/directory manipulation...
SFTP vs. FTPS.  Understanding the Difference.

SFTP vs. FTPS. Understanding the Difference.

What’s the difference between FTPS and SFTP? FTPS (formerly known as FTP over TLS/SSL) and SFTP (technically named the SSH2 File Transfer Protocol) are considered secure file transfer protocols. Despite their similar names, however, these protocols operate in very...
SCP vs SFTP: Which is better?

SCP vs SFTP: Which is better?

As the digital universe grows, transferring files securely becomes increasingly important. Two commonly used protocols are Secure Copy Protocol (SCP) and Secure Shell File Transfer Protocol (SFTP). Both leverage SSH (Secure Shell) to provide secure file transfer, but...
How does SFTP work? SFTP vs. FTP

How does SFTP work? SFTP vs. FTP

You’ve probably heard about SFTP and FTP, but you may be wondering what the difference is between the two protocols and how SFTP works in general.   When transferring data from a computer to a server (think of the server as a data container) or vice-versa, there are...