“It is, by far, the most user-friendly — and the most secure — version we’ve ever released,” said Chuck Angel, Axway’s senior trainer, who will be demonstrating the all-new SecureTransport v5.2 at Axway Connections ’13.
Whether a user is experienced at enabling their organization to secure, manage, and track the transfer of files with this multi-protocol managed file transfer gateway solution, or they’re simply interested in learning more about what the product can do for them, Angel’s session promises to leave all attendees with a thorough sense of v5.2’s end-user experience, including:
- Accessing the solution via a web browser
- Uploading and downloading files
- Navigating the new interface
Further, attendees will learn exactly why ad hoc file transfer with SecureTransport v5.2 is a far more secure prospect than the method they’re currently using, as well as how the solution guarantees that security.
“If you already love SecureTransport, this session will show you how v5.2 will empower you to do even more with it. And if you’re new to SecureTransport altogether, get ready,” said Angel. “You’re about to look back on all your years of ad hoc file transfers and wonder why you waited so long to make the switch.”
Consumer file-hosting services offering cloud storage, file synchronization, and client software have been making inroads into the enterprise market over the last few years. But has that market considered the security and policy qualifications of these services?
You value the encryption of files and emails — both at rest and in transit — and authenticated access control. But when you start trusting the security of sensitive information to cloud-based file-hosting services and secure email providers, you have some additional things to consider, including:
- Is your sensitive content encrypted?
- Who owns the keys to decrypt it?
- If a government organization requests your data, who could authorize their access?
- Is your data co-located with the data of your service provider’s other clients?
- If your files are co-located, and if the files of those other clients were disclosed, could your content be inadvertently disclosed, too?
You value policy enforcement. But if you define it merely as having the ability to know which files are being transferred by whom, ask yourself:
- Could the very fact that your data resides in the cloud violate a regulation or mandate?
- Are your policies applied automatically so that your organization can decide who’s allowed to share what kind of content with whom?
- Can you readily apply policy based on a deep scan of the email or file being transferred?
Policy and security do affect the applicability of email and file-hosting services, and in this session, you’ll find the answers that all enterprises need to have, to questions most enterprises don’t know to ask.