Articles

The Axway blog covers a broad range of industries and topics around APIs, managed file transfer, and EDI/B2B integration. You'll find educational articles, unique insights, deep dives, and everything in between here in chronological order. Be sure to visit and bookmark blog.axway.com to explore on your own and see the latest from a diverse group of thought leaders and subject matter experts.

  • Shields up: What IT professionals wish they knew about preventing data breaches

    Shields up: What IT professionals wish they knew about preventing data breaches

    The need for safeguarding file data has never been greater There’s an old IT saying that nobody notices MFT until something goes wrong. MFT hums along in the background at many enterprises,...

    Read Article
  • ×

    Subscribe for the latest updates from Axway Blog

    First Name
    Last Name
    Company
    Country
    State
    State
    State
    Thank you!
    Error - something went wrong!
  • Can your vendor keep their promise for secure data transfer?

    Can your vendor keep their promise for secure data transfer?

    File transfer solutions have been a prime target for attacks over the past few years. It makes sense that hackers have zeroed in on these technologies: of the 80% or more business interactions...

    Read Article
  • e-Invoicing mandates, implementing AI frameworks, and a file transfer secret weapon [Latest from the Axway blog]

    e-Invoicing mandates, implementing AI frameworks, and a file transfer secret weapon [Latest from the Axway blog]

    Hard to believe we’re already well into April! Here’s a chance to quickly catch up on a few articles you may have missed on the Axway blog. Scroll below for a few recent blogs and headlines, or...

    Read Article
  • Axway blog: industry trends, expert articles, how-to's, and more

    Explore Now
  • Axway and Blue Cross Blue Shield: A Q&A on security, compliance, and scalability

    Axway and Blue Cross Blue Shield: A Q&A on security, compliance, and scalability

    I recently sat down with healthcare and life sciences sales executives to discuss their experiences working with Blue Cross Blue Shield (BCBS) companies and licensees. They share insights into the...

    Read Article
  • Five capabilities of Axway’s secure file transfer secret weapon: Transfer CFT

    Five capabilities of Axway’s secure file transfer secret weapon: Transfer CFT

    “Secret weapon?! Tell me more about this innovative secure file transfer technology which has just come off the Axway production line!” – I am hoping you are thinking. But this is not a story...

    Read Article
  • G2 customer reviews: What people are saying about Axway products

    G2 customer reviews: What people are saying about Axway products

    At Axway, we want to help everyone create brilliant digital experiences – and that extends of course to our own customers who use our solutions! Axway is proud to be named a Leader in G2’s Spring...

    Read Article
  • How to use Amplify Fusion for retrieval-augmented generation (RAG)

    How to use Amplify Fusion for retrieval-augmented generation (RAG)

    In today’s rapidly evolving AI landscape, organizations are looking for ways to make large language models (LLMs) more accurate, reliable, and business-relevant. Retrieval-Augmented Generation...

    Read Article
  • Could agentic AI revolutionize the automation of business processes?

    Could agentic AI revolutionize the automation of business processes?

    Not so long ago, in the early 2000s – a time that now seems to belong to the pre-history of computing – the simultaneous arrival of industrial scanners and high-performance image encoding...

    Read Article
  • Transform event-driven ecosystem management through automated discovery, provisioning, and insights

    Transform event-driven ecosystem management through automated discovery, provisioning, and insights

    We regularly engage with companies that are either interested in adopting event-driven technologies or are already working with them. A common topic that arises is the specification for...

    Read Article
  • Reliable finance data governance for state-of-the-art analytics

    Reliable finance data governance for state-of-the-art analytics

    In a rapidly changing business environment, Chief Financial Officers (CFOs) need to ensure effective data and analytics (D&A) governance. As Gartner’s “CFO Guide to Effective Finance Analytics...

    Read Article
  • How to secure APIs: start by eliminating the unmanaged risks to your organization

    How to secure APIs: start by eliminating the unmanaged risks to your organization

    A lot goes into the question of how to secure APIs, from best practices to vulnerability checklists and solutions. Today, we’re proud to announce that we’ve added a valuable tool to your API...

    Read Article
  • Modernizing automotive data exchange: how one global manufacturer optimized file transfers with IBM z/OS + Axway

    Modernizing automotive data exchange: how one global manufacturer optimized file transfers with IBM z/OS + Axway

    In today’s fast-paced automotive industry, seamless data exchange is critical for efficient manufacturing, supply chain management, and innovation. A leading global automotive corporation...

    Read Article
  • Why MFT matters for enterprise compliance and risk reduction

    Why MFT matters for enterprise compliance and risk reduction

    Compliance is no longer just a checkbox—it’s a moving target. As organizations move toward automating and integrating B2B file transfers across cloud and hybrid environments, compliance is no...

    Read Article
  • Bridging Kafka and the API world with Amplify Fusion

    Bridging Kafka and the API world with Amplify Fusion

    Remember those old switchboard operators, manually connecting calls by plugging cables into the right sockets? Today’s enterprise integration faces similar challenges, but instead of phone lines,...

    Read Article
  • What are event-driven APIs? Understanding event-driven vs REST API interactions

    What are event-driven APIs? Understanding event-driven vs REST API interactions

    In today’s digital landscape, APIs have become the backbone of business connectivity, and event-driven APIs are revolutionizing how systems interact in real time. But to understand why...

    Read Article
  • From zombies to legacy or shadow APIs, remediate your lost APIs with Amplify

    From zombies to legacy or shadow APIs, remediate your lost APIs with Amplify

    The largest attack vector in most organizations is unmanaged, unsecured APIs. The ones you do not know about today. The ones not showing up in your inventory of API assets. Whether you call them...

    Read Article
  • What recent CFPB changes mean for your open banking strategy in 2025: the facts about Rule 1033

    What recent CFPB changes mean for your open banking strategy in 2025: the facts about Rule 1033

    While the latest developments at the United States Consumer Financial Protection Bureau (CFPB) have made headlines, the fundamental business case for open banking remains stronger than ever....

    Read Article
  • What the file transfer breach crisis means for MFT security

    What the file transfer breach crisis means for MFT security

    File transfer solutions have been around for decades, but the conversation around its security is changing. In the words of Axway’s MFT Product Line Senior Director Paul Lavery, “MFT teams are in...

    Read Article
  • 5 ways enterprises are monetizing APIs

    5 ways enterprises are monetizing APIs

    Are you delivering business capabilities you can monetize? It’s a question enterprises should ask themselves. APIs can create new opportunities and revenue streams when treated as more than...

    Read Article
  • API monetization models: strategies to leverage APIs for greater revenue

    API monetization models: strategies to leverage APIs for greater revenue

    API monetization models highlight strategies and tactics for using APIs to make money. This can come in many forms, helping impact the bottom line directly or indirectly. Read on for definitions...

    Read Article
  • loading
    Loading More...