Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

Similar documents
Understanding and Selecting the Right Secure File Transfer Solution for your Organization

Top 7 Tips for Better Business Continuity

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

Secure web transactions system

Authentication Integration

V1.4. Spambrella Continuity SaaS. August 2

White Paper. Securing and Integrating File Transfers Over the Internet

owncloud Architecture Overview

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

Cornerstones of Security

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

Getting on the Road to SDN. Attacking DMZ Security Issues with Advanced Networking Solutions

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

Encryption Made Simple

Introduction to SAML

Oracle Net Services for Oracle10g. An Oracle White Paper May 2005

PROPALMS TSE 6.0 March 2008

Fujitsu Dynamic Cloud Bridging today and tomorrow

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

N-CAP Users Guide Everything You Need to Know About Using the Internet! How Firewalls Work

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

Jitterbit Technical Overview : Microsoft Dynamics CRM

WHITE PAPER. Managed File Transfer: When Data Loss Prevention Is Not Enough Moving Beyond Stopping Leaks and Protecting

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Computing: Public, Private, and Hybrid. You ve heard a lot lately about Cloud Computing even that there are different kinds of Clouds.

Firewall Architecture

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

PRIVACY, SECURITY AND THE VOLLY SERVICE

Mail Services. Easy-to-manage Internet mail solutions featuring best-in-class open source technologies. Features

MassTransit vs. FTP Comparison

Cloudbuz at Glance. How to take control of your File Transfers!

Privacy 101. A Brief Guide

Troubleshooting BlackBerry Enterprise Service 10 version Instructor Manual

Autodesk Streamline Achieve maximum project visibility.

redcoal SMS for MS Outlook and Lotus Notes

Alliance Key Manager A Solution Brief for Technical Implementers

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Business Case for Voltage Secur Mobile Edition

Avaya G700 Media Gateway Security - Issue 1.0

TIBCO Managed File Transfer Suite

Best Practices for VMware ESX Server 2

Symantec Messaging Gateway 10.5

Software licensing, made simple.

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

Lucent VPN Firewall Security in x Wireless Networks

Brocade Virtual Traffic Manager and Microsoft IIS Deployment Guide

ADAPTIVE AUTHENTICATION ADAPTER FOR JUNIPER SSL VPNS. Adaptive Authentication in Juniper SSL VPN Environments. Solution Brief

Data Storage That Looks at Business the Way You Do. Up. cloud

Solution Brief: Enterprise Security

Netwrix Auditor. Administrator's Guide. Version: /30/2015

Remote Access Platform. Architecture and Security Overview

March

The Cisco ASA 5500 as a Superior Firewall Solution

Where can I install GFI EventsManager on my network?

1110 Cool Things Your Firewall Should Do. Extending beyond blocking network threats to protect, manage and control application traffic

SapphireIMS 4.0 BSM Feature Specification

Global Network. Whitepaper. September Page 1 of 9

A Buyer's Guide to Data Loss Protection Solutions

Managing SSL Security in Multi-Server Environments

Enterprise Architecture Review Checklist

Ranch Networks for Hosted Data Centers

Brocade Virtual Traffic Manager and Oracle EBS 12.1 Deployment Guide

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

LifeSize Control Installation Guide

Recommended IP Telephony Architecture

5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP

Why Encryption is Essential to the Safety of Your Business

SOA REFERENCE ARCHITECTURE: WEB TIER

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Security. on your terms SOFTSCAN

FAQs for Oracle iplanet Proxy Server 4.0

Symantec Messaging Gateway 10.6

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

Introducing ZENworks 11 SP4. Experience Added Value and Improved Capabilities. Article. Article Reprint. Endpoint Management

IronPort X1000 Security System

Secure Web Appliance. Reverse Proxy

Introducing ZENworks 11 SP4

Evaluation Guide. eprism Messaging Security Suite V8.200

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

COMPARING THE TOTAL COST OF OWNERSHIP OF TDM AND SIP CONTACT CENTERS

Avaya TM G700 Media Gateway Security. White Paper

Ensuring the security of your mobile business intelligence

Web DLP Quick Start. To get started with your Web DLP policy

An Overview of the SaskTel Hosted Contact Centre Solution Design and Delivery Principles, and Core Architecture

Zone Labs Integrity Smarter Enterprise Security

Transcription:

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Top 10 Questions to Ask when Choosing a Secure File Transfer Solution Companies that have made an investment in a Secure File Transfer (SFT) solution have discovered how it can become a central component of their communications and network infrastructure. Asking the right questions before investing in an SFT solution can help ensure you choose one that can handle both your immediate needs and future requirements. Biscom Inc. 321 Billerica Road, Chelmsford, MA 01824 978-367-3612 sales@biscomdeliveryserver.com www.biscomdeliveryserver.com 1 www.biscom.com/secure-file-transfer/sft/ Biscom Inc. All rights reserved. BDS is a trademark of Biscom Inc. All other registered trademarks are property of their respective owners. Specifications subject to change without notice.

Transferring, securing and collaborating on large files and documents in today s business environment has led users to demand that IT departments provide better file transfer methods than the traditional ones: FTP, email, physical media, and courier services. In response to such demands, IT staffs are looking for SFT solutions that fit into their current IT infrastructure and have built-in scalability to support a growing user population. Secure File Transfer (SFT), also known as Managed File Transfer (MFT), helps people send electronic files and documents to other people easily and with confidence. The increasingly digital nature of documents, media, and messaging requires better, faster, and easier ways to deliver these electronic files. As file sizes increase, security concerns intensify, and pressure from users to have an easy-touse application rises, secure file transfer becomes a high priority need. The media has reported on several high profile companies that have lost important data or sensitive customer information. These reports have detailed the hard costs associated with a data breach: identifying and notifying affected parties, resolving the breach, monetary fines, implementing a SFT or MFT solution, and legal fees, not to mention negative publicity and a harm to the brand. 1. Why is secure file transfer becoming so important? Data, documents, multimedia files, software, and other digital files are getting bigger. Users who were satisfied with eighty gigabyte hard drives a few years ago now need half-terabyte drives or larger. The introduction of itunes, video, ebooks, and other traditional media are taking up larger portions of hard drives. Transferring these bigger and more numerous files is becoming a major issue how are large files delivered? Will people be able to easily retrieve the files? Do the files need to be sent securely? The two primary complaints about sending large files are of users having technical problems with complex software clients, and inadequate tracking of the success or failure of the delivery. Current methods for delivering files, such as FTP, email, and burning a DVD to send in the mail, have serious drawbacks and limitations. Today s users want a tool that is simple to use, provides needed security, and has the real-time notification and reporting that enables them to track the progress of their deliveries. 2. What s wrong with sending email? Email is a great way to send messages and small files quickly and easily. Email does have many limitations, however. From a security standpoint, email is equivalent to sending a postcard in the mail if you don t care who sees the contents of your message, email is a great solution. If your attachments have low potential for being rejected as too large or a restricted file type, then email works well in this case also. Email administrators are constantly battling larger mail stores, viruses, and spam, and are implementing increasingly strict protocols that block many messages based on content, attachment size, and attachment 2

type. Many companies impose five megabyte attachment limits, restrict compressed, executable, and scriptbased attachments, and use aggressive content filters. These restrictions result in problems with sending and receiving legitimate messages and files. In many cases, senders do not realize their intended recipients have not received their message. 3. What about FTP or burning a CD or DVD? FTP has been around for over thirty years one of the first protocols available to transfer files. It was designed when security, automation, and management were not pressing requirements. As a mostly free server application, FTP is used by many companies and organizations. In today s world, however, data management, security/ access control, and automation are important. Whether it s clear text passwords, painful user management and permissions, unsecure transmission, or unintentional access to others files, FTP has numerous security issues. Delivering large files by burning them to physical media, such as a CD or DVD, and mailing them requires time, equipment, and know-how. The sender needs access to CD or DVD burning hardware and software, some level of technical knowledge, and time to write the disc, package it up, address the envelope, and mail it out. Physical delivery is slow, cannot be tracked in real time, and the package can be lost in transit. 4. Is it easy to use? Technology and applications that are hard to use won t get used that s a big complaint from the business and operations groups who must use applications for compliance or other policies required for secure data transmission. For people who are used to sending emails to anyone in the world with a few clicks of a mouse, adding complexity to this task can inhibit use. Ensuring proper usage means making sure the application s user interface is simple and easy to understand, and also meets the requirements for security and tracking. 5. How should data be secured? When looking at secure file transfer products, it is important to evaluate how their deployment can affect security. A model proven to be secure is a multi-tier architecture that supports separation of the presentation layer, business logic, and data layer. With such a separation, the presentation and business logic layers do not contain any user data. Since the presentation layer is often placed in the demilitarized zone or DMZ in order to provide wide access, it is necessarily exposed to unwanted admission. Users interact with the presentation layer, making requests that are passed from the presentation layer back to the business logic layer. The business logic layer enforces the parameters around valid usage, such as validating data before storing it, controlling user access, tracking transactions, reporting, and managing and allocating back end resources. Once the request and associated data is deemed authentic, the business logic layer can pass the information to the data layer or to other protected resource and information management systems. Each layer should thus be deployed in progressively more secure areas of your network, utilizing firewalls, IP, port, user, and protocol restrictions. All communication between the application and the end user should be done over an encrypted channel such as SSL or TLS. 6. Can I easily deploy it to a large number of users? Managing a large number of users can be tedious, and if you have to manage those users through multiple mutually exclusive interfaces, it can be very tiresome. LDAP and Active Directory are popular directory services that simplify and centralize user management and access to resources. Accordingly, any SFT applications should support directory services to consolidate management tasks. 3

7. Can it integrate with my network, other applications, and legacy systems? Companies fall into two categories homogeneous, or heterogeneous, operating environments, where a homogeneous environment is typi- cally Windows or Unix/Linux. An SFT application should be comfortable fitting into single as well as mixed- mode environments for front end and back end application compo- nents. Having an application that can run on multiple hardware and operating systems is even better, as it gives IT managers the flexibility to deal with any shift in the technol- ogy stack and run applications on hardware and software they are most familiar with. Web-based technologies that support HTTP and Web services is a must-have these days. The ubiquity of Web access through browsers almost guarantees your files can be accessed by practically anyone without any special client software. Once an SFT application is deployed, leveraging it for use with other applications or legacy systems can speed up your return on investment. Open standards-based APIs that are platform and language neutral allow integration with a diverse application pool standardized communications is achievable when there is no proprietary or language-specific interface. APIs enable developers to build business applications without having to worry about the implementation details of file transfer, security, user management, and storage. 8. What else should I consider before implementing a secure file transfer system? Scalability is a critical feature of any production file transfer system. What works today may not be adequate for future needs. Being able to scale up the application to handle additional users, storage requirements, and bandwidth seamlessly is a must, and particularly important when initial load and usage estimates may be too low. Savvy buyers want to pay only for what they need and look for a cost effective upgrade path. If you ve bought into proprietary hardware, or a system that your IT department doesn t normally support, expect to invest in additional training, make more support calls, and spend more time deploying and maintaining the product. Using familiar hardware and operating systems you already know how to support enables you to upgrade the components and performance on your schedule, as you see fit. 9. What about building this system on my own? The build-versus-buy decision is a frequently asked question. The standard response usually references the primary business of the company is file delivery the primary business or simply part of the business process? More questions than answers usually ensue who is developing the application? Is it his or her primary job at the company? How long will it take the person to develop the application and have it running in production? Will it scale to handle my entire organization? How easy is the system to administer? How configurable and customizable is the application? Has the software gone through a rigorous QA cycle? Is there documentation? 4

How often is the software updated with new features? How long does it take to get something fixed? What happens if that person leaves the company? Ultimately, are the time and resources needed going to be more or less than buying a purpose-built solution? 10. How experienced/credible is the company that developed the product, and how does the company support the product? For experienced buyers, confidence in the vendor is common sense. How long has the vendor been in business? How many customers do they support? Do they have experience working with and supporting enterprise accounts with mission critical applications? Will they continue to support the product? How will I be treated after I buy the product? Are they responsive to suggestions and feature requests? Having a good relationship with your vendor, and being comfortable with their post-sales support, is key to choosing the right product. While you may have already considered many of these questions in your search for a Secure File Transfer solution, it is hoped that raising and answering them here has helped you focus your inquiry. In addition, there may be additional questions specific to your particular industry/market segment, the answers to which can help you make sure you choose the right SFT product. Because many companies who have acquired an SFT solution for a single use have come to see it can meet multiple business communication needs, it s more important than ever that the solution be one that can handle your immediate, as well as future, requirements. Need More Information? To learn more about Biscom secure file transfer please contact us at: Toll Free: 800-477-2472 Email: sales@biscom.com Web:www.biscom.com/secure-file-transer/sft 5