MOVEit. Secure Managed File Transfer. April 19, 2016



Similar documents
Using a Managed File Transfer technology to prepare your customers for the GDPR (whatever is next)

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Security Throughout the File Transfer Life-Cycle:

MOVEIT: SECURE, GUARANTEED FILE DELIVERY BY JONATHAN LAMPE, GCIA, GSNA

Axway SecureTransport Ad-hoc File Transfer Service

FTP-Stream Data Sheet

The Definitive Guide to Managed File Transfer:

WhiteWave's Integrated Managed File Transfer (MFT)

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Discover how and why file transfer is changing

BANKING SECURITY and COMPLIANCE

Managed File Transfer and the PCI Data Security Standards

DMZ Gateways: Secret Weapons for Data Security

How Managed File Transfer Addresses HIPAA Requirements for ephi

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

Security Overview Enterprise-Class Secure Mobile File Sharing

Managed File Transfer and the PCI Data Security Standard

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Fileweave. Large File Transfer. Seamless Microsoft Outlook add-in. Simple drag and drop functionality

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

PCI Compliance for Cloud Applications

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

MassTransit vs. FTP Comparison

NEC Managed Security Services

How To Manage Sensitive Information Management With Cyberark Software

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description

Axway SecureTransport

FileCloud Security FAQ

<Insert Picture Here> Oracle Database Security Overview

PowerBroker for Windows

OpenText Managed File Transfer (MFT) is an enterprise

Compliance in 5 Steps

nubridges Protect TM

How To Manage A Privileged Account Management

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

PowerBroker for Windows Desktop and Server Use Cases February 2014

Features of AnyShare

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

IT Peace of Mind. Powered by: Secure Backup and Collaboration for Enterprises

MOVEIT CENTRAL: MANAGED FILE TRANSFER WORKFLOW ENGINE

McAfee Database Security. Dan Sarel, VP Database Security Products

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

AN IN-DEPTH VIEW. Cleo Cleo Harmony - An In-Depth View

The SparkWeave Private Cloud & Secure Collaboration Suite. Core Features

N02-IBM Managed File Transfer Technical Mastery Test v1

Top Ten Technology Risks Facing Colleges and Universities

Achieving PCI Compliance Using F5 Products

Security Solutions

Axway SecureTransport

Egnyte Cloud File Server. White Paper

BMC Control-M Workload Automation

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Mimecast Large File Send

CA XCOM Data Transport- Secure, Reliable File Transfer for Heterogeneous Environments

<Insert Picture Here> Oracle Database Vault

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Secure Data Transmission Solutions for the Management and Control of Big Data

Document control for sensitive company information and large complex projects.

Information Security Services

Netwrix Auditor for Exchange

Continental Automotive Drives its Business Efficiency with Ipswitch MOVEit Solutions

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Two Approaches to PCI-DSS Compliance

Achieving PCI Compliance for: Privileged Password Management & Remote Vendor Access

Securing the Cloud through Comprehensive Identity Management Solution

Problem. Solution. Quatrix is professional, secure and easy to use file sharing.

Enterprise Security Critical Standards Summary

White paper. Why Encrypt? Securing without compromising communications

AN IN-DEPTH VIEW. Cleo Cleo Secure File Sharing An In-Depth View

Privilege Gone Wild: The State of Privileged Account Management in 2015

MOVEIT: SECURE BY DESIGN BY JONATHAN LAMPE, GCIA, GSNA

GXS RollStream Automating Supplier Information Management & Registration featuring:

Secure and control how your business shares files using Hightail

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

INCIDENT RESPONSE CHECKLIST

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Netwrix Auditor for SQL Server

Jitterbit Technical Overview : Microsoft Dynamics AX

OpenStack Private Cloud Hosting in an Tier 3 Data Centre. G-Cloud Lot 1 IaaS

owncloud Architecture Overview

Safeguard Protected Health Information With Citrix ShareFile

Media Shuttle. Secure, Subscription-based File Sharing Software for Any Size Enterprise or Workgroup. Powerfully Simple File Movement

CTERA Enterprise File Services Platform Architecture for HP Helion Content Depot

What We Do: Simplify Enterprise Mobility

Transcription:

MOVEit Secure Managed File Transfer April 19, 2016

Moving Files is Business-critical Legal Documents Loan Information XML Data Files X-Rays Purchase Orders Patient Records Insurance Claims Account Statements Test Results Customer Information Large Video Files Credit Card Payments

Different Industries Have Different File Transfer Needs Healthcare Transfer Files: patient records and claims information To / From: billing department and insurance companies, health plan providers and payer organizations In Compliance with: HIPAA Government Transfer Files:citizen health records, employee information, records, and contracts To / From: local, state and federal agencies and departments, citizens, insurance companies, banks, and businesses In Compliance with: privacy law/regulation Financial Services Transfer Files:batch creditcardtransactions, lock-box movement reports, ACH transactions, or check images To / From: data centers, branch locations, merchants, other banks, and payment processors: ACH/EFT/epayment vendors In Compliance with: PCI-DSS and privacy laws / regulations All Industries Transfer Files: batch transaction data, large image files, videos, or other structured and unstructured data To / From: datacenters, remote locations, vendors, customers, brokers, government agencies, banks, or cloud based services and storage In Compliance with: privacy laws / regulations

File Contain Sensitive Data Sensitive data needs to be secured and managed Personal Identification Information (PII) Name, SSN, payroll, tax records Financial data Credit Card #s, Credit applications Business data Intellectual property, POs and invoices, financial records Medical Patient records, Insurance records

Regulatory Compliance SOX, PCI, GDPR Security mandates for the protection of sensitive data assets Defines how IT secure and manage files Subject to internal and external audits for proof of compliance Can be disruptive to IT operations Failure to comply can be costly

Regulatory Compliance SOX (Sarbanes-Oxley) PCI DSS (PaymentCard Industry Data Security Standard) GDPR (European Union's) General Data Protection Regulation Ensuring the integrity of corporate financial data Pur essendo una legge americana, molti siti italiani di multinazionali quotate in borsa negli USA, sono interessati dall'applicazione SOX. Protecting creditcard and PII information Obligation to protect personal data across the borderless enterprise Protecting Personally Identifiable Information (PII) Support for secure transfer protocols, end-to-end encryption, guaranteed delivery and non-repudiation, Automated file management policies Managing PII Automated file exchange, policy based file access and data loss protection (DLP) Managing System Exposure High availability and disaster recovery, Monitoring and reporting for auditing and forensics Significant fines Delayed release of financial results Loss of reputation Significantbank fines, Increased transaction fees Legal action and remediation costs Loss of reputation Legal action and Penalties Remediation costs Loss of reputation

How Organizations Use File Transfer Move large files For instance moving diagnostic images for healthcare applications Communicate between systems as part of a business process For example a customer and vendor automatically sharing files, as part of their purchasing process. Collaboration between users/devices Project Management, Customer Service/Technical Support, etc. Internal and external communications (borderless enterprise) from secure drop-off and pick-up locations

Files Move Across the Borderless Enterprise between Systems and People System-to-Person System-to-System Financial: transaction records between internal finance system on a mainframe and systems at corporate bank Healthcare: patient record updates between patient management system at a doctors practice and the hospital Financial: Banking systems automatically generate transaction statements and make them available for user download Sales: Auto-generate management reports and securely transfer them to execs, who access them via mobile devices Person-to-Person Sales: Securely transfer bids, proposals, and POs Healthcare: Hospital admin forwards patient records to insurance company Project Management, Customer Service/Technical Support, etc. Person-to-System Insurance: insurance enables small businesses to upload photos, claims via the web UI then automate directly to back-end systems Retail: Retailer enables distributor and manufacturer to upload product data & prices lists and automate upload to ecommerce systems.

File Transfer Today File size limitations Increased security concerns Need for regulatory compliance Increased user expectations for ease-of-use Increased demand for integration between business partners Email Attachments Cloud File Share FTP Servers Home Grown Scripts

Challenges With File Transfer Process too manual, requires too much setup Homegrown tools and scripts Products from too many vendors Partners dictate methodology, no unified standard Flying Blind Don t know where files are at all times No ability to prove files get delivered All the accountability / none of the relevance Employees bypassing IT systems No centralized file transfer system Subject organization to added security risks Little insight into files, events, and people Blind to issues when they occur Can t scale to meet growing demand Not responsive to business needs No way to automate

I already have a File Transfer System. Why change? Improve Security End-to-end encryption Integrate to IT security infrastructure Push/pull files without any direct external access to trusted network Data back-up with no data loss Improve IT Responsiveness Quickly automate file-based tasks without programming required Empower end-users to on-board partners and get file status 24/7 file transfer operations Reduce Costs Monitor all file transfer activity and track performance in one place Automate report creation and distribution for cost effective SLA and regulatory compliance Flexible scale to meet growing demand without configuring new systems

Impact of Digital DoDo-itit-yourself File Transfer Cost of lost data is high. The cost to maintain existing systems is high. Cost of non-compliance with regulations is high. >$125,000 additional cost every year* Cost of traditional FTP systems vs a managed file transfer solution: Assuming 10,000 files transferred per year organization-wide 4% 5% of all transfers contain errors 4 5 hours per incident to troubleshoot/fix $55 / hr cost for IT admin (salary and overhead) * Aberdeen report, 2013

MOVEitElevator Elevator Pitch MOVEitis an automated file transfer solution that lets you manage, view, secure and control all activity through a single system. You will always know where your files are with predictable, secure delivery and extensive reporting. MOVEit enables IT to: Transfer business files reliably and securely Automate file-based tasks and business workflows Gain visibility and control over file transfer activities Security and regulatory compliance

Visibility: Automate report creation and distribution for SLA and regulatory compliance Responsive: Automate file-based tasks without programming Secure: Integrate with existing IT security infrastructure Protect: End-to-end encryption & guaranteed delivery Reduce IT cost: Monitor all file transfer activity and track performance in one place 24/7 operations: Zero downtime, no data loss for local failover or remote disaster recovery Compliance: 3rd party audited HIPAA, PCI-DSS, GLBA & FFEIC

MOVEit Managed File Transfer Components Secure Server for Moving Files Easy and Reliable File-based Automation Flexible Reporting and Monitoring for MOVEit MFT ADD-ON MODULES Ad Hoc Transfer: Employees and partners can send sensitive files Mobile: Productivity for your Mobile Workforce Ipswitch Failover: Provides automated failover to servers at local and remote disaster recovery site. High Availability/Webfarm: Provides scalability for performance and high availability API: Provides programmatic access to core file transfer services.

MOVEit Managed File Transfer Partner integration: secure external access or automated push FTPS, SFTP, HTTPS, AS1/AS2/AS3 OPEN PGP, ZIP OR OTHER PROCESS HTTPS FTPS, SFTP, HTTPS FTPS, SFTP, HTTPS, AS1/AS2/AS3 FTPS, SFTP, HTTP/S

Why Our Customers Chose MOVEit Single, secure system for business critical file transfer Security Visibility Automation File Transfer User Adoption Availability Scalability

MOVEitSecures File Transfer Security in Transport and at Rest At rest -AES 256 encryption In transport -HTTPS, FTPS and SFTP via SSH and TLS/SSL OpenPGP encryptions FIPS 140-2 -------------------------------------------------------------------------------------------------------------------------------------------------- Secure Software Development Intrusion detection Penetration testing OWASP Open Web Application Security Project best practices Sensitive Files Event notification and Tamper Evident DB Guaranteed Delivery File integrity checking, SHA-1 (Secure Hash Algorithm) to validate that a file has not been altered in any way. Non-repudiation Transfer retry/resume Content Scanning Data Loss Prevention (RSA, Symantec, McAfee). Submits files to scan for data breaches and loss Anti-virus (Symantec, Sophos and McAfee) Transferred files can be allowed, blocked or quarantined

Robust Log Files and Extensive Reporting

Event Notification & Tamper Evident DB Partner Network Internal Network Robust Logging Tamper Evident DB PARTNER BUSINESS SYSTEMS Partner Systems Vendor EDI Customer Systems Banking Systems EXISTING INFRASTRUCTURE Secure FT Servers Secure FT Clients Email Web Portal CUSTOM INPUT/OUTPUT OTHER INFRASTRUCTURE EXISTING INFRASTRUCTURE ETL Systems Network Share Secure FT Servers Secure FT Clients Database DLP, AV, IdP, Directory Services, Job Scheduler Mainfra me Apps Custo m Apps HR Financial ERP INTERNAL BUSINESS SYSTEMS Extensive Reporting Event Notification

MOVEitCentral Automates File Transfer Workflow Engine: simple user interface for automating file transfer tasks Custom file processing for example unzipping a file before transferring it to a backend application No Scripting required Built in scheduler Alerting, logging and auditing

MOVEitEnables Enables User Adoption Desktop clients, including web browser and MS Outlook add-on MOVEitAd Hoc -Simple person-to-person file transfer MOVEitMobile -Access for IOS and Android phones and tablets

MOVEitEnables Enables User Adoption Extend IT visibility and control over file transfers User and group provisioning, access and permissions Delegated administration Set user quotas (Number of files, storage space) Expiration rules for files and folders on a server Policy management Authentication (LDAP, Active Directory, ODBC and Radius) Password policies Rules for IP and user lockout, and blacklisting/whitelisting

Person to Person Ad-Hoc for MOVEit Read message and download attachment Optional receipt Send email notification with link to message and attachment Receive notification with link to message and attachment Upload message and attachment 24

MOVEitDelivers Availability and Scalability MOVEit High Availability Load Balancer Server Farms for increasing MOVEit capacity and availability Load Balancing across multiple MOVEit nodes MOVEit DMZ MOVEit DMZ MOVEit DMZ

MOVEit OVEitIs a Critical Application Enables Business Growth Mitigates Liability and Risk Reduces Cost Enhancing operational efficiency and user productivity, consolidating ad hoc, B2B and A2A FT systems into a single platform, simplifying FT for users and partners, management and support for IT. Provides IT with greater visibility and control over the security of their sensitive files. Simplifies the implementation security technologies and enforcement of security policies. cuts IT time and effort, frees them to work on high priority projects, reduces licensing and support costs, delivers an attractive ROI and fast time-to-value

WAN/External DMZ LAN/Internal Email Nice WEB UI, easy to use, no file size limitations, delegated Administration (privileges to group Admins, for example PMs)

WAN/External DMZ LAN/Internal ProjectX Easily carry out complex FTs inside and outside our network

Demo MOVEit FT/DMZ Branding, Create Users (LDAP, SSO), Protocol policies, IP Ranges Groups Ease permission management for folder structure, Add users to group Folders Permissions, folder access, group permission for folders File upload Ad-hoc Logs Reports CENTRAL Workflows

VMNet1 Host only hmail 192.168.40.31 MOVEit 8.3 domain hazzard.com POP 192.168.40.30 FileZilla User bosshogg Folder TransferredFiles WS_FTP Pro 12.5.1 Accounts Thunderbird MOVEit Folders: HazzardFolder Mail attachments drop off Shared Folder: HazzardProject\MOVEit 192.168.40.32 Central 9 hmail domain paolodomain.com - SMTP Accounts Thunderbird Synchronize "HazzardFolder" MOVEit Folder -> Shared Network Folder "HazzardProject\moveit" Take Email Attachment of paolo@hazzard.com -> Tamper Check -> save them to MOVEit Folder "Mail attachment drop off" Take TransferredFiles from Filezilla Server -> Zip Them -> Send the zip as Email Attachment to paolo@paolodomain.com