PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
November 2008

Using a managed file transfer for secure data transmission, exchange

Data has to move. Whether you are in manufacturing, financial services, entertainment, government, health care, pharmaceuticals -- whatever your business -- moving files, often big files, to and from departments, business units, partners, customers, etc., is at the heart of your operation. Every organization has some way of getting files from place to place, person to person. It may be FTP or VPN, probably a home-grown solution using batch scripts, maybe with some file encryption and/or digital signing for some security. That gets you from point A to point B, but where's the audit trail? Where's the accountability? How do you know the files got where they needed to go and to the right people, or if they were even sent? And how do you manage secure transmission and exchange all this data while keeping operational costs down? Managed file transfer (MFT) software and products have grown into a $500 million-a-year business to meet the increasing security, compliance and operational demands of moving information. "It's never just ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

  • Product Review: Symark PowerADvantage 1.5

    Symark's Symark PowerADvantage allows Unix hosts to become member servers of an AD forest and leverage AD's centralized user management and authentication capabilities.

  • Product Review: Shavlik's NetChk Compliance

    Shavlik's NetChk Compliance automates compliance and provides control by actively managing system and security settings and allows the IT manager to identify and mitigate risks.

Columns in this issue