Page 10 - index
P. 10







approach to transferring files, there is managed file transfer (MFT) technology, which puts
gateways between users, your organization’s network and the Internet.

Here are a few key features to look for in an MFT solution:

Ability to address current data demands and handle growing demand in the future

Automation scripts so your IT team can spend time doing other things

On-premises file storage so you can leverage your existing security infrastructure

File transfer that is quick, reliable and monitored—even with big files

Integration of the latest encryption and authentication controls for compliance with internal
and external security protocols

With MFT, IT staff can see and manage all traffic that passes through the system. Where is it
coming from? Who is it going to? Is there secure encryption on the file? Information like this
will also help when an audit comes around because it provides visibility into what files went
where and who sent them.

One of the features mentioned above may seem like an outlier, and is an option people don’t
often explore: an on-premises file access solution. This is an application that for users acts
like a cloud application but keeps files on an organization’s hardware servers. So even
though business data is accessible to users when they’re at home or on the road, the files
never actually leave the organization, and all the organization’s security measures are still in
place.

When it comes to keeping your data safe and secure, it’s not a good idea to trust FTP or
email systems that someone can hack, or a cloud that someone can break into. Instead, find
a solution that you know is safe, and can leverage the security investments you’ve already
made.

About the Author:

Tom Scearce is a senior product marketing manager at Attachmate, a
leading provider of advanced software for terminal emulation, managed
file transfer and legacy modernization. Over the span of his career, Tom’s
experience in marketing strategy, business development, sales operations
and program management has helped companies grow revenue,
predictably and profitably. Tom can be reached online on LinkedIn at
www.linkedin.com/in/tomscearce, on Twitter at @ TLOTL and at the
company’s website http://www.attachmate.com.













10 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   5   6   7   8   9   10   11   12   13   14   15