Syncplify Customers Safe From Newly Discovered XZ Library Vulnerability


(MENAFN- EIN Presswire)

Syncplify Inc.

Syncplify Server! does not rely on the XZ library. It is entirely unaffected by the malicious versions of xz Utils.

CONCORD, CA, USA, April 2, 2024 /EINPresswire / -- Syncplify Server! does not rely on the XZ library. It is entirely unaffected by the malicious versions of xz Utils. This news underscores Syncplify's unwavering commitment to prioritizing security within its SFTP solutions.

Syncplify, the leading provider of secure file transfer solutions, today confirmed that all Syncplify customers who utilize Syncplify Server! product as their SSH/SFTP server are not susceptible to the recently discovered vulnerability within the XZ library. This vulnerability could potentially grant unauthorized SSH access to vulnerable Linux systems.

“Just as Syncplify software remained secure during the Heartbleed bug in 2014 and the Terrapin exploit discovered in 2023, we are proud to assure our customers that Syncplify Server! is not impacted by this latest XZ library vulnerability,” said Fjodr Soyevskji, CTO at Syncplify.“Our commitment to security remains steadfast, and we continuously strive to deliver the most secure SFTP solutions available.”

About Syncplify
Syncplify provides a comprehensive suite of secure file transfer solutions designed to safeguard sensitive data during transfers. Syncplify offers a robust selection of features, including military-grade encryption, granular access controls, and unwavering compliance support. For more information, please visit .

Helga Kessler
Syncplify Inc.
email us here

MENAFN02042024003118003196ID1108049995


Legal Disclaimer:
MENAFN provides the information “as is” without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the provider above.