EFT Server Feature Comparison
|
|
|
- Isaac Young
- 9 years ago
- Views:
Transcription
1 GlobalSCAPE EFT Server version 6 is available in a small-to-medium business "SMB" (EFT Server) edition and an enterprise (EFT Server Enterprise) edition. Each edition is built on the same foundation and offer similar core functionality to enable organizations to receive files from business partners or end users over a variety of Internet standard protocols, such as FTP/S, SFTP, and HTTP/S. Add-on modules are available to both products that extend auditing from simple flat-file logging to database driven auditing and customizable reports; provide advanced security controls typically needed by organizations that must comply with security standards such as PCI, HIPAA, or SoX; facilitate ad hoc provisioning of users; provide a richer experience when transferring data over a web browser. During the evaluation period, all functionality is enabled and visible in the EFT Server administration interface. After the trial expires, the functions and modules that are enabled and visible depend on the license purchased. (EFT Server's Web Services interface, Oracle support, and AS2 are available only in the Enterprise edition.) The tables below compare the features available in each edition. Certain features require the activation of one or more of the following modules, as indicated by one or more superscript numbers next to "Optional." For example, "Optional 6,7 " indicates that the feature requires the High Security module (6) and the Auditing and Reporting module (7). 1. SFTP module (included in EFT Server Enterprise) 2. HTTP/S module (included in EFT Server Enterprise) 3. OpenPGP Encryption/Decryption module 4. Secure Ad Hoc Transfer module 5. Web Transfer Client (Requires HTTP/S module; the basic edition is limited to maximum of 5 concurrent users) 6. High Security module (Requires ARM) 7. Auditing and Reporting (ARM) (Oracle support available in EFT Server Enterprise only) 8. DMZ Gateway (Outbound proxy support in EFT Server Enterprise only) 9. AS2 (Available in EFT Server Enterprise only; requires ARM and HTTP modules) 10. Advanced Workflow Engine (AWE module); (Available in EFT Server Enterprise only) SFTP (SSH) SMB Enterprise SFTP (SSH2) Optional 1 SFTP (SSH) key manager Optional 1 Strong encryption (AES-256) Configurable SSH-protoversion-softwareversion Optional 1 Create public and private keys Optional 1 Public key authentication Optional 1 Public key list authentication Optional 1 Public key (per user) assignment Optional 1 Public key and password authentication Optional 1 Password only authentication Optional 1 Public key and/or password authentication Optional 1 FIPS-certified and validated SFTP cryptographic library Optional 6,7 Optional 6, (USA & Canada); (worldwide) 1 of 8
2 SSL (FTPS) SMB Enterprise SSL (explicit and implicit) SSLv2, 3, and TLS SSL key manager NAT support for SSL connections Require client provide SSL certificate Toggle clear command/data channels Specify SSL ciphers Specify SSL version levels IP address and PASV port overrides SSL (FTPS), continued SMB Enterprise Mutual SSL authentication (client certificate authentication) Hiding/disabling of non-allowed ciphers, key lengths, anonymous accounts, etc. Optional 6,7 Optional 6,7 FIPS-certified and validated SSL cryptographic library Optional 6,7 Optional 6,7 SSL certificate-based authentication (no password) Not Available HTTP/S SMB Enterprise HTTPS Optional 2 Customizable client portal Optional 2 Password reset using OWASP guidelines Optional 2 Username retrieval using OWASP guidelines Optional 2 Session-based and basic authentication Optional 2 Single-Sign-On (NTLM) authentication Optional 2 HTTP- to-https auto-redirect Optional 2,6,7 Optional 6,7 HTTP/S Web Transfer Client (Java Applet) Optional 2,5 Optional 5 Platform independent, web-based transfers Optional 2,5 Optional 5 Drag 'n drop transfers Optional 2,5 Optional 5 Folder transfers Optional 2,5 Optional 5 Transfer queue Optional 2,5 Optional 5 Filter by name, date, and size Optional 2,5 Optional 5 Proxy enabled (including Forefront ) Optional 2,5 Optional 5 Customizable interface Optional 2,5 Optional 5 Concurrent (simultaneous) transfers Optional 2,5 Optional 5 CRC integrity checking of completed transfers Optional 2,5 Optional 5 Large file transfer (>2GB) Optional 2,5 Optional (USA & Canada); (worldwide) 2 of 8
3 FTP SMB Enterprise Checkpoint restart (auto resume) MODE Z compression support File Integrity Checking (XCRC) of completed transfers Block bounce attacks Block anti-timeout measures Block site-to-site transfers (FXP) Multi-part transfers Customizable connection banner message Customizable user limit reached banner message FTP (cont'd) SMB Enterprise Customizable quit session banner message EBCDIC support AS2 (applicability statement 2) SMB Enterprise Inbound (server) and outbound (client) Not Available Optional 9 Drummond certified Not Available Optional 9 Message Level Security (MLS) Not Available Optional 9 AS2 Reliability Profile supported Not Available Optional 9 AS2 Multiple Attachments (MA) Profile supported Not Available Optional 9 Password Rules SMB Enterprise User-initiated password reset Forced reset on initial login Password reuse (users and administrators) Disallow reuse (password history) Password complexity (for administrators), including: Special characters Numeric characters Minimum characters Lower case characters Upper case characters No repeating characters No characters from username No characters from dictionary file Expire password on certain date Optional 6,7 Optional 6,7 Set expiration reminder ( , banner) Optional 6,7 Optional 6,7 Password reset web page Optional 6,7 Optional 6, (USA & Canada); (worldwide) 3 of 8
4 General Security SMB Enterprise Disable account after invalid login attempts Temporarily disable invalid login accounts Lock out account after invalid login attempts Set account expiration date Limit number of logins, number of connections, file size, transfer speed, and user disk quota Protection against Denial of Service (DoS) attacks Hide/modify login banners IP address ban list for Site-wide access IP address ban list for remote administrators IP address ban list for on a per user basis Block Site-to-Site transfers Provide anonymous access File type (extension) ban list Disable account after <n> days of inactivity Optional 6,7 Optional 6,7 Remove account after <n> days of inactivity Optional 6,7 Optional 6,7 General Security (cont'd) SMB Enterprise Conforms to PCI DSS 1.2 standard Optional 6,7 Optional 6,7 PCI DSS compliant host setup wizard Optional 6,7 Optional 6,7 Monitor and report on PCI DSS violations Optional 6,7 Optional 6,7 Generate PCI DSS compliance report Optional 6,7 Optional 6,7 Capture compensating controls Optional 6,7 Optional 6,7 Digital certificates Strong encryption (AES-256) Data sanitization (wiping) Optional 6,7 Optional 6,7 Streaming repository encryption (EFS) Optional 6,7 Optional 6,7 PGP encrypt/decrypt Optional 3 Optional 3 DMZ Security SMB Enterprise Secure DMZ Gateway outbound /proxy Optional 8 Optional 8 Multi-platform DMZ Gateway support (Windows, RedHat, SuSE, Linux, and Solaris 32-bit or 64-bit operating systems) Not Available Optional 8 Authentication SMB Enterprise Native (proprietary) authentication (EFT Server-managed authentication) Active Directory (AD) authentication ODBC (database) authentication NTLM authentication LDAP authentication Not Available RADIUS authentication Not Available RSA SecurID authentication Not Available (USA & Canada); (worldwide) 4 of 8
5 Administration SMB Enterprise Windows graphical user interface (administration interface) Command line COM API administration interface Limited Remote administration using administration interface or COM API Silent (unattended installs) Active-passive clustering Active-Active NLB clustering Secure remote administration (SSL) Windows Explorer-like file system view Multiple administrator support Root folder point to SAN or NAS notifications Administrator password complexity options Administrator login security options Administrator IP address white/black list Active Directory administrator login Optional 6,7 Optional 6,7 Windows administrator account login Optional 6,7 Optional 6,7 Delegated (role-based) administrator accounts, per Site, with granular permissions Not Available Auditing and Reporting SMB Enterprise Flat file logging Real-time user monitoring with kick user Monitor transactions in real time Optional 7 Optional 7 Database-driven auditing of all Server transactions Optional 7 Optional 7 Connection to SQL database Optional 7 Optional 7 Dozens of pre-built reports included Optional 7 Optional 7 Edit (customize) report layout and database query Optional 7 Optional 7 Filter parameters prior to query Optional 7 Optional 7 Output report to PDF Optional 7 Optional 7 View server, host, and site statistics Optional 7 Optional 7 Administrator action logging Not Available Optional 7 Connection to Oracle database Not Available Optional (USA & Canada); (worldwide) 5 of 8
6 Integration and Workflow SMB Enterprise Run programs via FTP "SITE" commands Clone (copy) Event Rules Multipart transfers Automatic restart of incomplete file transfers Web Services Interface Not Available Select from numerous pre-defined timers Not Available Create custom (run days) calendars Not Available Create holiday calendars (non run days) Not Available Import and export calendars Not Available Event Triggers SMB Enterprise User login, connection, disconnection, failed User login/logout User account created User password change File upload/download success File upload/download success verified (XCRC) File upload/download failed File renamed, deleted, moved Folder created, deleted, moved Log rotated Quota limit reached Account locked out or IP address banned Service/Site started/stopped Recurring timer (scheduled) event Not Available Monitor folder for changes (hot folder) Not Available Event Actions SMB Enterprise Send custom notifications Launch external processes with parameters Context variables pass-through to actions Run multiple actions on trigger IF conditional statements Compound conditional statements Logical Operators (AND, OR, and NOT) Failed action conditional logic Generate and reports (PDF, HTML) Optional 7 Optional 7 ELSE conditional statements Not Available Offload (copy/move) files using built-in client (PUT) Not Available Download files using built-in client (GET) Not Available Offload/download through DMZ Gateway, Proxy, or Socks (PUT and GET) Not Available Clean-up old data Not Available AS2 send Action Not Available Optional (USA & Canada); (worldwide) 6 of 8
7 Event Actions, continued SMB Enterprise OpenPGP Action Not Available Backup server configuration to folder Not Available Write to Windows Event Log (WEL) Not Available Run actions via Web Services (WS) invocation Not Available Advanced Workflow Actions 10 SMB Enterprise Compress files (zip, cab, lha, jar, tar) Not Available Optional 10 File operations (move, rename, concat, delete, etc.) Not Available Optional 10 Online actions (POP3, HTTP/S, FTP, SFTP, Ping, Web Services) Not Available Optional 10 Web 2.0 social media actions (Send IM, Twitter) Not Available Optional 10 System actions (print, registry, process, log event) Not Available Optional 10 Database actions (Execute stored procedure, query) Not Available Optional 10 Service actions (start, stop, install, uninstall, etc.) Not Available Optional 10 Text actions (format, find, replace, trim, insert, etc.) Not Available Optional 10 Excel actions (create, edit, delete cells, sheets, books) Not Available Optional 10 Terminal actions (connect, send text, get text, etc.) Not Available Optional 10 Execute external (scripts, execute dll function, DDE) Not Available Optional 10 Cryptographic actions (encrypt, decrypt, gen key, sign, verify) Not Available Optional 10 XML actions (read, merge, transform, eval, etc.) Not Available Optional 10 AD Actions (query, edit, create, and delete objects) Not Available Optional 10 Network actions (connect, map drive, MSMQ) Not Available Optional 10 SNMP (get, set, walk, send trap, get bulk, etc.) Not Available Optional 10 Integrate with Sharepoint Server Not Available Optional 10 Resource Management SMB Enterprise Automated file maintenance Centralized account management Settings Templates (set once and apply to many) Permission groups User and group permissions for Server access User home directory as root Set storage limit (disk quota) Set bandwidth limit (transfer quota) Set max connection limit Set max connection per IP limit Set max connections for same user account name Set max concurrent socket connections Set max uploads per session Set max downloads per session Create virtual folders and map to UNC Provide anonymous access (USA & Canada); (worldwide) 7 of 8
8 Ad Hoc File Transfer 4 SMB Enterprise Specify recipient address using a web form Optional 4 Optional 4 Specify multiple To, Cc, and Bcc addresses Optional 4 Optional 4 Batch send (send multiple files) Optional 4 Optional 4 Configure automatic clean-up of ad hoc accounts Optional 4 Optional 4 Notify sender upon recipient pick-up Optional 4 Optional 4 Authentication send options (single link, separate login) Optional 4 Optional 4 Black and white list for destination domains Optional 4 Optional 4 AD and LDAP integration (limit use to authorized users) Optional 4 Optional 4 Configurable target folder permissions Optional 4 Optional 4 Customizable web pages Optional 4 Optional 4 Define default permissions for the temporary users' home folders Optional 4 Optional (USA & Canada); (worldwide) 8 of 8
www.goanywhere.com Version 3.5.0 Listed below are the detailed features in GoAnywhere Services shown with all the licensed options.
Version 3.5.0 Listed below are the detailed features in GoAnywhere Services shown with all the licensed options. File Transfer Protocols SFTP FTP over SSH FTPS FTP over SSL/TLS SCP Secure Copy over SSH
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA The MOVEit line of secure managed file transfer software products by Ipswitch File Transfer consists of two flagship products, the
With Globalscape EFT and the High-Security Module. The Case for Compliance
Facilitating Enterprise Compliance With Globalscape EFT and the High-Security Module Globalscape s Enhanced File Transfer (EFT ) High Security module (HSM), with the Auditing and Reporting module (ARM),
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
AUTOMATING FILE TRANSFERS WITH EVENT RULES EFT SERVER V6.5
AUTOMATING FILE TRANSFERS WITH EVENT RULES EFT SERVER V6.5 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800)
Sysax Multi Server User manual
Sysax Multi Server User manual Table of Contents 1. Introduction to Sysax Multi Server... 1 1.1. Introduction to Sysax Multi Server... 2 2. Minimum System Requirements... 4 2.1. System Requirements...
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
RFG Secure FTP. Web Interface
RFG Secure FTP Web Interface Step 1: Getting to the Secure FTP Web Interface: Open your preferred web browser and type the following address: http://ftp.raddon.com After you hit enter, you will be taken
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
NETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!
Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
LifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.
OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Methods available to GHP for out of band PUBLIC key distribution and verification.
GHP PGP and FTP Client Setup Document 1 of 7 10/14/2004 3:37 PM This document defines the components of PGP and FTP for encryption, authentication and FTP password changes. It covers the generation and
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Architecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
Secure FTP Server. User's Guide. GlobalSCAPE
Secure FTP Server User's Guide GlobalSCAPE Table Of Contents Secure FTP Server... 1 Support... 3 What's New in Secure FTP Server 3... 4 Install and Register...6 Install... 6 Register... 6 HTTPS Trial...
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA
MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA The MOVEit DMZ server, MOVEit clients, and FIPS 140-2 validated MOVEit cryptographic software products by Ipswitch File Transfer have been designed
1 Attack Top Attackers Report, Top Targets Report, Top Protocol Used by Attack Report, Top Attacks Report, Top Internal Attackers Report, Top External Attackers Report, Top Internal Targets Report, Top
Ipswitch WS_FTP Server
Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The
Media Shuttle. Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement
Media Exchange TM Media Shuttle TM Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement The Fastest, Easiest, Safest Way to Move Digital
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
WhiteWave's Integrated Managed File Transfer (MFT)
WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
LICENSE4J LICENSE MANAGER USER GUIDE
LICENSE4J LICENSE MANAGER USER GUIDE VERSION 4.5.5 LICENSE4J www.license4j.com Table of Contents Getting Started... 4 Managing Products... 6 Create Product... 6 Edit Product... 7 Refresh, Delete Product...
Content Distribution Management
Digitizing the Olympics was truly one of the most ambitious media projects in history, and we could not have done it without Signiant. We used Signiant CDM to automate 54 different workflows between 11
Enterprise Security Critical Standards Summary
Enterprise Security Critical Standards Summary The following is a summary of key points in the Orange County Government Board of County Commissioners (OCGBCC) security standards. It is necessary for vendors
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
WS_FTP Server. User Guide
WS_FTP Server User Guide Contents CHAPTER 1 WS_FTP Server Overview What is WS_FTP Server?...1 System requirements for WS_FTP Server...1 How FTP works...3 How SSH works...3 Activating WS_FTP Server for
Quick Reference Guide. Online Courier: FTP. Signing On. Using FTP Pickup. To Access Online Courier. https://onlinecourier.suntrust.
Quick Reference Guide Online Courier: FTP https://onlinecourier.suntrust.com With SunTrust Online Courier, you can have reports and files delivered to you using an FTP connection. There are two delivery
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Bomgar License Comparison
Feature Standard Enterprise Multi-OS Support Support customers who are using Windows 95-Vista or the latest versions of Macintosh, SuSE, Ubuntu, RedHat, Fedora, Windows Mobile, and Blackberry. For providing
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
MDaemon Vs. Microsoft Exchange Server 2013 Standard
Comparison Guide Vs. The following chart is a side-by-side feature comparison of and. Flex Licensing Maximum Accounts Unlimited Unlimited SMTP, POP3, DomainPOP, and MultiPOP POP3 & SMTP Only SSL / TLS
SECUR IN MIRTH CONNECT. Best Practices and Vulnerabilities of Mirth Connect. Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions
SECUR Y IN MIRTH CONNECT Best Practices and Vulnerabilities of Mirth Connect Author: Jeff Campbell Technical Consultant, Galen Healthcare Solutions Date: May 15, 2015 galenhealthcare.com 2015. All rights
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud
Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud Contents File Transfer Protocol...3 Setting Up and Using FTP Accounts Hosted by Adobe...3 SAINT...3 Data Sources...4 Data Connectors...5
DSI File Server Client Documentation
Updated 11/23/2009 Page 1 of 10 Table Of Contents 1.0 OVERVIEW... 3 1.0.1 CONNECTING USING AN FTP CLIENT... 3 1.0.2 CONNECTING USING THE WEB INTERFACE... 3 1.0.3 GETTING AN ACCOUNT... 3 2.0 TRANSFERRING
FileMaker Security Guide The Key to Securing Your Apps
FileMaker Security Guide The Key to Securing Your Apps Table of Contents Overview... 3 Configuring Security Within FileMaker Pro or FileMaker Pro Advanced... 5 Prompt for Password... 5 Give the Admin Account
STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. [email protected]
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. [email protected] Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
MassTransit vs. FTP Comparison
MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
TimePictra Release 10.0
DATA SHEET Release 100 Next Generation Synchronization System Key Features Web-based multi-tier software architecture Comprehensive FCAPS management functions Software options for advanced FCAPS features
CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper
CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in
Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...
CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration
OMU350 Operations Manager 9.x on UNIX/Linux Advanced Administration Instructor-Led Training For versions 9.0, 9.01, & 9.10 OVERVIEW This 5-day instructor-led course focuses on advanced administration topics
Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.
Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Communication Protocol Adapters in Sterling Integrator. 2009 IBM Corporation
Communication Protocol Adapters in Sterling Integrator Agenda Overview of communications adapters in Sterling Integrator (SI) Important concepts Perimeter Server Mailbox Key management HTTP(S) related
Server Manager Help 10/6/2014 1
Server Manager Help 10/6/2014 1 Table of Contents Server Manager Help... 1 Getting Started... 7 About SpectorSoft Server Manager... 8 Client Server Architecture... 9 System Requirements... 10 Screencasts...
NetWrix Exchange Change Reporter
NetWrix Exchange Change Reporter Version 7 Administrator s Guide Contents NetWrix Exchange Change Reporter Administrator s Guide 1. INTRODUCTION... 4 1.1 KEY FEATURES... 5 1.2 LICENSING... 6 1.3 HOW IT
DocuShare User Guide
DocuShare User Guide Publication date: April 2011 This document supports DocuShare Release 6.6.1 Prepared by: erox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California 94304 USA
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
The Requirements Compliance Matrix columns are defined as follows:
1 DETAILED REQUIREMENTS AND REQUIREMENTS COMPLIANCE The following s Compliance Matrices present the detailed requirements for the P&I System. Completion of all matrices is required; proposals submitted
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
WS_FTP Professional 12. Security Guide
WS_FTP Professional 12 Security Guide Contents CHAPTER 1 Secure File Transfer Selecting a Secure Transfer Method... 1 About SSL... 2 About SSH... 2 About OpenPGP... 2 Using FIPS 140-2 Validated Cryptography...
[CERBERUS FTP SERVER 6.0]
2013 Cerberus, LLC Grant Averett [CERBERUS FTP SERVER 6.0] User manual for Cerberus FTP Server 6.0. It contains detailed steps and help on configuring Cerberus FTP Server. CONTENTS Introduction... 10 Description...
MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE
MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE ABSTRACT Data workflows are truly the lifeblood of organizations today, yet the infrastructure supporting these workflows are typically less than ideal.
IBM Sterling Control Center
IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise
FileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
Jitterbit Technical Overview : Salesforce
Jitterbit allows you to easily integrate Salesforce with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
SOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
Moveit DMZ User Manual
ARKANSAS BLUE CROSS BLUE SHIELD Moveit DMZ User Manual EDI Services 2/1/2013 Index Moveit DMZ Introduction...1 Initial Login and Password Change...2 Navigation...8 Getting Started Folders...11 Upload a
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
SecureTransport. Version 5.3.0
G E T T I N G S T A R T E D G U I D E SecureTransport Version 5.3.0 28 September 2015 Copyright 2015 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport
SMTPSWITCH MAILER V6 FEATURES
SMTPSWITCH MAILER V6 FEATURES 22 Powerful Features Packed in a Single Email Marketing/Bulk Mailing Program! Easy and Advanced WYSIWYG/HTML Editing SMTPSwitch Mailer has a powerful built-in WYSIWYG editor
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution
DiskBoss - Data Management Solution DiskBoss provides a large number of advanced data management and analysis operations including disk space usage analysis, file search, file classification and policy-based
How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO
FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows
Quest InTrust Version 8.0 What's New Active Directory Exchange Windows Abstract This document describes the new features and capabilities of Quest InTrust 8.0. Copyright 2004 Quest Software, Inc. and Quest
