Cerberus FTP Server
Secure File Transfer News
What’s the Best File Transfer Method for Cisco Unified Communications Manager (CUCM) Backups and Firmware Updates?
SFTP servers are commonly used for updating and backing up devices and endpoints controlled by either Cisco Unified Computing System Manager (UCSM) or Cisco Unified Communications Manager (CUCM). And because of Cisco’s ubiquity in the market, the two most common...
Automate Cisco Unified Communications Manager (CUCM) Backup Using SFTP
In the new era of hybrid and remote work, Cisco Unified Computing System Manager (UCSM) and Cisco Unified Communications Manager (CUCM) have become even more critical administrative tools. The top two topics that the Cerberus support team receives regarding UCSM and...
FTP and FTPS ports: an overview
Understanding FTPS and FTP port connections Transferring files securely requires a comprehensive understanding of the connections, ports, and IP addresses utilized by FTP (File Transfer Protocol) and its secure version FTPS (FTP over TLS/SSL). This guide provides an...
Encrypted File Transfer: A Guide to Encryption and Secure Sharing
Deciphering ciphers: A guide to encryption and secure file transfer What is encryption? Encryption refers to the process of obscuring information to make it only readable by the sender and the sender’s authorized recipient(s). Encryption does not prevent access...
Cerberus by Redwood version 2025.3: Your gateway to smooth operations
Cerberus by Redwood, version 2025.3 introduces several key features to enhance security and streamline user management, including the ability to search by description for local user management, simplifying access control. Additionally, new OAuth 2.0 support for SMTP...
Secure and simplify B2B file transfers with Cerberus Gateway
Secure and compliant B2B file transfers should be the norm in today’s digital world, but for many organizations, especially those with rigid security and compliance mandates, managing file transfers can be a complex and often risky endeavor. Misconfiguring access...
Cerberus by Redwood, version 2025.2: Improving performance and expectations
Get better performance and know what to expect from your file transfers with the latest release from Cerberus by Redwood, version 2025.2. This release includes two new features and a quality-of-life fix with automations. What’s new? Support for Windows Server 2025...
SFTP vs. FTPS. Understanding the Difference.
What’s the difference between FTPS and SFTP? FTPS (formerly known as FTP over TLS/SSL) and SFTP (technically named the SSH2 File Transfer Protocol) are both secure file transfer protocols. Despite their similar names, however, these protocols operate in very different...
The next step in secure, scalable file transfers
As organizations grow, so do their file transfer needs. Secure, efficient and automated file transfers are crucial to keeping operations running smoothly. For those looking to take their file transfer capabilities to the next level, JSCAPE by Redwood offers a powerful...
Understanding the initial setup wizard
The Wizard Note: Cerberus FTP Server Version 2025.1 introduced a new getting started wizard to streamline your setup time. This blog has been updated to reflect the new wizard's changes. When you first launch Cerberus FTP Server, the Getting Started Wizard will guide...
Cerberus 2025.1: Enhanced security and streamlined setup await
We’re excited to announce the upcoming release of Cerberus 2025.1, focusing on enhancing security for our current users and streamlining the setup process for those new to Cerberus by Redwood. What’s new? Security updates for peace of mind Cerberus 2025.1 includes an...
How to set up an SFTP server
Setting up an SFTP server (or Secure File Transfer Protocol server) is much easier than it used to be, but there are still some important details that can trip up even a seasoned administrator. So today, we’re discussing a step-by-step guide for setting up an SFTP...
Your guide to solving file transfer data compliance challenges
With data breaches becoming more common every year, cybersecurity professionals, organizations and regulators have taken significant steps to protect the integrity of the world’s data. Compliance with these industry standards and regulatory requirements is a critical...
The real cost of file transfer security breaches
The real cost of file transfer security breaches Cybercrime damages have reached close to $9.5 trillion annually, with the average breach costing an organization $4.9 million. You’ve likely seen some version of these numbers before, and they help make a strong case...
5 steps to prevent file transfer data breaches
File transfer environments handle many of the most sensitive data exchanges in your organization, and require multiple layers of security to protect against data breaches. To help you strengthen your defenses, we’ve listed five proven file transfer security tactics...
3 steps to improve file transfer security by using proxies and gateways
3 steps to improve file transfer security by using proxies and gateways Our last few posts have discussed understanding proxy servers, the benefits of reverse proxy servers and the benefits of file transfer DMZs. Today, we’re going to put everything together by...
The benefits of a file transfer DMZ
The benefits of a file transfer DMZ Like any other network security concept, file transfer security operates in layers. And many organizations choose to add an additional security layer to protect file transfers through the concept of a “De-Militarized Zone”, or DMZ....
Four benefits of using a reverse proxy server
Four benefits of using a reverse proxy server We recently wrote an overview to help understand proxy servers that touched on reverse proxy servers. Because reverse proxy servers are such a valuable tool in your network security arsenal, we wanted to spend a bit more...
Can your file transfer provider resolve a zero-day breach?
Can your file transfer provider resolve a zero-day breach? Zero-day breaches strike fear into the hearts of any cybersecurity department, as they are the most difficult to prepare for due to their unknown threat vector. Worse, a zero-day exploit may require a rush...
How common are file transfer data breaches?
Did you know that organizations saw 6.3 trillion intrusion attempts last year? Or that 2024 will likely end with around $9.5 trillion in damages from cybercrime? Data breaches have unfortunately grown in frequency as a result, with industries that deal with sensitive...
Explore what Cerberus FTP Server can do for you
- 25 Day Free Trial
- No Credit Card Required
- Up and running in less than 15 mins