
Enterprises rely on safe and reliable information access methods to meet today's rapidly developing market demand. Accordingly, sharing data internally and externally is essential for any organization.
FTP is one of the earliest and still used data sharing methods. Although IT teams and business users are familiar with this, FTP lacks much vital security, compliance, and workflow requirements in modern organizations, especially in data security.
The following are four different FTP vulnerabilities that are vulnerable to hackers:
1. Anonymous authentication
Anonymous authentication is an FTP vulnerability, which allows users to use FTP username or log in anonymously. In many cases, users will provide their email address as a password. However, the user's login credentials and the commands used are unencrypted, visible, and easy to access. At the same time, any data sent via FTP or hosted on an anonymous FTP server will not be protected. Once, the FBI found that hackers actively used FTP to target medical and dental industries and access protected health information.
2. Directory traversal attack
A directory traversal attack exploits insufficient security validation or sanitization of user-supplied file names, such that characters representing "traverse to parent directory" are passed through to the operating system's file system API.
3. Cross-site scripting
Cross-site scripting is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy.
Attackers can use XXS to send malicious scripts to unsuspecting users. The end user's browser cannot know that the script is not trusted and execute the script. Because the malicious script thinks that the script comes from a trusted source, it can access any data, session token, or other sensitive information stored on the user's local terminal that is reserved by the browser and used with the site.
4. Malware attack based on Dridex
It was discovered for the first time in 2014 that Dridex malware has been re-invented and introduced in unexpected ways after the UK became the target of bank attacks. Internet users targeted by Dridex malware will open Word or Excel email attachments, which will cause macros to download the malware and infect computers, thus exposing users to bank theft. In the latest version of Dridex malware, hackers use FTP sites and credentials to avoid being detected by e-mail gateway and network policy of trusted FTP. Updating FTP credentials regularly can help prevent Dridex-based attacks.
As far as the FTP server itself is concerned, it can no longer meet the system functions required by the big data business in the information age. From the point of view of security, transfer efficiency, and compliance, the FTP server itself cannot be expanded and it is very likely to bring high-cost loss. In the big data market, managed file transfer software came into being and was promised to meet the above business requirements.
Large file transfer technology provides higher control and security than FTP, which usually has the following features:
- In-depth report
- The global visibility of all data transfer activities
- End-to-end security, encrypting data in transit and at rest
- Performance indicators, monitoring, and support for compliance requirements
- Workflow automation
Raysync - large file transfer software
- Data Synchronization
Supports two-way file synchronization that maintains the consistency of data across multiple devices, ensuring no redundant fragmented files are produced and multi-point data sync is efficient.
- Point-to-point Transfer
Adopts user ID to achieve point-to-point transfer, eliminating intermediate transfer for rapid file-sharing.
- Standard Bank-Level Encryption Technology
With the AES-256+SSL+Random salt high-density encryption algorithm, even the developers are unable to recover the root password through the stored ciphertext, making sure the data security is worry-free.
- Audit trails
Uses transfer logs and operations logs to supervise user behavior, easily trace all operations and file content, effectively control improper usage behavior and help enterprises to achieve better file management.
- User-defined Management
User-defined management perfectly plots out the organizational structure, supporting group management by defining regions, departments, and role-based permissions that set authority to standardize enterprise users' operation.
- Intelligence Nodes Management
With intelligence nodes management equipped, it supports unified management of all node machines in both the internal and external network environment to monitor and collect all operation logs and data synchronously.
- Hybrid Cloud Storage
Raysync supports more than 10 mainstream storage methods including hybrid storage effectively assisting enterprises to store, backup, migrate and synchronize their files in an orderly manner.
As a one-stop solution provider, Raysync has independently developed its core transfer technology with its professional technical teams to offer high-performance, secure, and reliable large file transfer and file management services for major enterprises.

More and more enterprises gradually realize that the amount of data generated by enterprises is increasing year by year, especially for enterprises with overseas business, which have customers in Japan, India, the United States, Southeast Asia, and other places. It is very difficult to transmit these data to the mainland for computing services.
The amount of data is too large, and the amount of data contained in a project ranges from several hundred GB to several hundred TB. In terms of network transmission, the bandwidth utilization rate of transnational large file transmission is very low, because the current network transmission protocol is TCP transmission protocol, which is a stable and reliable transmission protocol. It is necessary to ensure that the data is transmitted without packet loss and the file is intact. Therefore, when the latency and packet loss appear together, it will choose to reduce the speed to ensure the quality. The farther the transmission distance is, the greater the probability of latency and packet loss. Therefore, in order to reduce the packet loss and ensure transmission quality and stability, the speed will be reduced.
Raysync solves the problem of file transmission. Under the condition of high latency and packet loss, Raysync can improve the packet rate through self-developed protocols, control the congestion on the network, improve the transmission efficiency, and ensure the reliability and stability of the transmitted data.
The bandwidth of Shenzhen is 100 megabytes, and files are transmitted from Shenzhen to Los Angeles, USA. Without Raysync, the bandwidth speed of 100 megabytes can only be less than 1 megabyte . If Raysync velocity is used at both ends, it can reach 92 megahertz. Raysync abandons the original TCP protocol during transmission, and takes over data packets and traffic packets through its own transmission protocol, thus improving transmission efficiency.
As an expert in the field of large file transfer, Raysync will build an interactive bridge for the Internet, big data, artificial intelligence, and the real economy based on the self-develop high-speed transfer protocol.

With the explosive growth of data, the file transfer acceleration software was born. However, how to ensure the security of file transfer? How to ensure the security of transnational transfer?
In view of the above problems, we will analyze Raysync's six important security settings in this article, hoping to help more enterprises better identify the file transfer acceleration software.
The following is the diagram of Raysync system architecture:
From the system architecture diagram, it can be seen that the file transfer acceleration process of Raysync software is not complicated, mainly based on the self-developed Raysync high-speed transfer protocol, which realizes the file transfer acceleration.
Will safety design be so simple? In fact, security is a topic that enterprise data assets always pay attention to. In the security design, every step of the user's operation and every click may bury potential safety hazards. The Raysync has been designed safely from six aspects:
1. Web security design
2. Account & password protection security design
3. Transfer security design
4. Software installation & operation security design
5. Behavioral audit
6. Encryption certificate life cycle management

The version of Raysync V5.0.5.8 is now available! The update of this version not only makes functional upgrade and value enhancement around the details of visual experience, object storage support, user notification reminder, white list setting but also make more updates and optimizations from the high-speed file transmission, which makes the user experience more perfect. Let's focus on the point to point transfer function of Raysync.
In the traditional mode of file transmission, we need to upload the file to the server for storage, then share the file in the form of links, and finally download the file by our friends. As a result, the simple file transmission is divided into three steps, which are cumbersome and costly in time. In view of this situation,Raysync has developed a point to point transfer mode, in which end-to-end transmission is directly carried out between users, and file transmission is completed in one step.
Look's take a look at the detailed operation process:
Step 1. The receiver logs in to the webpage, enter the "Point to Point" transfer page, and enables the option "Allow to receive direct transfer files from partners". When it is turned on, the recipient's ID and Key will be displayed on the left side of the sidebar. Copy and paste the ID and Key to user A.
Step 2. Right-click the Raysync Client, select the "Settings"->"Direct transfer", then you can set the save path when receiving the file.
Step 3. The sender login to the Raysync Client, click "start to transfer file" in the "Point to Point" page, then enter the Partner ID and Key of the user B to start the transfer.
Then the receiver's Raysync Client will automatically start to receive the file.
Step 4. After receiving, the receiver can open the local directory and view the file.
In addition to the function of point to point transfer, Raysync V5.0.5.8 has other functions optimized and updated, such as:
1) The object storage function in admin condole supports Microsoft Azure blob.
2) The admin console adds an administrator notification function, which may send notifications to the user's webpage and also supports sending notifications to the user's mailbox.
3) Email notification signature supports customization.

Raysync notification function adds two methonds:
1) Send notification to the webpage mailbox of the sub-user.
2) Send an email notification to the mailbox of the sub-user.
Details:
Log in to the Raysync admin portal-> Select "Send notification" under the option "Users Management"-> Click "Add notification" and edit the notification "Subject" and "Content"-> Select the "Receiving accounts"-> Check on the "Notification option" "Website" and "Email"-> Click "OK" to save all the settings.
User receiving effect:
A Web-page
B Email
Note: Sender mailbox, mailbox display logo, and company name are configured by the administrator in the admin console.

Date: 19 – 29 October
The 2020 NAB Show New York will take place on October 19th. Raysync will e-meet you in this exhibition this time.
Raysync is a software-based large file transfer solutions provider. Since its establishment, it has always been dedicated to providing large file transfer solutions for global enterprises.
Raysync high-speed transfer protocol
Based on the self-developed high-speed transfer protocol, Raysync breaks through the transfer defects of traditional FTP and HTTP, the transfer rate is increased by 100 times compared with FTP, and the bandwidth utilization rate is over 96%, which can easily meet the extremely fast transfer requirements of TB-level large files and massive small files.
Bank-standard security protection
In order to ensure the security of data transmission and prevent data leakage, cracking, monitoring, and other security issues, Raysync strengthens the security control of internal data communication, adopts AES-256 encryption technology of online banking, and uses SSL encryption transmission in the transmission process to effectively ensure data security. At the same time, the Raysync adopts the setting of access rights and OS rights, thus achieving stricter access control.
Come to schedule with Raysync on NAB show with code NY0712, and you could chat with our sales in real-time for any problems with the large file transfer. You will also have the opportunity to get a special offer for the 100-day free trial of Raysync Pro.
Key Words
File sharing|teletransmission|TLS|media industry|transfer files|cross-border data transmission|file transfer|long distance transmission|video transmission|file transfer|data sync|synchronous transmission|small file transfer|Secure file transfer|Send Large Files|shared file|mft|sftp|ftps|File sharing|aes|Data Management|point to point transfer|Fast File Transfer|Managed File Transfer|File transfer services|File transfer server|Transfer file via email|Transfer solution|Oversized file transfer|File transfer software|file sync|File synchronization software|Big data transfer|Transfer tool|file transfer protocol|ftp|File synchronization|High-speed file transfer|High speed transmission|transfer software|SD-WAN|High-speed transmission|Telecommuting|Data exchange| Foreign trade|File management|cloud computing|Operational tools|Enterprise Network Disk|saas|Cloud storage|Secure transmission|network|Cache|socks5|Breakpoint renewal|aspera|High speed transmission protocol|Transmission encryption|High Availability|Transnational transmission|FTP transmission|File synchronous transfer|High speed data transmission|Enterprise file transfer software|Large file transfer software|Data transmission software|Cross border transmission|Transfer large files|file data|File share transfer|Accelerated transmission|Transnational file transfer|Remote large file transfer|High speed transmission|tcp|HTTP|AD|LDAP|data transmission|raysync transmission|raysync cloud|file transfer|Large file transfer|File management system|Large file transfer|raysync Software|raysync|Large file transfer solution|raysync cloud|File transfer solution|Cross border file transfer|Transnational transmission|transmit data|network disk|transmission system|Point to point transmission|Mass file transfer|data sync