Sponsored Content
Full Discussion: Managed file transfer
Top Forums Shell Programming and Scripting Managed file transfer Post 302536832 by brianpick on Wednesday 6th of July 2011 10:35:37 AM
Old 07-06-2011
GoAnywhere from Linoma Software can automate & encrypt your file transfers

I realize this post is a few months late but I thought I'd respond just in case there are others that may have an interest in this topic. I'm the Sales Manager for Linoma Software and we have a browser based cross platform Managed File Transfer solution suite called GoAnywhere (GoAnywhereMFT) which will handle your file transfer and encryption requirements. GoAnywhere Director can be used to automate (using our own scheduler or you can call it out using your existing scheduler or script) the file transfer process (push and pull), has file and folder monitoring, can encrypt (SSH, SSL, AES, AS2, PGP), has detailed audit logging, can translate files to/from databases, notifies you upon failures and can retry failed connections automatically and continue with the file transfer where it was cut off.

Our GoAnywhere Services product is the server side of the file exchange and includes the FTP, SFTP, FTPS and HTTPS servers. Services is used when your trading partner is initiating the file exchange.

The last product of the GoAnywhere product suite is called GoAnywhere Gateway. Gateway is a reverse proxy which allows you to move Services inside the network where it's more secure and only Gateway will be sitting in the DMZ to authenticate requests to access Services.

A fully functional trial can be downloaded from our website and a license of GoAnywhere starts out at of $4,995. For more information, please visit GoAnywhereMFT.
 

6 More Discussions You Might Find Interesting

1. Filesystems, Disks and Memory

FSCK on veritas managed disk

I've had a VXFS filesystem get corrupted and now it won't mount. Can I run a fsck -y on the raw disk device or should something be done within veritas? Veritas does not see the disk at the moment. (2 Replies)
Discussion started by: ozzmosiz
2 Replies

2. Solaris

Smf managed service not starting

Hi Experts, While playing with smf in my local system ( which is not in production ) i am unable to restart the service svc:/network/nfs/server:default . I tried starting it in different way, however unable to restart the same. I was checking the dependency for that I disabled the... (11 Replies)
Discussion started by: kumarmani
11 Replies

3. Web Development

managed service reccomendations

Dunno If its ok to post this, but I am looking for a company to manage our linux server. If the company is a specialist in security issues then that would be ideal Thanks Ed (5 Replies)
Discussion started by: edzillion
5 Replies

4. Shell Programming and Scripting

Avoiding file overwrite during file transfer using scp

Hi, I have written a small script to transfer a file from one unix server to other using scp command which is working fine. As I know with scp, if any file with the same name is already present on destination server, it would get overwritten without any notification to user. Could anyone help me... (14 Replies)
Discussion started by: dsa
14 Replies

5. AIX

HEA configuration on managed node.

Folks, Please have a look to the attached screenshot from my managed node's HEA configuration option page. I would like to know - what does "Flow Control Enabled" checkbox help us with if opted for? Thanks! -- Souvik (3 Replies)
Discussion started by: thisissouvik
3 Replies

6. AIX

Managed system's uptime

How to find Physical server uptime from HMC/ ASMI. Server was in standby mode. We have started the Lpar manually. Server rebooted automatically but no information updated in Lpars's errpt, alog.console or HMC prior to the reboot. (1 Reply)
Discussion started by: sunnybee
1 Replies
SECSH(5)							    Lsh Manuals 							  SECSH(5)

NAME
secsh - the Secure Shell protocol DESCRIPTION
secsh is a protocol suite for secure remote login and other secure network services over an insecure network. It is outlined in [SECSH]. It has three major components: The Transport layer protocol This protocol, specified in [SECSH-TLP], provides server authentication, confidentiality, and integrity with perfect forward secrecy. The User authentication protocol This protocol, specified in [SECSH-AUTH], is used to authenticate a client to a server. The Connection protocol This protocol, specified in [SECSH-CONN], multiplexes an encrypted tunnel into several logical channels. IMPLEMENTATIONS
Several implementations of the secsh protocol suite exist. The SSH2 product of SSH Communications Security Ltd., Finland <URL:http://www.ssh.fi> was the first. The secsh protocol suite has benefited a lot from their experience with their older SSH1 product, which is still in widespread use; it implements an older protocol ([SSH1]). The lsh suite of programs is a free implementation of the secsh protocol suite; it is distributed under the GNU General Public License. REFERENCES
[SECSH-ARCH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Protocol Architecture, Internet draft, 6 August 1998 [SECSH-TRANS] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Transport Layer Protocol, Internet draft, 6 August 1998 [SECSH-AUTH] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen, SSH Authentication Protocol, Internet draft, 6 August 1998 [SECSH-CONN] T. Ylonen, T. Kivinen, M. Saarinen, T. Rinne and S. Lehtinen SSH Connection Protocol, Internet draft, 6 August 1998 [SSH1] T. Ylonen, The SSH (Secure Shell) Remote Login Protocol, Internet draft (expired), 15 November 1995 TRADEMARKS
SSH and Secure Shell are trademarks or registered trademarks of SSH Communications Security Ltd. AUTHOR
This man-page was written by J.H.M. Dassen (Ray) <jdassen@wi.LeidenUniv.nl>. SEE ALSO
lsh(1), lshd(8), ssh2(1), sshd2(8), ssh1(1), sshd1(8) LSH
JANUARY 1999 SECSH(5)
All times are GMT -4. The time now is 08:40 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy