CData Arc Blog

December 6, 2019

What You Risk When You Keep Your Legacy File Transfers

Many organizations continue to use legacy solutions to perform critical enterprise file and data transfers. These outdated technologies can include everything from unsecured FTP clients to hand-coded scripts and legacy “managed file transfer tools. While these collections of ad hoc approaches typic...

November 29, 2019

MFT vs. FTP: 17 Ways Managed File Transfer is Superior to File Transfer Protocol Scripting

MFT vs. FTP: Understand 17 key benefits of Managed File Transfer over File Transfer Protocol scripting & how MFT enhances security, automation, and more.

November 27, 2019

How to Reduce The Most Common File Transfer Security Risks

Individuals are constantly transferring files to their colleagues and trading partners, whether those files are Word documents, reports and spreadsheets, or shipping notices and acknowledgements. Most of the time, people simply assume these file transfers are safe. But in reality, hidden risks abou...

September 25, 2019

SFTP Client Software - Bringing Enterprise SFTP to Everyone

If you're looking for an enterprise-class solution for safeguarding file transfer using the Secure Shell (SSH) protocol but have a limited budget, look no further. CData Arc is now offering our SFTP Core enterprise client software for free. We wanted to make this available to the broader community ...

September 16, 2019

RSSBus Connect is Now CData Arc

Enterprise-Class Integration, Still Built on Simple Services What's in a name? It's a question we have been thinking about over the course of 2019. Meaning, a sense of direction and company mission, novelty, customer familiarity and comfort — there are as many answers to that question as there are ...

September 16, 2019

Not Just a Rebrand: New Unlimited MFT & EDI Packages

Not Just a Rebrand: New Unlimited MFT EDI Packages We're proud to announce RSSBus Connect is now CData Arc . The new name reflects the many technological innovations that we've brought to our product since launching in 2006. And it gives us the opportunity to align our product more closely with your...

September 2, 2019

3 Strategies for Integrating EDI with Back-End Systems

Once you exchange an EDI message with your trading partners, you'll want to keep a record of the transaction in one or more back-end systems. You may want to store purchase orders in your ERP, add invoices to your accounting system, subtract order information from your inventory system, or notify y...

August 26, 2019

9 Ways to Modernize Your Legacy EDI

Many organizations rely on legacy EDI solutions to communicate order information with their trading partners. If your organization is one of these, you may have spent considerable time and effort working with these complex solutions. While there are benefits to working with something that's familia...

August 21, 2019

4 Ways to Use Open PGP

Numerous high-profile data breaches have shined a spotlight on the need to protect sensitive data. Encryption is a popular solution because it locks away data or files in such a way that even if they are breached, no one can access, view, or read the contents of the data. One of the most popular me...

August 19, 2019

How to Manage Your Growing EDI Partner Network

Recently, we considered the costly, risk-prone path most growing businesses take with EDI as a result of their reactions to trading partner demands. Reacting to a customer demand is nothing new — it's what businesses do. Unfortunately, just responding to ad hoc partner demands creates an inefficien...

June 20, 2019

Why Convert EDI to XML?

What's the best way to convert a document from EDI to some other format, such as Excel, CSV, or a format compatible with your CRM or ERP system? It may seem counterintuitive, but if you want to convert an EDI document to another format, converting it to XML first and then converting that XML docume...

June 12, 2019

How to Fix Your Broken File Transfer Processes

Managed file transfer (MFT) is the secure, centralized transfer of data or files between computers over a secure network connection. While it may sound mundane, this technology is playing an increasingly critical role in corporate IT strategy — in stark contrast to the scattered approach of long-ma...