Secure Managed File Transfer: Bringing Coherence & Control to Compliance



Similar documents
Beyond SFTP: Five Ways Secure Managed File Transfer Can Improve Your Business

SEEBURGER Solutions for Financial Services & Insurance Companies

SEEBURGER Managed File Transfer for SAP

SEEBURGER Secure Link (SEE LINK)

Beyond SFTP: 5 Ways Secure Managed File Transfer Can Improve Your Business

ONE Platform for B2B Integration and Managed File Transfer

Integrated solutions for the engineering data exchange via Managed File Transfer and OFTP2

Integrated solutions for the engineering data exchange via Managed File Transfer and OFTP2

Partner Program. SEEBURGER Partner Program Guide.

The TCO of FTP Hidden costs of free file sharing

PLM-Consulting Services for Aras PLM-Software

PLM-Consulting Services for Aras PLM-Software

BANKING SECURITY and COMPLIANCE

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

Axway SecureTransport Ad-hoc File Transfer Service

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

FTP-Stream Data Sheet

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

IT Security & Compliance. On Time. On Budget. On Demand.

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

An Introduction to RSA envision The Information Log Management Platform for Security and Compliance Success. September, 2009

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

DMZ Gateways: Secret Weapons for Data Security

Securing SharePoint 101. Rob Rachwald Imperva

Secure Data Transmission Solutions for the Management and Control of Big Data

Best Practices for PCI DSS V3.0 Network Security Compliance

Websense Data Security Solutions

Making Database Security an IT Security Priority

How to Secure Your SharePoint Deployment

Feature. Log Management: A Pragmatic Approach to PCI DSS

How Managed File Transfer Addresses HIPAA Requirements for ephi

Security Controls What Works. Southside Virginia Community College: Security Awareness

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Using a Managed File Transfer technology to prepare your customers for the GDPR (whatever is next)

How To Manage A Privileged Account Management

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Streamline Enterprise Records Management. Laserfiche Records Management Edition

A Buyer's Guide to Data Loss Protection Solutions

Boosting enterprise security with integrated log management

Compliance and Industry Regulations

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Avoiding the Top 5 Vulnerability Management Mistakes

Compliance and Security Solutions

The Impact of HIPAA and HITECH

Seven Things To Consider When Evaluating Privileged Account Security Solutions

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

PCI DSS 3.0 Compliance

Secret Server Qualys Integration Guide

How To Manage Security On A Networked Computer System

Compliance Management, made easy

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

How To Achieve Pca Compliance With Redhat Enterprise Linux

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Moving to the Cloud: What Every CIO Should Know

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

White paper. Why Encrypt? Securing without compromising communications

Document control for sensitive company information and large complex projects.

Security Solutions

NEC Managed Security Services

PortWise Access Management Suite

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

MassTransit vs. FTP Comparison

PCI Requirements Coverage Summary Table

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

WhiteWave's Integrated Managed File Transfer (MFT)

Payment Card Industry Data Security Standard

Security in Fax: Minimizing Breaches and Compliance Risks

When Data Loss Prevention Is Not Enough:

PortWise Access Management Suite

User Driven Security. 5 Critical Reasons Why It's Needed for DLP. TITUS White Paper

Provide access control with innovative solutions from IBM.

Encryption Services

SecureAge SecureDs Data Breach Prevention Solution

nubridges Protect TM

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Axway SecureTransport

Transcription:

Whitepaper SEEBURGER Managed File Transfer Secure Managed File Transfer: Bringing Coherence & Control to Compliance www.seeburger.com

Content 1 Executive Overview... 3 2 Increasing Compliance Complexity, More Risk... 4 3 A Big Burden - and a Dangerous Gap... 5 4 Overcoming Spaghetti Communications... 6 5 The Solution: Managed File Transfer... 8 6 SEEBURGER MFT: Fine-Grained, Coherent Control...10 7 Continuous, Cost-Effective Control of Your Content.. 12 8 How Secure MFT Protects Your Business...13 9 Closing the Compliance Gap...14 10 Appendix...15 SEEBURGER Managed File Transfer White Paper 2

Executive Overview Pick up The Wall Street Journal or your industry trade publication, visit an Internet news site, or listen to the chatter around the water cooler. Sooner or later you ll hear about an incident where a company s customer information or other private data was intentionally or accidentally exposed in public. Behind the headlines, there are many other costly and embarrassing breaches, including violations of government regulations and privacy laws, customer and industry mandates, and internal policies to protect sensitive financial, customer and employee information. For most companies, it s a daily struggle to prevent breaches. Intensifying the struggle: the proliferation of file transfers that take place daily between people and systems completely under the radar of any centralized governance. It s estimated that more than 80% of corporate data is unstructured data, which resides not in databases but in files. Many of these files are traversing your business and going outside it with little or no security and no centralized governance, resulting in compliance chaos. A recent poll of business and IT executives revealed that adherence to data security policies and mandates for compliance or governance is their most important objective, but most (60%) said that their data security policies are lacking. Traditional methods of managing file transfers can t prevent or protect you from compliance violations: they re insecure, inefficient, and non-auditable. This situation leaves a serious gap in compliance strategies. Managed File Transfer can close this gap. SEEBURGER Managed File Transfer White Paper 3

Increasing Compliance Complexity, More Risk High-profile security breaches are all over the headlines. Fortunately, they aren t happening to every company. But the threat is ever-present, as attackers get craftier at their work and as corporate data regularly travels inside and outside company firewalls. Targets for the top 10 breaches of 2011 ranged from a top database marketing services provider (60 million email addresses hacked) to a radiology practice in New Hampshire (more than 230,000 patient records compromised.) 1 The fallout from breaches? Even if an event doesn t make the headlines, it can result in loss of customer or partner trust, high remediation costs, reputation damage, service disruptions, and even fines in some cases. And it doesn t take a highly publicized breach or disclosure to cause a lot of pain. Businesses can be fined and in some cases their senior executives held personally responsible for violating financial-regulation laws such as Section 404 of the Sarbanes-Oxley Act of 2002 (SOX), the Gramm- Leach-Bliley Act (GLBA), or Basel II. Aside from fines or sanctions, simply responding to an unplanned audit to demonstrate compliance can tie up your IT department and your executives for weeks. Compliance has become complex and even chaotic for most businesses. Today, businesses must comply with a web of compliance requirements for their data processing. (See Figure 1.) EU Directive 95/46/EC Global PCI/DSS US - Gramm- Leach-Bliley Act US - HIPAA German BDSG - regulation on personal data Massachusetts Encryption Mandate US - WEEE (Waste Electrical & Electronic Equipment) UK Coroners and Justice Bill California Security Breach Notification Act US - RoHS (Restriction of use of Hazardous material) US-Sarbanes-Oxley Act, Section 404 US-21 CFR Part 11 US Securities and Exchange (SEC) Act Rules 17a-34 (17 CFR 240, 17a-3,4) US - Consumer Product Safety Improvement Act US Department of Defense (DOD) 5015.2 Figure 1: A Sampling of the Many Regulations and Requirements 1 eweek, IT Security & Network Security News & Reviews: 10 Biggest Data Breaches of 2011 So Far, May 25, 2011 SEEBURGER Managed File Transfer White Paper 4

A Big Burden and a Dangerous Gap This situation creates huge burdens on businesses, large and small. You need to be able to demonstrate that your data processing meets: Government regulations and privacy laws Industry policies and mandates Trading partner and customer security and privacy requirements Internal security, financial and human resources policies consequences for not meeting them can be harsh. In an 2011 SAPInsider webinar poll on compliance and data security 2, more than 60% of respondents cited adherence to data security policies and mandates for compliance or governance as their most important objective. Meanwhile, only 40% reported that their data security policies were defined and strictly enforced, with the rest ranging from having no policies for unstructured file transfers to having inconsistently enforced policies. (See Charts 1 and 2.) Many regulations have strict deadlines and exacting requirements for compliance and the Which of the following objectives is most relevant for your organization? Which of the following best describes your company policies regarding data security? Controlling the amount of data taxing e-mail servers Compliance with new trading partner security requirements (i.e. banking) Reduction of disparate FTP processes I am unaware of policies regarding the transfer of unstructured files Policies vary from department to department and application to application General guidelines exist but are loosely enforced Adherence to data security policies/mandates for governance or compliance 0% 10% 20% 30% 40% 50% 60% 70% Policies are clearly defined and strictly enforced 0% 10% 20% 30% 40% 50% Chart 1: Adherence to Data Security Policies/ Mandates for Governance or Compliance is a Priority for Most Companies Chart 2: Data Security Policy Enforcement is All Over the Map 2 SAPInsider Webinar, Closing the Compliance Gap in File Exchange, November 2, 2011 SEEBURGER Managed File Transfer White Paper 5

Overcoming Spaghetti Communications For CEOs and the CIOs and their organizations who are accountable to them being compliant today requires an almost-impossible feat: always knowing who sent what regulated or sensitive data to whom, when and how and being able to prove this, unequivocally, to regulators and auditors. In today s interconnected enterprises and supply chains, the who and whom can mean not only employees but also trading partners and customers. Most companies have processes in place for example, in their ERP or B2B integration systems for governing structured data exchanged between systems. But this isn t enough. It s estimated that more than 80% of all company information is unstructured data: files such as spreadsheets, word processing documents, PowerPoint presentations, computer-aided designs, and multimedia (high-resolution graphics, audio and video). These files are flying across your enterprise and your supply chain daily between people and systems often via unsecured methods like FTP servers, Internet drop box services, or email attachments. In the SAPInsider webinar poll 3, respondents reported using a range of methods for exchanging files between people most of them insecure and inefficient. (See Chart 3.) At your company, what is the most commonly used method for moving large files from one system or individual to another? USB thumb drive device Individual FTP processes Managed File Transfer solution Shared Folders on an internal network E-mail 0% 5% 10% 15% 20% 25% 30% 35% 40% Chart 3: Most Current File Exchange Methods are Insecure and Inefficient 3 SAPInsider Webinar, Closing the Compliance Gap in File Exchange, November 2, 2011 SEEBURGER Managed File Transfer White Paper 6

Current Methods Are Insecure and Inefficient Spaghetti communications like these complicate and intensify the compliance challenge. Without some kind of central oversight or governance of file transfers, your company is too open to breaches and compliance violations intentional or accidental. Many data breaches are committed by insiders (employees) or involve partners usually due to misuse of privileges. According to the 2010 Data Breach Investigations Report 4, 48% percent of crimes were caused by insiders and another 11% involved business partners; almost 50% of breaches occurred because of privilege misuse. It s all too easy for a simple file-sharing problem to become a data leakage or compliance problem. To reduce compliance complexity and avoid its consequences, businesses need to bring more coherence and control to file transfers. But most businesses lack the visibility, management, auditing and reporting to do so. There s no efficient centralized way to manage compliance and its overall risk. Unfortunately, traditional file-sharing methods are ill-equipped to solve this problem. These methods include: Homegrown solutions, including scripted programs, unmanaged FTP servers, unsecured e-mail attachments, and Internet services like Dropbox and YouSendIt. These solutions are insecure, lack centralized governance, and can t scale. Point-to-point applications, standalone content management systems, and standalone collaboration suites. These solutions can get data from Point A to Point B securely and efficiently, but they can t protect data across multi-point business processes making the solutions inefficient and ultimately insecure. Traditional ERP or B2B/EAI platforms, which are not built for handling unstructured data. They may actually contribute to compliance complexity in some businesses by requiring them to maintain one or more systems for governing their structured-data transfers and one or more systems for governing their unstructured-data transfers. In the Forrester Research Global EDI/B2B Survey of 300 IT Managers, 74% cited new requirements for compliance and risk management as a key business concern for B2B 5 and 63% cited the increased complexity of external interactions. 4 *2010 Data Breach Investigations Report (study conducted by the Verizon RISK Team in cooperation with the United States Secret Service) 5 Forrester Research, Market Overview: Managed File Transfer Solutions, July 8, 2011 SEEBURGER Managed File Transfer White Paper 7

The Solution: Managed File Transfer Managed File Transfer (MFT) reduces compliance complexity and improves your control of compliance. capability was number one on their list of planned improvements for B2B. MFT is a business process that automates and secures the end-to-end management of unstructured data transfers from provisioning through transmission, ensuring guaranteed delivery across your business and between trading partners. Aberdeen Group calls today s file transfer solutions the modern plumbing of the Internet 6. When asked by Forrester Research about planned improvements for Global EDI/B2B, 81% of managers said that enhancing their Managed File Transfer Managed File Transfer uses technology to consolidate the management of data transfers in a single, centralized system with automated visibility, management, auditing and reporting. It replaces insecure spaghetti communications with a single point of control for all file transfers (system-tosystem, system-to-human, and human-to-human) and all types of data (structured and unstructured). (See Figure 2.) Figure 2: An Ideal MFT Solution Covers All Kinds of Transfers and Data in a Single Managed Platform 6 Aberdeen Research, Secure Managed File Transfer: Why You Should be Looking More Closely Right Now, August 2011 SEEBURGER Managed File Transfer White Paper 8

An ideal MFT solution will dramatically strengthen and simplify compliance. It will prevent your company from falling into non-compliance because you can automatically apply the proper checks and policies to your file transfers. So people and systems can t send any data that they aren t authorized to send. An ideal MFT solution will integrate with your business policies and your Data Loss Prevention (DLP) engine to automatically apply the correct checks and policies. This integration eliminates the need for your IT staff to stay up to date on the nuances of the laws and how they apply to your data, or to waste their time manually implementing policies or updating them. An effective MFT platform will provide: Security: MFT protects the integrity of file transfers by applying techniques such as secured and encrypted transmission, continuous content filtering, pre-and-post transfer content validation checks, checkpoint restarts, and policy-based management. Visibility: MFT provides end-to-end, real-time insight into the status of each transfer, via automated monitoring, logging, tracking and auditing so everyone responsible (including senders) always knows the status of the transmission. Reporting: MFT generates customizable reports of file-transfer activity, for documenting transfers at any stage. This improves accountability and can prevent errors or oversights from turning into compliance problems. Auditing: MFT creates detailed audit trails of file transfers, so you can easily prove compliance to yourself or to auditors without taking the business offline. Workflow: MFT integrates with your business processes no matter how complex and creates automated compliance workflows that apply the right compliance checks and policies to the right data at the right time. Provisioning: MFT equips remote endpoints for secure transfers and provides secure selfservice options for employees and partners, so you can extend compliance easily across your business and your supply chain. Automated provisioning reduces the delays, inefficiencies and human error often involved with traditional file transfer solutions. (For example: with FTP servers, IT technicians typically must manually provision secure FTP sites for each transmission, then de-provision them.) In assembling your technology platform for secure MFT, you should look for the above capabilities at a minimum. SEEBURGER Managed File Transfer White Paper 9

SEEBURGER MFT: Fine-Grained, Coherent Control SEEBURGER offers the most advanced MFT solution available today. SEEBURGER MFT (SEE MFT) is the first single, comprehensive solution suite for exchanging large/sensitive files with full security, visibility, governance and regulatory compliance. SEE MFT provides fine-grained coherence and control over file transfers, so you can protect your business, your business relationships and your reputation not have to force-fit your compliance needs to the capabilities of the technology solution. SEEBURGER s award-winning MFT solutions are based on the SEEBURGER Business Integration Server (BIS), the leading and most cost-effective platform for B2B integration. BIS is built on a robust business process engine that orchestrates complex, inter-enterprise processes quickly, reliably and at scale. Trademarked peer-to-peer technology provides high MFT performance at low cost, because the whole file-transfer payload does not have to go through the SEE MFT server. So you can add secure MFT into your IT infrastructure with little technical and administrative overhead. SEE MFT automatically handles end-to-end orchestration of data transfers with full governance, policy management, and data loss prevention. It provides Managed Integration automated managed file transfers between systems, applications and endpoints and Managed Collaboration, managed file transfers between people and systems, including email transfers, ad hoc transfers, and human-initiated transfers to systems. SEE MFT: Encrypts and authenticates ad hoc and scheduled file transfers to ensure end-to-end data security and non-repudiation Guarantees file delivery by providing automatic checkpoint and restart (should network connections disrupt file transfer) and by automatically notifying you of any transmission failures Automatically applies corporate governance and regulatory policies based on business rules and routing policies that you specify Provides a complete audit trail of all data exchange activity, including message transaction transmissions and the people involved in each step SEEBURGER Managed File Transfer White Paper 10

SEEBURGER s MFT solutions use BIS s business process engine to build compliance into your business processes at the workflow level. You can protect your processes no matter how many steps, places and people they involve. You can secure, protect and document file transfers to the farthest edge of the enterprise including endpoints that you don t own or control. For example: You can automatically integrate manual steps into your automated compliance workflows. You can create an automated workflow that escalates an exception to an IT manager for handling or that sends a document to your CFO for authorization and sign-off before resuming the automated process. This kind of fine-grained control is impossible with other MFT solutions because they were built on point-to-point architectures instead of business process orchestration engines. The SEEBURGER MFT solutions suite embeds compliance coherently and unobtrusively throughout your business, with little or no change to the way people work. This ensures compliance because, when compliance processes enhance (or at least don t disrupt) people s regular routines, people are more likely to use the processes instead of subverting them. SEE Link is a lightweight endpoint client option for remote sites and users. It centrally enforces secure communication with remote endpoints that you don t control, without requiring any changes to local processes. You can exchange files securely anywhere in your business with full governance even locations with limited network connections or EDI/IT expertise. SEEBURGER Managed Adapters (SEE Adapter) for MFT let you tightly integrate MFT into applications and systems. SEE FX is a self-service Web portal option that builds compliance into human-initiated file transfers. It lets business users send files via an easy-to-use but secure portal, automatically applying and enforcing policies to ensure compliance. Alternatively, SEE FX can work from within Microsoft Outlook or document management systems, as a menu option. In either case, you can choose to route certain files through SEE FX, with full centralized security, management, governance and auditability. SEE LINK End point client to connect any system in the network, any file type, any operating system and any file size supported Systems SEE Adapter Application and protocol specific interface to integrate applications via various standard protocols (FTP, SFTP, HTTP(s),...) Application SEE FX Human-to-Human, Humanto-System and Ad Hoc large file exchange. Integrated with popular Email systems for ease of use SEE LINK SEE LINK Application Adapter Governance Policy Management Multi-OS & A2A support End-to-End-Visibility Checkpoint & Restart Content filtering Base Functions Event & Activity Management Reporting & Administration Management & measurement End Point Provisioning Secure multiprotocol communication Process control & automation SEEBURGER Managed File Transfer White Paper 11

Continuous, Cost-Effective Control of Your Content SEEBURGER s secure MFT solutions make it easy to protect your organization s confidential, proprietary, sensitive or regulated information from accidental or malicious leaks. financial information as defined by GLBA) and international identification standards, to let you take appropriate actions on noncompliant communication. SEE MFT integrates with your Data Loss Prevention solutions via ICAP to automatically apply the relevant compliance requirements to your data transfers. It also takes advantage of compliance best practices already built into BIS. SEEBURGER analyzes and applies continuous content filtering in the outbound message stream, so you can: Easily create and enforce acceptable-use policies including maximum message size, allowable attachments, acceptable encryption and many more Monitor message content and attachments for the most common abuses and automatically append custom disclaimers or footers to messages Easily monitor and screen for problems such as offensive language using pre-built, customizable policies and pre-configured dictionaries Trigger policies based on message attributes, keywords, dictionaries or regular expression matches For example, SEE MFT helps ensure compliance with many different types of email-related information privacy regulations, including HIPAA, GLBA, PCI compliance guidelines, and SEC regulations. Predefined dictionaries and smart identifiers automatically scan for a wide variety of nonpublic information, including PHI (protected health information as defined by HIPAA), PFI (personal SEEBURGER Managed File Transfer White Paper 12

How Secure MFT Protects Your Business SEEBURGER s secure MFT solutions can help companies in many different industries meet a broad spectrum of compliance demands. (See the Appendix.) SEE MFT solutions handle all of the common compliance-related requirements for data transfers. These requirements are common across government regulations and requirements; national, regional and local privacy regulations; industry standards requirements; and many partner and customer mandates. The requirements are: Dual Control and Role-Based Access Controls Secure Login (SSL) and Unique Session Token Password Strength and Expiry Enforcement Alerting and Event Notification Event Auditing and Log Aggregation (SYSLOG) Protected Data in Motion (AS2 and Secure FTP) Protected Data at Rest (PGP and File Encryption Adapter) Protected Application Metadata (Database and Files) SQL and JavaScript Injection Prevention Modular Design That Fits with a Secure Network Model Secure File Transfer via Email ICAP Interface Compatible with Spam Blockers and DLP For example: the Sarbanes-Oxley Act of 2002 defines financial reporting requirements for all publicly held companies in the United States. Section 404 of the act requires companies to verify that their financialreporting systems have the proper controls, such as ensuring that revenue is recognized correctly. This requires testing and monitoring of internal controls via establishing, documenting and auditing business processes; and affects things like audit trails, authentication, and record retention requirements. SEE MFT solutions help you achieve these things, in a productive and compliant way, while themselves being compliant with SOX. (See Table 1 in the Appendix for how SEE MFT helps with SOX compliance; and Tables 2, 3 and 4 for how it helps with HIPAA, PCI 1.2 and PCI 2.0 compliance, respectively.) Similarly, SEE MFT solutions can help businesses in various industries respond to compliance requirements specific to their industries. (See How SEE MFT Solutions Help Compliance In Industries in the Appendix.) Business Benefits of Secure Managed File Transfer Prevents leaks of sensitive or confidential data Simplifies regulatory compliance Helps meet customer and partner privacy mandates Protects your brand and reputation Prevents profit leakage from SLA violations Accommodates expanding file sizes Eliminates cost and risk of multiple, insecure FTP servers Centralizes governance and best practices Provides competitive differentiation SEEBURGER Managed File Transfer White Paper 13

Closing the Compliance Gap Effective Managed File Transfer closes a big, dangerous gap in compliance: the spaghetti communications of regulated or sensitive data exchanged via unmanaged file transfers. MFT can reduce compliance chaos and improve your control over compliance. SEEBURGER offers the most advanced MFT approach and solution today. SEEBURGER gives you one unified platform for automated and human-to-human file transfers that covers all compliance challenges so you can stay ahead of compliance. Moreover, with a single, consolidated system like this that spans B2B/EAI and MFT, there are no breaks in business flow that can compromise compliance. With SEEBURGER MFT solutions, you can integrate MFT into your business and your trading relationships to protect your business and give you fine-grained control over compliance. When you can weave compliance into your business operations this unobtrusively and automatically, it becomes an asset instead of a burden. Getting started with MFT is easier than you think. We offer four different deployment options onpremise software, private cloud, public cloud or managed services so you can customize MFT to your needs and your budget. With SEEBURGER s MFT solutions, you get quick deployment, fast ROI and single-vendor accountability. SEEBURGER streamlines business processes while reducing infrastructure costs by providing our customers with comprehensive integration and secure Managed File Transfer solutions. These solutions provide business visibility to the farthest edges of the supply chain to maximize ERP effectiveness and innovation. SEEBURGER customers continue to lower total cost of ownership and reduce implementation time with our unified platform, which we ve precision-engineered from the ground up. For 25 years, SEEBURGER has been providing automated business integration solutions, including solutions for secure data transfers between businesses. We serve more than 8,500 customers in more than 50 countries and 15 industries. According to Aberdeen Group benchmark studies, more than two-thirds of best-in-class companies use secure Managed File Transfer solutions. Moreover, independent studies conducted by Aberdeen over the last three years show that that use is consistently correlated with top performance. SEEBURGER Managed File Transfer White Paper 14

APPENDIX Table 1: How SEE MFT Solutions Ensure Compliance with Sarbanes-Oxley, Section 404 SOX Requirement SEE MFT Server (BIS6) SEE Link SEE FX 3rd-party security audit, penetra on test Planned Planned Yes Ar cle, asset management Yes Yes Yes Patch management Yes Yes Yes Change control, move to produc on Yes N/A N/A Single sign-on Yes Yes Yes Unique session token created for each login Yes Yes Yes Time-outs, proximity tokens, scheduled access control N/A N/A Yes Secure, strong password enforcement (prevent default Setup Setup Yes passwords) Enforced password lifespan (expire every 90 days) Setup Setup Yes Iden ty management Yes Yes Yes Role-based access controls Yes Yes Yes Dual control, separa on of du es Yes Yes N/A Applica on does not use admin creden als Yes Yes Yes End users do not use applica on creden als Yes Yes Yes Log aggrega on (SYSLOG) Yes Yes Yes Log analysis Yes Yes Yes Security event management Yes Yes Yes Aler ng and no fica on Yes Yes Yes HTTP GET and POST resistant to tampering (i.e.: SQL injec on) Yes Yes Yes All field valida on is performed on the server side (prevent N/A Yes Yes JavaScript injec on) Encrypt sensi ve applica on metadata (configura on files Yes Yes Yes and database records) Encrypt sensi ve payload data at rest (filesystem or files) Process Process Process Encrypt data in mo on (PKI, PGP, SSL, SSH, VPN) Yes Yes Yes Key rota on/renewal Yes Yes Yes Protected key material Yes Yes Yes Web-accessible services should run on different systems and Yes Yes Yes networks compared to backend Encrypted data and key material stored in separate physical Setup Setup Setup loca ons No sensi ve informa on stored in publically accessible files, like cookies Setup & Process Setup & Process Setup & Process Secure file dele on, zeroing N/A N/A N/A Email protec on Yes Yes Yes Encrypted backup support N/A N/A N/A Applica on proxy, firewall, mandatory UPN, SOCKS Integra on Integra on Integra on Default ports should be avoided Yes Yes Yes Spam control, an -virus Data loss preven on SEEBURGER Managed File Transfer White Paper 15

APPENDIX Table 2: How SEE MFT Solutions Ensure Compliance with HIPAA HIPAA Requirement SEE MFT Server (BIS6) SEE Link SEE FX 3rd-party security audit, penetra on test Planned Planned Yes Ar cle, asset management Yes Yes Yes Patch management Yes Yes Yes Change control, move to produc on Yes N/A N/A Single sign-on Yes Yes Yes Time-outs, proximity tokens, scheduled access control N/A N/A Yes Iden ty management Yes Yes Yes Role-based access controls Yes Yes Yes Applica on does not use admin creden als Yes Yes Yes End users do not use applica on creden als Yes Yes Yes Log aggrega on (SYSLOG) Yes Yes Yes Log analysis Yes Yes Yes Security event management Yes Yes Yes Aler ng and no fica on Yes Yes Yes Encrypt sensi ve applica on metadata (configura on files Yes Yes Yes and database records) Encrypt sensi ve payload data at rest (filesystem or files) Process Process Process Encrypt data in mo on (PKI, PGP, SSL, SSH, VPN) Yes Yes Yes Email protec on Yes Yes Yes Secure file dele on, zeroing N/A N/A N/A Encrypted backup support N/A N/A N/A Applica on proxy, firewall, mandatory UPN, SOCKS Integra on Integra on Integra on Spam control, an -virus Data loss preven on SEEBURGER Managed File Transfer White Paper 16

APPENDIX Table 3: How SEE MFT Solutions Ensure Compliance with PCI 1.2 PCI 1.2 Requirement SEE MFT Server (BIS6) SEE Link SEE FX 3rd-party security audit, penetra on test Planned Planned Yes Ar cle, asset management Yes Yes Yes Patch management Yes Yes Yes Change control, move to produc on Yes N/A N/A Single sign-on Yes Yes Yes Secure, strong password enforcement (prevent default Yes Yes Yes passwords) Iden ty management Yes Yes Yes Role-based access controls Yes Yes Yes Dual control, separa on of du es Yes Yes N/A Applica on does not use admin creden als Yes Yes Yes End users do not use applica on creden als Yes Yes Yes Log aggrega on (SYSLOG) Yes Yes Yes Log analysis Yes Yes Yes Security event management Yes Yes Yes Aler ng and no fica on Yes Yes Yes Encrypt sensi ve applica on metadata (configura on files Yes Yes Yes and database records) Encrypt sensi ve payload data at rest (filesystem or files) Process Process Process Encrypt data in mo on (PKI, PGP, SSL, SSH, VPN) Yes Yes Yes Encrypted data and key material stored in separate physical Setup Setup Setup loca ons Protected key material Yes Yes Yes Key rota on Yes Yes Yes Secure file dele on, zeroing N/A N/A N/A Encrypted backup support N/A N/A N/A Applica on proxy, firewall, mandatory UPN, SOCKS Default ports should be avoided Yes Yes Yes Data loss preven on SEEBURGER Managed File Transfer White Paper 17

APPENDIX Table 4: How SEE MFT Solutions Ensure Compliance with PCI 2.0 PCI 2.0 Requirement SEE MFT Server (BIS6) SEE Link SEE FX 3rd-party security audit, penetra on test Planned Planned Yes Ar cle, asset management Yes Yes Yes Patch management Yes Yes Yes Change control, move to produc on Yes N/A N/A Single sign-on Yes Yes Yes Secure, strong password enforcement (prevent default Yes Yes Yes passwords) Iden ty management Yes Yes Yes Role-based access controls Yes Yes Yes Dual control, separa on of du es Yes Yes N/A Applica on does not use admin creden als Yes Yes Yes End users do not use applica on creden als Yes Yes Yes Log aggrega on (SYSLOG) Yes Yes Yes Log analysis Yes Yes Yes Security event management Yes Yes Yes Aler ng and no fica on Yes Yes Yes Encrypt sensi ve applica on metadata (configura on files Yes Yes Yes and database records) Encrypt sensi ve payload data at rest (filesystem or files) Process Process Process Encrypt data in mo on (PKI, PGP, SSL, SSH, VPN) Yes Yes Yes Encrypted data and key material stored in separate physical Setup Setup Setup loca ons Protected key material Yes Yes Yes Key rota on Yes Yes Yes Secure file dele on, zeroing N/A N/A N/A Encrypted backup support N/A N/A N/A Applica on proxy, firewall, mandatory UPN, SOCKS Default ports should be avoided Yes Yes Yes Data loss preven on Web-accessible services should run on different systems and networks compared to backend Yes Yes Yes SEEBURGER Managed File Transfer White Paper 18

How SEE MFT Solutions Help Compliance in Industries SEE MFT solutions can help businesses in various industries respond to compliance requirements specific to their industries. Here are some examples. Automotive: Government regulations such as RoHS (Restriction of the use of Certain Hazardous Substances); WEEE (Waste Electrical & Electronic Equipment); REACH (Registration, Evaluation, and Authorization of Chemicals) a European Chemicals Agency; and EPCIP (the European Programme for Critical Infrastructure Protection). National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. Information security standards such as ISO 17799 /27002. Supply chain connectivity standards such as AS2, ebxml, RosettaNet and OFTP. Consumer Packaged Goods (CPG): Government regulations, such PCI DSS (PCI 1.2 and PCI 2.0), PA- DSS, the Consumer Product Safety Improvement Act, Basel II and EPCIP (the European Programme for Critical Infrastructure Protection). National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. Information security standards such as ISO 17799 /27002. Supply chain connectivity standards such as AS2, ebxml, RosettaNet and OFTP. Financial Services: Government regulations such as the 17 CFR 240, 17a-3,4 (U.S. Securities and Exchange Act Rules 17a-3,4), FDIC/OCC/OTS or FFIEC (Federal Deposit Insurance Corp.), PA-DSS, Basel II, JSOX and EPCIP ( the European Programme for Critical Infrastructure Protection). National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. Information security standards such as ISO 17799 /27002. Supply chain connectivity standards such as ACORD, AS2, ebxml, PCI, RosettaNet and OFTP. Government: Regulations and standards applying to government agencies, contractors or companies doing business with governments, including the U.S. Department of Defense (DOD) 5015.2, FIPS (Federal Information Processing Standard), and US NIST 800-53 (from the U.S. National Institute of Standards and Technology). Health Care: Government regulations such as 21 CFR Part 11, HIPAA (the Health Insurance Portability and Accountability Act), HITECH (the Health Information Technology for Economic and Clinical Health Act, governing protection and consumer transparency of information in medical records) and EPCIP (the European Programme for Critical Infrastructure Protection). National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. E-discovery regulations. Supply chain connectivity standards such as AS2, ebxml, RosettaNet and OFTP. Manufacturing: Government regulations, such as RoHS (Restriction of the use of Certain Hazardous Substances), WEEE (Waste Electrical & Electronic Equipment), REACH (Registration, Evaluation, and Authorization of Chemicals) a European Chemicals Agency, and EPCIP (the European Programme for Critical Infrastructure Protection). National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. Information security SEEBURGER Managed File Transfer White Paper 19

standards such as ISO 17799 /27002. Supply chain connectivity standards such as AS2, ebxml, RosettaNet and OFTP. Technology: Government regulations such as EPCIP (the European Programme for Critical Infrastructure Protection), RoHS (Restriction of the use of Certain Hazardous Substances), WEEE (Waste Electrical & Electronic Equipment), and REACH (Registration, Evaluation, and Authorization of Chemicals) a European Chemicals Agency. National or regional privacy laws such as the BDSG Novelle personenbezogene, EUDPD (the European Union Data Protection Directive) or the California Security Breach Notification Act. Information security standards such as ISO 17799 /27002. Supply chain connectivity standards such as AS2, ebxml, RosettaNet and OFTP. SEEBURGER Managed File Transfer White Paper 20

www.seeburger.com ASIA PACIFIC China SEEBURGER Asia Pacific Ltd. Level 3, Three Pacific Place 1 Queen s Road East Hong Kong Phone +852 2584 6220 Fax +852 2588 3499 infoasiapac@seeburger.com CHINA HQ SEEBURGER China Inc. Suite 2005-06, 20/F SINO Life Tower 707 ZhangYang Road, Pudong 200120 Shanghai P.R. China Phone +86-21-50471825 Fax +86-21-50471831 infochina@seeburger.com www.seeburger.cn SEEBURGER China Inc. CBD International Mansion C529, 5/F No.16 Yongan Dongli Chaoyang, Beijing, 100022 Phone +86 (0) 10 6563 7565 Fax +86 (0) 10 6563 7562 infoasiapac@seeburger.com Japan SEEBURGER KK Nishi-Gotanda Sign Tower 5th Floor 1-33-10 Nishi-Gotanda Shinagawa-ku, Tokyo 141-0031 Phone +81-(0)3-6303-9120 Fax +81-(0)3-6303-9124 japan@seeburger.com Malaysia Malaysia Representative Office Level 28, The Gardens South Tower Mid Valley City, Lingkaran Syed Putra 59200 Kuala Lumpur Malaysia Phone +(603) 2298-7161 Fax +(603) 2298-7333 infoasiapac@seeburger.com EUROPE Austria SEEBURGER Informatik GmbH Vienna Twin Tower Wienerbergstraße 11/12A A-1100 Wien Phone +43 (0) 1/99 460-6189 Fax +43 (0) 1/99 460-5000 info@seeburger.at www.seeburger.at Belgium & Netherlands SEEBURGER Benelux B.V. Het Poortgebouw - Beechavenue 54-60 Schiphol-Rijk NL-1119 PW, the Netherlands Phone +31 (0)20 658 6137 Fax +31 (0)20 658 6111 infonl@seeburger.com www.seeburger.nl SEEBURGER Benelux B.V. Regus Brussels Airport Pegasuslaan 5 B-1831 Diegem Belgium Phone +32.2.709.29.28 Fax +32.2.709.22.22 infobe@seeburger.com www.seeburger.be Bulgaria SEEBURGER Informatik EOOD Grigorij Gorbatenko Strasse 6 k-s Mlados I BG-1784 Sofia Phone +359 29745-100 info@seeburger.com www.bg.seeburger.com Czech Republic Phone +420 733 723602 info_cz@seeburger.com www.cz.seeburger.com Eastern Europe & South Eastern Europe (except Hungaria, Czech Republic, Bulgaria & Turkey) Phone +49 (0) 7252/96-1172 se-europe@seeburger.com www.seeburger.com France SEEBURGER France S.A.R.L. 87, rue du Gouverneur Général Eboué F-92130 Issy Les Moulineaux (Paris) Phone +33 (0) 1 41 90 67 50 Fax +33 (0) 1 41 90 67 59 info@seeburger.fr www.seeburger.fr Germany SEEBURGER AG (Headquarters) Edisonstraße 1 D-75015 Bretten (near Karlsruhe) Phone +49 (0) 72 52/96-0 Fax +49 (0) 72 52/96-2222 info@seeburger.de www.seeburger.de www.seeburger.eu Hamburg Spaldingstr. 77a D-20097 Hamburg Phone +49 (0) 40/2388240 Fax +49 (0) 40/23882424 info@seeburger.de Köthen Konrad-Adenauer-Allee 13 D-06366 Köthen Phone +49 (0) 34 96/50 81-0 Fax +49 (0) 3496/50 81-27 info@seeburger.de Trier SEEBURGER Trier GmbH Max-Planck-Straße 18+20 54296 Trier Phone +49 (0) 651 99379-0 Fax +49 (0) 651 99379-29 info@seeburger.de Great Britain/Ireland SEEBURGER UK Ltd. Abbey House 450 Bath Road Longford West Drayton Middlesex UB7 0EB Phone +44 (0) 208 564 3900 Fax +44 (0) 208 897 8295 info@seeburger.co.uk www.seeburger.co.uk Italy SEEBURGER Informatica SRL Unipersonale Via Frua, 14 I-20146 Milano Phone +39 02 45 48 53 68 Fax +39 02 43 51 01 10 info@it.seeburger.com www.seeburger.it Spain/Portugal SEEBURGER Informática S.L. Calle Marqués del Duero 8 Esc. 1, Bajo Derecha E-28001 Madrid Phone +34 91 433 69 89 Fax +34 91 434 12 28 info@es.seeburger.com www.seeburger.es Sweden/Scandinavia SEEBURGER Svenska AB Vendevägen 90 (7th floor) SE-182 32 Danderyd Phone +46 (0) 8 544 99 140 Fax +46 (0) 8 544 99 149 info@seeburger.se www.seeburger.se SEEBURGER Svenska AB Olskroksgatan 30 SE-416 66 Göteborg Phone +46 (0) 31 339 15 25 Fax +46 (0) 31 339 15 26 info@seeburger.se Switzerland SEEBURGER Informatik AG Samstagernstrasse 57 CH-8832 Wollerau Phone +41 (0) 44 787 01 90 Fax +41 (0) 44 787 01 91 info@seeburger.ch www.seeburger.ch Turkey SEEBURGER Türkiye Gümrük Cd. Fazlıoğlu İş Merkezi No: 34 İzmit / Kocaeli / Türkiye Phone/Fax: +90 262 33 11 733 Hotline(7/24): +90 543 46 36 733 info@seeburger.com.tr www.seeburger.com.tr MIDDLE EAST & AFRICA Middle East & Africa Phone +49 (0) 72 52/96-1172 mea@seeburger.com www.seeburger.com NORTH AMERICA USA SEEBURGER, Inc. 1230 Peachtree Street NE Suite 1020 Atlanta, GA 30309, USA Phone +1 770 604 3888 Fax +1 770 604 3885 info@seeburger.com www.seeburger.com www.seeburger.com/global-offices/ All product names mentioned are the property of the respective company. SEEBURGER Secure Managed File Transfer 12/2011 SEEBURGER AG 06/2013 SEEBURGER Inc. 1230 Peachtree Street NE, Suite 1020 Atlanta, GA 30309 USA info@seeburger.com www.seeburger.com