Month: March 2015
Nottingham, UK. Hypersocket Software is pleased to announce the immediate availability of Hypersocket FTS, an open source, multi-protocol, cross platform File Transfer Server that combines high performance, robust file transfer with the enterprise-class features every business needs.
Using Hypersocket FTS administrators can mount and assign via role-based access any number of file systems using local storage, FTP/S, HTTP/S, WebDAV or Windows shares with users able to access their files through FTP/S, WebDAV, SFTP, SCP or through their web-browser.
The user interface is intuitive and easy to use and comes with extensive support for customisation through its triggers and automation features, allowing file processing tasks to be performed in response to user events or on a set schedule.
“Hypersocket FTS demonstrates our commitment to providing high-value, easy-to-use networking solutions at an affordable cost and we’re committed to giving back to the community, which is why Hypersocket FTS and VPN has further been made available to the opensource community” said Lee David Painter, CEO.
The key features of the product are:
Cloud computing can be a tricky technology to implement. It is full of moving parts and is more complex than it seemingly appears. The allure of benefits that cloud can bring may often lead to hasty implementations and migrations. Cloud computing has the potential to provide flexibility, efficiency and economic development as well as empower your increasingly mobile workforce. But the shared virtual space is still evolving and it comes with its own set of security challenges.
Securing the cloud is complicated and several factors need to be considered. It can upset the traditional model of IT security that relies on logical and physical system boundaries. These boundaries become less transparent and more complex in the cloud, rendering traditional security mechanisms that rely on perimeter defenses less effective. A cloud system also must meet the security needs of many customers who might be tenants on the same physical infrastructure, so no single policy for security or IT governance will meet every individual’s needs. Differing policies must co-exist or work simultaneously and in harmony on the same platform and be implemented with confidence, irrespective of the location and jurisdiction of the platform.