Seven Things to Consider When Evaluating a File Transfer Solution

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Previous Seven Things to Consider When Evaluating a File Transfer Solution-1 Next

Click through for issues to consider when looking at a file transfer solution.

File transfer, one of the most commonly adopted software technologies around the world, traditionally has been used for the exchange of file-based information between different IT systems and over the Internet. However, basic file transfer technology is limiting and its capabilities are fundamentally inadequate. Many of today’s existing file transfer solutions lack the management, control and integration capabilities needed to support today’s challenging business environment.

While many companies recognize the importance file transfer technology plays in their enterprise, the adoption of advanced solutions is sometimes delayed. Some companies utilize technologies such as file transfer protocol (FTP), older file transfer applications or message-based transfer to satiate their file transfer needs. However, these technologies often fall short when it comes to transferring large files.

Managed file transfer (MFT) software is quickly emerging as one of the most effective file transfer strategies for enterprises today. It enables organizations to not only protect sensitive data, but also enables compliance, improved reliability and helps increase IT productivity. Clearly, data in motion is vulnerable. Sam Morris, CISSP, a product marketing manager for Attachmate Corporation, has outlined the following issues to consider when evaluating a file transfer solution.

More Slideshows:

Five Tips to Secure Privileged and Shared Accounts Close the security gaps associated with shared password management.

Five Ways to Protect Your Organization Against Social Engineering Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.


8 Elements of Complete Vulnerability Management Meet the challenges of today's threat landscape with these vulnerability management principles.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

blockchain The World According to Blockchain

Blockchain comes with many costs and is surrounded by confusion. Here, we examine realistic use cases, drawbacks and the potential of blockchain. ...  More >>

IoT challenges IoT: Top 7 Challenges

The IoT represents a unique set of challenges that pose a real threat to its utility as an engine of economic growth. Fortunately, the problems encountered so far are solvable, although it will probably take some time to determine exactly how to handle them and what level of optimization is needed for the multiple IoT services that are certain to arise. ...  More >>

biometrics Biometrics: Moving Far Beyond Fingerprints

Biometrics are changing the way we think about security. Here are some of the more innovative ways biometrics are being used and what we can expect in the future. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.