No More FTP Eliminate FTP and Attachment Issues with Proofpoint Secure File Transfer
|
|
|
- Gervase Goodman
- 10 years ago
- Views:
Transcription
1 No More FTP Eliminate FTP and Attachment Issues with Proofpoint Secure File Transfer Proofpoint Secure File Transfer: A secure, compliant and easyto-use solution for transmitting large files Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA P F [email protected]
2 Proofpoint s solution for secure transmission has been developed to provide a compliant, easy-to-use and easy-to-manage alternative to traditional file transfer techniques including FTP and attachments. Deploying Proofpoint Secure File Transfer as part of your Proofpoint deployment can help you eliminate the need for FTP servers, improve the performance of your systems, reduce storage requirements, and create compliant business processes.
3 Contents Overview...1 The Growing Need to Send Large Files...1 Why FTP Falls Short For Today s Business Requirements...1 Lack of security is the most dangerous shortcoming of FTP...2 FTP account set up is time consuming for IT...2 File management on FTP servers is an administrative burden...2 FTP is not a good collaboration tool...2 FTP does not meet compliance requirements...2 An FTP Alternative: Proofpoint Secure File Transfer...3 Enabling the secure sharing of any size file...3 Eliminating administrative burdens...3 Managing digital assets...3 Enabling compliant processes...3 Providing operational efficiencies...3 Table 1: Comparison of File Transfer Methods...4 Compliant File Transfer Applications...5 Table 2: US regulations regarding data permanence, security, privacy and traceability...5 Proofpoint Secure File Transfer Components...6 Proofpoint Secure File Transfer Appliance or Virtual Appliance...6 Web-based User Interface and Client Plug-in...6 Proofpoint Administrative Interface...7 Benefits of Using Proofpoint Secure File Transfer...7 For Further Reading...8 Outbound and Data Loss Prevention in Today s Enterprise, Regulations Shift Focus on Outbound Security...8 Confidential: Are Your Secrets Safe?...8 Best Practices in Messaging Security...8 Encryption Made Easy...8 About Proofpoint, Inc...8 Contents
4 Page ii
5 Overview Today s business environment requires ad hoc and instantaneous sharing of information. Systems for sending large files have not kept pace with the needs of today s enterprise, where increasingly large and sophisticated business documents, files and media need to be quickly transmitted and shared with coworkers, business partners and customers around the world. Existing solutions for sending large files fall short in several regards: does not handle large files (even just 10MB) efficiently and FTP is too difficult to manage, administer and use. End users often resort to time-consuming workarounds such as burning CDs and sending them via overnight mail or to using unapproved (and uncontrolled) technology solutions such as thirdparty file transfer services or instant messaging. More seriously, FTP and CD sending do not meet the stringent tracking and audibility requirements of business processes that must comply with government and industry mandates such as Sarbanes-Oxley Section 404, FDA 21 CFR Part 11, and HIPAA. Proofpoint s solution for secure transmission of large or sensitive files, Proofpoint Secure File Transfer, has been developed to provide a compliant, easy-to-use and easy-to-manage system to send large files. Deploying Proofpoint Secure File Transfer as part of your Proofpoint deployment can help you eliminate the need for FTP servers, improve the performance of your systems, reduce storage requirements, and create compliant business processes. The Growing Need to Send Large Files Today s business environment is changing more rapidly than ever before. Globalization and increased competition are driving new business models and collaboration needs. For example, outsourcing is creating new demands to synchronize business processes across companies and increase the sharing of information. Another example is the always on, distributed company that has to make faster decisions, which requires more information to be available and shared more broadly. Business users are demanding new tools for instantaneous ad hoc communication and data transfer. Information and how we share it has evolved as well. Five years ago, most people would use to share spreadsheets and PowerPoint presentations. For other data sharing, they typically relied on custom systems. Today, presentations and spreadsheets are much bigger and are used much more broadly. In addition, application files and sometimes even whole databases are regularly shared as part of new business processes. Examples of large files that are routinely sent today include closing documents for complex financial transactions, design documents for engineering firms, research databases for pharmaceutical companies, and video files for advertising and media firms. Many of these files are so big that cannot reasonably be used to deliver them. Finally, many business processes have changed so rapidly that the supporting IT systems are out of sync with the businesses they support. While people used to rely on corporate systems to integrate a company, we are now seeing much more data being shared outside the formal IT systems, using alternative or non-standard solutions. While some organizations have resorted to more cumbersome and costly solutions, such as CD burning and overnight mail, most companies need to move at electronic speed and are using a very unlikely tool to send their data: FTP. Why FTP Falls Short For Today s Business Requirements FTP, or File Transfer Protocol, was one of the first protocols developed for the Internet back in FTP was developed so that people could share files between computers on the Internet. It was designed by programmers to share files with other programmers with the usage metaphor of manually copying files through a command line interface. It rapidly became a ubiquitous programmer tool but it is very unlikely that it would ever have become a business tool had there existed reasonable alternatives. When FTP is used in a business environment it is typically implemented as follows: An FTP administrator creates one or more FTP directories where files that need to be shared are put. People who want access to these files are granted access to one or all of these directories. Recipients (or downloaders) download files through a browser from the directories they have access to. Page 1
6 For business collaboration, FTP is often unfamiliar, inconvenient, and difficult to fit into the normal work flow. However, FTP falls short as a scalable business application in several other areas that are more serious and more costly than the issue of inconvenienced business users. Enterprises Concerns about FTP Enterprise IT professionals are rightly worried about the risks associated with FTP. In its March 2008 survey of more than 300 decision makers in large enterprises, Proofpoint found that 41% of respondents are concerned or very concerned about FTP as a potential conduit for the exposure of confidential or private information. Traditional Attachments are not the Answer, Either As you ve undoubtably noticed, large attachments are clogging up servers. ing file attachments larger than 10MB is no longer feasible in most organizations. Incredible really, given that is the de facto standard for enterprise communication and collaboration and that as usage has increased exponentially, so has the size and volume of file attachments. The problem that many businesses are discovering is that was not designed to act as a primary file transfer server for large file attachments. These large files can, and do, quickly congest the entire network, slow down productivity, and leave businesses exposed to severe security risks. One large file attachment can cause an enterprise network to slow down. Even a mediumsized file sent to a large distribution list can disrupt and other critical enterprise applications. In the worst case scenario, servers have been known to crash from extreme workload. Lack of security is the most dangerous shortcoming of FTP When FTP was designed, the security environment was much more benign. Now, with the need for greater controls and tracking of digital assets, FTP represents a security risk for most companies. Security and control have become the responsibility of the over-taxed IT administrator, who must minimize file exposure to the wrong parties, delete files, setup and manage accounts, maintain complex file directories, and securely distribute passwords. Frequently, the system breaks: passwords are shared amongst multiple users, files are left for months in FTP directories and confidential documents may be exposed. Many of the security vulnerabilities have been alleviated with new flavors of FTP (e.g., SFTP, FTPS, EFTP) which typically require that special client programs be installed on users computers. However, requiring ad-hoc recipients to install a program for file delivery imposes a time consuming overhead, which limits adoption. FTP account set up is time consuming for IT An FTP system account has to be created for both uploaders and downloaders. Waiting for this to happen is frustrating for business users who may have an immediate need to transmit a large file. Apart from administration overhead, this causes further security issues because users start sharing accounts and passwords and outside recipients have login access to a computer behind the corporate firewall. File management on FTP servers is an administrative burden Over time, FTP directories tend to fill up as users upload more files. Unfortunately, the people who upload files rarely remove them. The result is directories of hundreds of large files and little knowledge as to which files should be deleted. The FTP administrator will likely guess based on file name, type and date, with somewhat unpredictable results and potentially upset users. Because of the lack of automatic cleanup of files in FTP, valuable digital assets are frequently left unprotected in an FTP directory for extended periods. FTP is not a good collaboration tool The usage metaphor of FTP is quite different from , the standard ad hoc collaboration tool for business. Users have to download a file when they believe that a new version has been uploaded. The uploader will not know when someone downloads a file. There is very little ad hoc about FTP because of the account setup structure. From a user perspective, the preferred way to send a large file is as an attachment. However, because of the burden on the infrastructure (specifically storage and server performance), large attachments are often prohibited on many systems, forcing FTP on end users and IT. FTP does not meet compliance requirements Data protection and corporate governance regulations such as HIPAA, FDA 21 CFR Part 11 and Sarbanes-Oxley, require that companies prove that the intended information and only the intended information was shared or exchanged (HIPAA); administrative controls are in place when electronic systems and records are used in place of paper or manual systems (FDA); and that business processes have integrity and are auditable (Sarbanes-Oxley). In these environments, FTP does not have the required control capabilities. The only way companies can prove that data deliveries took place is if the delivery system keeps records of all transactions and that these records can be retrieved later. But FTP doesn t keep records of each download. This makes sense: FTP was designed to be an open protocol for programmers to share files and not to be an auditable business tool. Still, business processes that routinely rely on FTP to deliver information or other digital assets are not auditable and are not compliant. And although FTP is free, when the above factors are taken into account, the cost is clearly significant and the possible risks even more costly. This has lead to some organizations developing their own applications, but this approach is hard to maintain and to scale with the business usage needs of both internal and external users. Page 2
7 So, what compliant, secure, and effective alternatives are there to FTP? An FTP Alternative: Proofpoint Secure File Transfer Until now, the few alternatives to sharing large files have not been easy to use or deploy, nor suitable for meeting widespread requirements for security, scalability, usability, and maintenance. The ideal file transfer system needs to have the following characteristics: o Auditability and traceability: This can be considered one of the key drivers of a better file transfer system. Government regulations now demand that companies have in place auditable business processes. Large file sharing is often part of critical business processes. See Table 2 (page 5) for a list of major compliance regulations. o Security: Large files often represent digital assets that need to be managed securely rather than being sent out in the open. FTP is insecure by design, with no encryption or secure channels for upload or download. o Easy management and maintenance: The ease with which a system can be managed and maintained greatly impacts that system s total cost of ownership. o Efficiency: Although bandwidth and storage may be getting cheaper, the management costs related to storage and bandwidth can be several times the original purchase cost. Given the exponential increase in file size and the need to share more and more versions of these files with more and more people, any file transfer system must be able to automatically make optimal use of available storage and bandwidth without administrator intervention. Proofpoint Secure File Transfer has been developed to meet the need for easier to use, easier to maintain, and more secure large file sharing. Proofpoint Secure File Transfer is easy to use and requires nearly zero administration for IT. This system addresses the limitations of FTP by: Enabling the secure sharing of any size file Proofpoint Secure File Transfer gives business users an easy and intuitive way to send documents of up to 20 Gigabytes to both internal and external recipients. All data transfers use secure channels. Senders receive a download receipt whenever a file is downloaded. Eliminating administrative burdens Users send files through a web interface, or via regular (using a plug-in for Microsoft Outlook) as easily as sending an with an attachment. The recipient receives an with a link to the file and downloads the file by simply clicking on a link provided in the message. Optionally, the system allows external recipients to self-register, enabling them to send files back to the originating organization. This eliminates the need to have system accounts laboriously setup, monitored, and deleted for both sender and recipient. Managing digital assets Any file sent and downloaded is tracked, the sender receives a download receipt, and files can be automatically deleted or archived after a system-configurable length of time. The only way files can be accessed is through the embedded links. Enabling compliant processes Because of the secure and auditable design of Proofpoint Secure File Transfer, it can be part of business processes that comply with many types of data protection, privacy and corporate governance regulations. The next section highlights some of the regulatory requirements that the system supports. Providing operational efficiencies Proofpoint Secure File Transfer optimizes both storage and bandwidth. Any type of storage NAS, SAN, offline, etc. can be integrated with the Proofpoint Secure File Transfer appliance for long term archival. Automated retention and deletion rules can be put in place that make the system self-managing. The system is able to fill available bandwidth, such as point-to-point lines, for maximum speed of transfer. It enables optimum service levels because spikes for sending large files are smoothed and files can be prioritized for sending. Furthermore, the sys- Storage Issues with Enterprise File Transfer The popularity and pervasiveness of has created a very serious problem for organizations of all sizes. As the sophistication and size of attachments carried in have grown, the number of problems for IT administrator and users alike has grown. Large attachments sent through can dramatically drive up storage costs and also reduce the performance of messaging servers. You can t get there from here Exchanging large files has become a core business process for most organizations, and telling end users You can t get there from here is not an adequate answer to what to do with large files. servers and client software are not designed to handle large files and, in most organizations, sending and receiving attachments is typically limited to files less than 5-10 MB in size. Proofpoint Secure File Transfer enables both internal and external users to send large file attachments regardless of the attachment limits your organization enforces. Mailbox Quotas and Attachment Policy Backlash The response from most IT departments to the problems of file transfer has been to implement quotas on the size of mailboxes and/or limitations on the size of attachments that can be sent through . While such policies are essential for keeping systems running smoothly, they don t actually solve the problem of how to send large file attachments over an enterprise network. In reality, imposing mailbox quotas has resulted in users spending more time managing their mailbox sizes and many are tempted to circumvent IT-imposed limits through the use of personal Webmail accounts, online file transfer services and IM. Page 3
8 None of these approaches represents a scalable, auditable way to send large files securely from within the company. In many cases, mailbox quotas and attachment size limits results in normally rule-abiding employees bypassing corporate messaging security defenses to send files outside their enterprise infrastructure. Proofpoint Solves the Problems Associated with Large Attachments By deploying Proofpoint Secure File Transfer, companies are able to offload file attachments from the server, preserving network performance and equally importantly enabling end users to securely exchange large files. End the Administrative Burdens Related to Attachments Proofpoint Secure File Transfer allows internal and external users to send and receive files and folders without adding IT administrative overhead or infrastructure burden. With Proofpoint, IT has a solution that enables users to send large file attachments without clogging servers and slowing down the messaging infrastructure. End users appreciate the solution too, because it uses a familiar interface. Using Proofpoint Secure File Transfer, end users still send an , but instead of the file being attached and sent through the system, the file is automatically uploaded to a Proofpoint appliance. Recipients download the file by clicking on a secure link sent along with the message. tem can be configured to be redundant with failover capability and is able to scale seamlessly as the business need grows. Table 1: Comparison of File Transfer Methods Key Features Business Suitable for ad-hoc file delivery Administration Account creation and deletion File deletion or expiration Reporting and visibility Security Transport Layer Security Virus scanner integration FTP Newer FTP (SFTP, FTPS, EFTP) Attachments No No Yes Yes Proofpoint Secure File Transfer Manual Manual Automatic Automatic Manual Manual Manual (shifts the problem to mail server) Automatic Log files Varies Difficult Clear and simple None Varies None Yes (SSL) Cumbersome Cumbersome Easy Easy Login Security No Yes Depends Yes End User Impact Desktop client installation Send/receive very large files Zero impact on mailbox storage limits Accounts can be created without administrator intervention Recipient receipt notification Not required (browser) Required Not required Not required (browser or optional plug-in) Yes Yes No Yes Yes Yes No Yes No No Yes Yes No No No Yes Page 4
9 Compliant File Transfer Applications There are numerous regulations where Proofpoint Secure File Transfer can aid in compliance. The table below summarizes several U.S. regulations that address data permanence, data security, data privacy, and data traceability. Proofpoint Secure File Transfer can support a compliant business process in these areas: Table 2: US regulations regarding data permanence, security, privacy and traceability Legislation Vertical Segment Requirement Impact Sarbanes-Oxley (SOX) Industry-wide Act, Section 404 Health Insurance Portability and Accountability Act (HIPAA) Healthcare, others Requires public companies to verify that their financial-reporting systems have the proper controls, such as ensuring that revenue is recognized correctly. Requires testing and monitoring of internal controls via establishing, documenting, and auditing business processes. Addresses security policies and procedures of insurance companies and providers regarding personal health information and services. 21 CFR Part 11 Life Sciences Regulates life science and pharmaceutical companies involved in biotechnology and manufacture of medical equipment, food, and beverage concerning electronic and paper record retention. Department of Defense (DOD) Securities and Exchange (SEC) Act Rules 17a-3 4 (17 CFR 240,17a-3,4) Government Financial Services Concerns all defenserelated government agencies and contractors use of technologies relating to records. Requires broker retention of sent and received communication, including interoffice memos, s, sales training manuals, advertisements, and account records Audit trails, authenticity, record retention Record retention, privacy, protection, service trails Record retention, authenticity, confidentiality, audit trails Authenticity, protection, secure shredding Protection, audit trails Record retention, authenticity Page 5
10 Proofpoint Secure File Transfer Components Proofpoint has the premiere appliance-based secure file transfer solution on the market today. Proofpoint s enterprise solution is cost-effective, auditable, secure, and easy-to-use for both business users and IT administrators. Figure 1 illustrates the simple process by which files can be sent and received. When a business user needs to send a large or sensitive file, they use the Proofpoint Secure File Transfer web interface or client plug-in to compose an and attach the files they need to transmit. Instead of being sent as an attachment, the files are automatically uploaded to the Proofpoint Secure File Transfer appliance. The recipient is sent an containing a secure link to the file. The recipient clicks on the secure link to download the file from the Proofpoint appliance. Sender Create Attach Files Files Delivered Securely via Proofpoint Secure File Transfer Retrieve Files from Appliance Recipient Download Files Click Secure Link Hit Send Files Uploaded to Appliance Review Valid Sent with Secure Link Figure 1: How Proofpoint Secure File Transfer works Proofpoint s secure file transmission solution consists of the following components. Powered by Proven, Enterprise File Transfer Technology Proofpoint Secure File Transfer is powered by Accellion File Technology. Proofpoint Secure File Transfer Appliance or Virtual Appliance The Proofpoint Secure File Transfer appliance (available in both hardware appliance and virtual appliance form factors) is used to temporarily store large files as they are being transferred. Proofpoint Secure File Transfer appliances can be deployed as a single site installation with a single Proofpoint appliance or, in an enterprise installation, multiple appliances can installed in different geographic locations to provide a secure file transfer network. The Proofpoint appliance is installed in the DMZ for delivering attachments to external recipients. Proofpoint Secure File Transfer requires minimal ongoing maintenance because the operating system and software are maintained automatically, so issues with operating system compatibility do not exist. The appliance is available in multiple models to fit the capacity needs of any size enterprise. Web-based User Interface and Client Plug-in Proofpoint users have the choice of sending a large file via the Proofpoint Secure File Transfer web interface or using the Proofpoint Secure File Transfer plug-in for Microsoft Outlook. Using either interface, the business user composes an to the intended recipient and attaches the file. When the is sent, the file is not included in the . Instead, a secure link to the file is included. The attached file is instead sent to the Proofpoint appliance. The recipient clicks on the link in the and downloads the file from the Proofpoint appliance. Page 6
11 Proofpoint Administrative Interface Initial setup and ongoing administration are accomplished through an easy-to-use, Web-based administrative interface. Appliances can be managed remotely through a standard Web browser. Administrators can easily configure flexible file replication and retention policies, based on the parameters such as the amount of time files should be stored, the type of file, user groups and other parameters. Statistics and usage can be reported for a particular appliance or a network of appliances. Chargeback grids can also be established to bill clients or internal departments for metered usage of the secure file transfer system. Benefits of Using Proofpoint Secure File Transfer Proofpoint Secure File Transfer sends large files outside the infrastructure, alleviating the storage, security and cost burdens that such files place on the system. Yet Proofpoint s solution provides all of the convenience of for both senders and recipients. Senders initiate a file transfer using already familiar Web or plug-in interfaces. Recipients receive an message with an embedded, secure link. Any business process that incorporates the transfer of large files and needs to verify authenticity, maintain an audit trail, and retain a record of file transfer will benefit from incorporating Proofpoint Secure File Transfer. Because the system is easy to use for both senders and recipients, it can be integrated into any compliant business process to ensure that a file, document or any other digital asset has been (1) delivered to the intended recipient at the intended time, and (2) deleted or archived for the required time. Because the does not include the file as an attachment, the is very small and will not be blocked by any size restrictions on recipient s system. When the recipient receives the and clicks on the embedded link, the file is downloaded from the Proofpoint appliance securely using SSL. The file transfer is secure and compressed for optimal performance and bandwidth utilization. The most important feature, from a compliance perspective, is the fact that the Proofpoint Secure File Transfer system keeps records of all downloads. Return receipts are also sent to senders every time a file is downloaded so they can ensure receipt of files without having to consult a system administrator. Unlike FTP, Proofpoint s appliance-based file transfer solution is easy to manage. Account creation and maintenance is greatly simplified with Proofpoint. With LDAP/AD integration, users of Proofpoint file transfer can make use of existing network accounts and passwords. Recipients of files sent via Proofpoint Secure File Transfer can also voluntarily register as restricted senders and can send files back to the sender, without IT intervention. With the elimination of FTP, file management is no longer IT-support intensive. Proofpoint Secure File Transfer can automatically remove files and expire file links when their availability timeframe has expired. Page 7
12 For Further Reading Proofpoint offers a variety of free educational whitepapers that further describe the risks associated with outbound and the policies, processes and technologies that can be used to reduce those risks. Visit our online resource center at for the latest information. Outbound and Data Loss Prevention in Today s Enterprise, 2008 Proofpoint s annual survey of desicion makers in large enteprises uncovers the surprising facts about enterprise concerns about outbound messaging, the frequency of data loss incidents in the enterprise and the techniques and technologies used to mitigate the threats associated with outbound and other messaging technologies. Regulations Shift Focus on Outbound Security Discusses the impact of relatively new data protection regulations and standards such as the Payment Card Industry (PCI) Data Security Standard (DSS) and the Office of Management and Budget (OMB) Personally Identifiable Information Guidelines (PIIG), which place new constraints on how data is stored, processed, and transmitted over Confidential: Are Your Secrets Safe? Discusses the financial and legal risks associated with leaks of confidential information and valuable intellectual property and outlines a process for implementing and enforcing policies that can keep valuable information secure: Best Practices in Messaging Security Discusses the increasing number of healthcare and financial privacy regulations and how they impact systems: Proofpoint, Inc. All rights reserved. Proofpoint, Proofpoint Secure File Transfer, Proofpoint Protection Server, Proofpoint Messaging Security Gateway, Proofpoint on Demand, Proofpoint MLX, Proofpoint Content Compliance, Proofpoint Regulatory Compliance, Proofpoint Network Content Sentry, Proofpoint Secure Messaging and Proofpoint Digital Asset Security are trademarks or registered trademarks of Proofpoint, Inc. in the US and other countries. Portions of this document are copyright Accellion, Inc. and are used by permission. Version 05/08 - Rev A For More Information Proofpoint, Inc. US 892 Ross Drive Sunnyvale, CA USA P F E [email protected] Encryption Made Easy Discusses the development of encrypted messaging systems and the unique advantages of Proofpoint s secure messaging solution: About Proofpoint, Inc. Proofpoint provides unified security and data loss prevention solutions for enterprises, universities, government organizations and ISPs to defend against inbound threats such as spam and viruses, prevent leaks of confidential and private information across all protocols, and encrypt sensitive s. Proofpoint s products are controlled by a single management and policy console and are powered by Proofpoint MLX technology, an advanced machine learning system developed by Proofpoint scientists and engineers. Proofpoint, Inc. EMEA The Oxford Science Park, Magdalen Centre Robert Robinson Avenue Oxford, UK OX4 4GA T +44 (0) F +44 (0) E [email protected] Proofpoint, Inc. APAC 56 Berry Street North Sydney NSW 2060 Australia P F E [email protected] Proofpoint Japan K.K. 906 BUREX Kojimachi Kojimachi 3-5-2, Chiyoda-ku Tokyo, Japan P F E [email protected] Page 8
No More FTP. Eliminate FTP Issues with a Secure File Transfer Appliance. Accellion, Inc. Tel +1 650 485 4300 1804 Embarcadero Road Fax +1 650 485 4308
A N A C C E L L I O N W H I T E P A P E R No More FTP Eliminate FTP Issues with a Secure File Transfer Appliance COMPLI ANT, EASY TO USE, AND EASY TO M ANA GE Accellion, Inc. Tel +1 650 485 4300 1804 Embarcadero
Email Archiving: To SaaS or not to SaaS?
Proofpoint Email Archiving Whitepaper: A look at the pros and cons of Software-as-a- Service and how they apply to email archiving Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408
Closing the Security Gap Extending Microsoft SharePoint, OCS, and Exchange to Support Secure File Transfer
AN ACCELLION WHITE PAPER Closing the Security Gap Extending Microsoft SharePoint, OCS, and Exchange to Support Secure File Transfer SECURITY COMPLIANCE EASE OF USE Accellion, Inc. Tel +1 650 485 4300 1804
White Paper. Securing and Integrating File Transfers Over the Internet
White Paper Securing and Integrating File Transfers Over the Internet While the integrity of data during transfer has always been a concern the desire to use the Internet has highlighted the need to secure
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
SecureSend File Transfer Portal Usage Guide
System Documentation 03/01/2012 SecureSend File Transfer Portal Usage Guide Recommended Usage Instructions and Frequently Asked Questions Jose Ruano, Stephen Weatherly TABLE OF CONTENTS EXECUTIVE SUMMARY...3
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
Axway SecureTransport Ad-hoc File Transfer Service
Axway SecureTransport Ad-hoc File Transfer Service Secure, efficient and reliable Enterprise File Sharing (EFS) In today s fluid, fast-paced, and highly collaborative business environment, people need
Email Security Solutions
TECHNOLOGY REPORT Email Security Solutions 1 TECHNOLOGY REPORT SUPPLEMENT EMAIL SECURITY TECHNOLOGY REPORT IF YOUR EMAIL IS SO CRITICAL, CAN YOU BE SURE IT S REALLY REALLY PRIVATE? FIND THE FULL RESULTS
Why You Should Consider Cloud- Based Email Archiving. A whitepaper by The Radicati Group, Inc.
. The Radicati Group, Inc. 1900 Embarcadero Road, Suite 206 Palo Alto, CA 94303 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com THE RADICATI GROUP, INC. Why You Should Consider Cloud- Based
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
Enterprise Content Sharing: A Data Security Checklist. Whitepaper Enterprise Content Sharing: A Data Security Checklist
Enterprise Content Sharing: A Data Security Checklist Executive Summary Secure file sharing, syncing, and productivity solutions enable mobile workers secure whenever, wherever access to files from any
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
Top 10 Questions to Ask when Choosing a Secure File Transfer Solution
Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Companies that have made an investment in a Secure File Transfer
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
Email Encryption Services
Services ZixCorp provides easy-to-use email encryption services for privacy and regulatory compliance. As the largest email encryption services provider, ZixCorp protects tens of millions of members in
OpenText Managed File Transfer (MFT) is an enterprise
OpenText IX Secure MFT Simplified, accelerated, and managed enterprise file exchange OpenText Managed File Transfer (MFT) is an enterprise solution for managing the exchange of rich digital content inside
Best Practices for Implementing Enterprise Secure File Transfer
A N A C C E L L I O N W H I T E P A P E R Best Practices for Implementing Enterprise Secure File Transfer SECURE, COMPLIANT, E ASY TO USE, AND EASY TO MANAGE Accellion, Inc. Tel +1 650 485 4300 1804 Embarcadero
Email Archiving: To SaaS or not to SaaS?
Proofpoint Email Archiving Whitepaper: A look at the pros and cons of Software-as-a-Service and how they apply to email archiving. threat protection compliance archiving & governance secure communication
eztechdirect Backup Service Features
eztechdirect Backup Service Features Introduction Portable media is quickly becoming an outdated and expensive method for safeguarding important data, so it is essential to secure critical business assets
Mimecast Large File Send
DATASHEET Mimecast Large File Send For sending large files, lets go back to email Mimecast Large File Send simplifies large file sharing for users by removing the complexity and frustration associated
MassTransit vs. FTP Comparison
MassTransit vs. Comparison If you think is an optimal solution for delivering digital files and assets important to the strategic business process, think again. is designed to be a simple utility for remote
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
Egnyte Cloud File Server. White Paper
Egnyte Cloud File Server White Paper Revised July, 2013 Egnyte Cloud File Server Introduction Egnyte Cloud File Server (CFS) is the software as a service layer that powers online file sharing and storage
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
For over 25 years, OpenText Cloud Fax Services has. OpenText Cloud Fax Services. The Market Leader in Cloud Fax Technology
OpenText Cloud Fax Services The Market Leader in Cloud Fax Technology For over 25 years, OpenText Cloud Fax Services has helped many companies go paperless with solutions that integrate with both email
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Email Archiving: Understanding the Reasons, Risks and Rewards Proofpoint ARCHIVE Whitepaper
Email Archiving: Understanding the Reasons, Risks and Rewards Proofpoint ARCHIVE Whitepaper Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 P 408 517 4710 F 408 517 4711 [email protected] www.proofpoint.com
UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
White paper. Why Encrypt? Securing email without compromising communications
White paper Why Encrypt? Securing email without compromising communications Why Encrypt? There s an old saying that a ship is safe in the harbour, but that s not what ships are for. The same can be said
Enterprise Mobility Management: A Data Security Checklist. Whitepaper Enterprise Mobility Management: A Checklist for Securing Content
Enterprise Mobility Management: A Data Security Checklist Executive Summary Secure file sharing, syncing and productivity solutions enable mobile workers to access the files they need from any source at
White Paper Instant Messaging (IM) HIPAA Compliance
White Paper Instant Messaging (IM) HIPAA Compliance - 1 - Statement of Purpose This document is focused on providing health care companies, and all others bound by HIPAA regulations, with an eye opening
Evaluation Guide. eprism Messaging Security Suite. 800-782-3762 www.edgewave.com V8.200
800-782-3762 www.edgewave.com Welcome to EdgeWave Messaging Security! This short guide is intended to help administrators setup and test the EdgeWave Messaging Security Suite for evaluation purposes. A
The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center. SparkWeave is storage agnostic, autonomously providing
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email.
Meet compliance needs with Microsoft Exchange As the volume and importance of digital information grows, regulatory compliance schemas are broadening to encompass an ever-larger share of data that companies
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Top 10 Reasons for Using Disk-based Online Server Backup and Recovery
ADVISORY Top 10 Reasons for Using Disk-based Online Server Backup and Recovery INTRODUCTION Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
activecho Frequently Asked Questions
activecho Frequently Asked Questions What are the benefits of activecho? activecho allows your organization to provide an on-premise, managed and secure alternative to Dropbox and other file synching and
THE SECURITY OF HOSTED EXCHANGE FOR SMBs
THE SECURITY OF HOSTED EXCHANGE FOR SMBs In the interest of security and cost-efficiency, many businesses are turning to hosted Microsoft Exchange for the scalability, ease of use and accessibility available
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
InsightCloud. www.insightcloud.com. Hosted Desktop Service. What is InsightCloud? What is SaaS? What are the benefits of SaaS?
What is InsightCloud? InsightCloud is a web portal enabling Insight customers to purchase and provision a wide range of Cloud services in a straightforward and convenient manner. What is SaaS? Software
Evolved Backup Features Computer Box 220 5th Ave South Clinton, IA 52732 www.thecomputerbox.com 563-243-0016
Evolved Backup Features 1 Contents 3 Introduction 3 Ease-of-Use Simple Installation Automatic Backup Off-Site Storage Scalability File Restoration 24/7 6 Security File Compression Encryption Transmission
White Paper: Managing Security on Mobile Phones
White Paper: Managing Security on Mobile Phones April 2006 Managing Security on Mobile Phones April 2006 Table of Contents Abstract...2 Executive Summary...2 The Importance Of Managing Security On Mobile
GFI Product Manual. GFI MailArchiver Evaluation Guide
GFI Product Manual GFI MailArchiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either
White Paper. 1 800 FASTFILE / www.ironmountain.ca Page 1
White Paper LIVEVAULT Top 10 Reasons for Using Online Server Backup and Recovery Introduction Backup of vital company information is critical to a company s survival, no matter what size the company. Recent
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
GlobalSCAPE Mail Express
Reducing the Costs and Risks of Email Attachments Email is the main collaboration and communications tool in most businesses today. When users want to share files internally or with customers, partners,
Email Compliance in 5 Steps
Email Compliance in 5 Steps Introduction For most businesses, email is a vital communication resource. Used to perform essential business functions, many organizations rely on email to send sensitive confidential
Data Storage That Looks at Business the Way You Do. Up. cloud
Data Storage That Looks at Business the Way You Do. Up. cloud Now integrating enterprise information and business processes is as simple as a click or a swipe. Konica Minolta s FileAssist solution provides
ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment
ISI SOLUTIONS WHITE PAPER ISI Unified Communications Intelligence Tools: Infortel Select and Microsoft Lync : Driving ROI From Your Lync Investment By: Mitchell Weiss Director of Product Strategy ISI Telemanagement
Top 7 Tips for Better Business Continuity
Top 7 Tips for Better Business Continuity With Hosted Fax www.biscom.com [email protected] (+1) 800-477-2472 or (+1) 978-250-1800 Introduction Biscom s Secure File Transfer (Biscom SFT) solution enables
GFI Product Guide. GFI Archiver Evaluation Guide
GFI Product Guide GFI Archiver Evaluation Guide The information and content in this document is provided for informational purposes only and is provided "as is" with no warranty of any kind, either express
Moving to the Cloud: What Every CIO Should Know
Moving to the Cloud: What Every CIO Should Know CONTACT SALES US: 1.877.734.6983 UK: +44 (0)845.528.0588 www.egnyte.com WHITEPAPER Overview Enterprise data storage needs are growing exponentially, doubling
Understanding and Selecting the Right Secure File Transfer Solution for your Organization
Secure File Transfer Understanding and Selecting the Right Secure File Transfer Solution for your Organization w w w. b i s c o m. c o m 321 Billerica Road, Chelmsford, MA phone: 978-250-1800 email: [email protected]
Dispatch: A Unique Email Security Solution
Dispatch: A Unique Email Security Solution 720 836 1222 sales / support [email protected] email www.absio.com web 8740 Lucent Boulevard, Ste 101 Highlands Ranch, CO, 80129 1 110-WP005-1 Organizations use
Online Backup Solution Features
CCC Technologies, Inc. 700 Nicholas Blvd., Suite 300 Elk Grove Village, IL 60007 877.282.9227 www.ccctechnologies.com Online Backup Solution Features Introduction Computers are the default storage medium
Why cloud backup? Top 10 reasons
Why cloud backup? Top 10 reasons HP Autonomy solutions Table of contents 3 Achieve disaster recovery with secure offsite cloud backup 4 Free yourself from manual and complex tape backup tasks 4 Get predictable
Secured email Enterprise eprivacy Suite
EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT Secured email Enterprise eprivacy Suite JANUARY 2007 www.westcoastlabs.org 2 EMAIL SECURITY SOLUTIONS TECHNOLOGY REPORT CONTENTS Secured email Enterprise eprivacy
GFI White Paper: GFI FaxMaker and HIPAA compliance
GFI White Paper: GFI FaxMaker and HIPAA compliance This document outlines the requirements of HIPAA in terms of faxing protected health information and how GFI Software s GFI FaxMaker, an easy-to-use fax
When Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
Security Considerations
Concord Fax Security Considerations For over 15 years, Concord s enterprise fax solutions have helped many banks, healthcare professionals, pharmaceutical companies, and legal professionals securely deliver
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features
The SparkWeave Private Cloud & Secure Collaboration Suite The SparkWeave Private Cloud is a virtual platform hosted in the customer s data center, completely independent from the physical storage hardware,
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Service Schedule for Business Email Lite powered by Microsoft Office 365
Service Schedule for Business Email Lite powered by Microsoft Office 365 1. SERVICE DESCRIPTION Service Overview 1.1 The Service is a hosted messaging service that delivers the capabilities of Microsoft
email management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
Death to PST Files. The Hidden Costs of Email
WHITE PAPER: EMAIL MANAGEMENT........................................ Death to PST Files Who should read this paper IT professionals looking for an easy storage, search and retrieval system for email that
Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act
White Paper Internet File Management & HIPAA A Practical Approach towards Responding to the Privacy Regulation of the Act The recent activation of the privacy requirement of the Health Insurance Portability
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
V1.4. Spambrella Email Continuity SaaS. August 2
V1.4 August 2 Spambrella Email Continuity SaaS Easy to implement, manage and use, Message Continuity is a scalable, reliable and secure service with no set-up fees. Built on a highly reliable and scalable
How To Use Egnyte
INTRODUCING ON DEMAND FILE SERVER FROM BT WHOLESALE APPLICATION STORE WHAT IS ON DEMAND FILE SERVER? The three most common technology challenges facing every small business are data storage, information
Service Schedule for BT Business Lite Web Hosting and Business Email Lite powered by Microsoft Office 365
1. SERVICE DESCRIPTION 1.1 The Service enables the Customer to: set up a web site(s); create a sub-domain name associated with the web site; create email addresses. 1.2 The email element of the Service
Hosted SharePoint. OneDrive for Business. OneDrive for Business with Hosted SharePoint. Secure UK Cloud Document Management from Your Office Anywhere
OneDrive for Business with Hosted SharePoint Secure UK Cloud Document Management from Your Office Anywhere Cloud Storage is commonplace but for businesses that want secure UK Cloud based document and records
Compliance in the Corporate World
Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue
Veritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
4 Critical Risks Facing Microsoft Office 365 Implementation
4 Critical Risks Facing Microsoft Office 365 Implementation So, your organization has chosen to move to Office 365. Good choice. But how do you implement it AND deal with the following issues: Keep email
BUILT FOR YOU. Contents. Cloudmore Exchange
BUILT FOR YOU Introduction is designed so it is as cost effective as possible for you to configure, provision and manage to a specification to suit your organisation. With a proven history of delivering
PineApp TM Mail Encryption Solution TM
PineApp TM Mail Encryption Solution TM How to keep your outgoing messages fully secured. October 2008 Modern day challenges in E-Mail Security Throughout the years, E-Mail has evolved significantly, emerging
The GlobalCerts TM SecureMail Gateway TM
Glob@lCerts PRODUCT OVERVIEW: The GlobalCerts TM SecureMail Gateway TM Automatic encryption and decryption is unique to the SecureMail Gateway. The GlobalCerts SecureMail Gateway is based on a network
Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information
Store, Manage, and Discover Critical Business Information Trusted and Proven Email Archiving Symantec Enterprise Vault, the industry leader in email and content archiving, enables companies to store, manage,
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST
EMAIL MANAGEMENT SOLUTIONS SAFEGUARD BUSINESS CONTINUITY AND PRODUCTIVITY WITH MIMECAST Enabling user efficiency with a cloud-based email platform With productivity, revenues and reputation at stake, an
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion
Strengthen Microsoft Office 365 with Sophos Cloud and Reflexion Many organizations are embracing cloud technology and moving from complex, rigid on-premise infrastructure and software to the simplicity
itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your business onwards and upwards into the future.
Web Filtering Email Filtering Mail Archiving Cloud Backup Disaster Recovery Virtual Machines Private Cloud itg CloudBase is a suite of fully managed Hybrid & Private Cloud Services ready to support your
