Page 16 - index
P. 16
• Remote server file transfers
• Downloading of files through the use of generated single click URLs
• File repository
The MFTS software connects via its own secure Hub, using standard file transfer protocols for
remote server connections. During the file transfer, the MFTS Hub provides seamless
authentication, encryption, and protocol conversion.
BlueZone Secure FTP
This is a lighter, more economical option for terminal emulation clients that require flexibility on a
smaller scale. This FTP client protects sensitive information by supplying the security you need
to share information both internally and externally. Internally, your business partners and
coworkers can share information seamlessly. This software also allows clients and customers
who are outside the firewall to have the access they need, without introducing security risks.
BlueZone Access Servers
When you choose BlueZone Access Server, your terminal emulation provides two-tier web to
host access. When you add BlueZone Security, you are choosing a cost-effective application
that provides an added layer of security. Your networks and perimeters will be protected by:
• A single, centralized terminal emulation interface and management console that is
capable of managing multiple clusters at the same time
• HTTPS client connections
• RSA SecurID Token Card support
• Includes built-in security features with authentication
• Seamlessly integrates with both Windows Domain and Active Directory Services
authentication
• SSL/TLS encryption for virtually all clients
• Has the ability and robustness needed to provide protection and support to thousands of
connections at the same time
• User interface allows integrated control over a wide range of areas, including access,
authentication, allocations, and configurations
Our three-tier terminal emulation provides added protection for your perimeter security by
strengthening firewall architecture. This added security ensures the privacy of all streaming data
by introducing an additional authentication layer to eliminate unauthorized use. It also uses
SecurID tokens and Security Dynamics Ace Server to enforce two-factor authentication,
ensuring that all of your sensitive information is protected every step of the way.
How BlueZone Security Servers Work
When using BlueZone security servers with your terminal emulation, you are protected every
step of the way. In fact, there are only four steps, and each one is designed to provide another
layer of security when you need it most.
16 Cyber Warnings E-Magazine – January 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide