Seven Things to Consider When Evaluating a File Transfer Solution - Slide 7

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next MFT Solution -7 Next

MFT Solution

Every time data moves across the network, there’s risk involved. It’s important to choose a MFT solution that provides comprehensive support for the latest authentication, authorization and encryption technologies. The solution should also include a full set of security protocols including HTTPS, FTPS, SFTP, and PGP over FTP.

File transfer, one of the most commonly adopted software technologies around the world, traditionally has been used for the exchange of file-based information between different IT systems and over the Internet. However, basic file transfer technology is limiting and its capabilities are fundamentally inadequate. Many of today’s existing file transfer solutions lack the management, control and integration capabilities needed to support today’s challenging business environment.

While many companies recognize the importance file transfer technology plays in their enterprise, the adoption of advanced solutions is sometimes delayed. Some companies utilize technologies such as file transfer protocol (FTP), older file transfer applications or message-based transfer to satiate their file transfer needs. However, these technologies often fall short when it comes to transferring large files.

Managed file transfer (MFT) software is quickly emerging as one of the most effective file transfer strategies for enterprises today. It enables organizations to not only protect sensitive data, but also enables compliance, improved reliability and helps increase IT productivity. Clearly, data in motion is vulnerable. Sam Morris, CISSP, a product marketing manager for Attachmate Corporation, has outlined the following issues to consider when evaluating a file transfer solution.

More Slideshows:

Five Tips to Secure Privileged and Shared Accounts Close the security gaps associated with shared password management.

Five Ways to Protect Your Organization Against Social Engineering Reduce your risk of a socially engineered attack through strictly enforced policies and procedures, training, and testing.


8 Elements of Complete Vulnerability Management Meet the challenges of today's threat landscape with these vulnerability management principles.

 

Related Topics : Nortel, Fujitsu, Information Architecture, BEA Systems, TCP/IP

 
More Slideshows

Enterprise Architecture Must Become Business Outcome-Driven to Deliver Value Enterprise Architecture Must Become Business Outcome-Driven to Deliver Value

EA practitioners need to shift their focus to deliverables that direct change and empower business and IT leaders to make better decisions....  More >>

Twelve Points to Leave Off Your Resume Twelve Points to Leave Off Your Resume

Things you should avoid adding to your resume at all costs....  More >>

Mobile Application Development: A Work in Progress Mobile Application Development: A Work in Progress

Mobile app development strategies are still a work in progress, meaning that it's still pretty much anybody's game to either win or lose....  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.