SMIME is a great way to encrypt SMTP/FTP traffic. Be aware, though, that FTP is different from other protocols like HTTP/HTTPS or SMTP in that it uses two separate data streams: one for control and one for data. Using SMIME can protect the data stream (what you send over), but doesn’t protect the control stream (your username/password and the services you’re invoking or files you’re accessing).
Unfortunately, there are no widely adopted standards for protecting FTP traffic. The suggestion to use a VPN is the best one, since it’s invisible to the applications, and can be used to protect both the data and control streams. OpenSSH can be a good solution, although it generally protects only the data stream. Similarly there are FTP over SSL implementations, but most of those also protect only the data stream.
These are basic issues with FTP in general, and are not unique to webMethods, as I suspect you know! Also, as you know, these approaches (FTP over SSH, FTP over SSL, FTP of SMIME or PGP encrypted files) all require cooperating software at both ends, none of which is a standard.
All of which is why I generally recommend HTTPS rather than FTP as a transport!
Jeremy Epstein
Director, Product Security
webMethods
#webMethods#Integration-Server-and-ESB#webMethods-General