Seven Things to Consider When Evaluating a File Transfer Solution - Slide 4

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next FTP Problem -4 Next

FTP Problem

The FTP specification includes no provision for data encryption, meaning that sensitive data is easily exposed in transit.

File transfer, one of the most commonly adopted software technologies around the world, traditionally has been used for the exchange of file-based information between different IT systems and over the Internet. However, basic file transfer technology is limiting and its capabilities are fundamentally inadequate. Many of today’s existing file transfer solutions lack the management, control and integration capabilities needed to support today’s challenging business environment.

While many companies recognize the importance file transfer technology plays in their enterprise, the adoption of advanced solutions is sometimes delayed. Some companies utilize technologies such as file transfer protocol (FTP), older file transfer applications or message-based transfer to satiate their file transfer needs. However, these technologies often fall short when it comes to transferring large files.

Managed file transfer (MFT) software is quickly emerging as one of the most effective file transfer strategies for enterprises today. It enables organizations to not only protect sensitive data, but also enables compliance, improved reliability and helps increase IT productivity. Clearly, data in motion is vulnerable. Sam Morris, CISSP, a product marketing manager for Attachmate Corporation, has outlined the following issues to consider when evaluating a file transfer solution.

More Slideshows:

Five Tips to Secure Privileged and Shared Accounts Close the security gaps associated with shared password management.

Five Ways to Protect Your Organization Against Social Engineering Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.


8 Elements of Complete Vulnerability Management Meet the challenges of today's threat landscape with these vulnerability management principles.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

bots How Bots Are Going to Work to Increase Efficiency

Businesses are adopting bots to enhance business practices, in everything from procurement to marketing to sales to recruiting. ...  More >>

Remote wipe 10 Steps Your Organization Should Take to Keep Mobile Device Data Secure

In the wake of new reports of serious breaches of mobile devices and data, security professionals share their tips for securing mobile devices and their favorite security solutions. ...  More >>

Privacy rollback Security Pros Give Their Opinions on ISP Data Privacy Rollback

IT staff, organization leaders, and the average citizen have all expressed levels of concern over the FCC about-face in regard to ISP privacy. Here’s what the security experts say. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.