Posts tagged file transfer
Ad Hoc File Transfer Flexibility with Managed File Transfer Control

By John Andrews, Director, Solution Marketing Management, Axway

It is widely acknowledged that there is an explosive growth in consumable data. The explosion in data is not limited to pictures and movies. Even the traditional flat file data has grown in size. Organizations are creating more data than ever before, and the demands for sharing this data have increased exponentially. To make matters worse, the ability to effectively and efficiently move this data has not kept pace with growth in data size.

Almost 70% of all companies have been struggling with the size, speed or complexity of data.”  

–Aberdeen Group, “The Impact and Advantages of MFT”

Therefore, you should understand that data file management is a common problem. Combined with dramatic increases in the need for connectivity and collaboration between organizations, this pressure has created substantial challenges for today’s IT organization. IT departments now have to provide services that facilitate this collaboration but still maintain a secure environment.

All of this must be accomplished with increased security needs, ever-changing compliance regulations, and shrinking SLA duration. Current solutions do not address the needs of the individual and the organization. Pressure from having to be able to address contradicting needs can push IT staff into allowing the use of web-based consumer file transfer solutions — which is not good!

The challenge to IT departments is that many employees are turning to email and consumer-grade file-sharing services to get their work done and exposing the enterprise to risk in the process.” 

–CIO Magazine

What is needed is a managed file transfer solution that integrates the needs of individuals while providing enterprise-worthy functionality. The solution should provide a high level of security, certificate management, security for files at rest and in motion, and the right level of access (authentication and authorization). It should also be intuitive for end users while being scalable and flexible enough to meet the needs of the business. And finally, the solution needs to provide administrative-level visibility to file transfer functionality.

Join me in my upcoming webinar where we’ll explore ways to:

    • Create a single gateway for all your managed file transfer activities
    • Extend managed file transfer functionality to end users
    • Manage, monitor, and audit file transfers
    • Integrate ad hoc file transfers into your managed file transfer infrastructure

Ahead of the webinar, please feel free to ask any questions in the comments below! I look forward to presenting to you on 9/25!

Megaupload – Can we prevent this type of mega-mess?

By John Thielens, CSO, Axway

The Megaupload incident surprised a lot of people, especially because the FBI shut down the site even though thousands of individuals – including some from other divisions of the federal government – were depending on it for data storage. The problems resulting from the incident point to the consumerization trend known as “BYOA” or “Bring Your Own Apps to work.” This trend is not so much about bringing consumer devices onto the network (BYOD), though – it’s about bringing consumer behaviors onto the network.

Employees are simply trying to get their jobs done. And since employees are also consumers in a connected, Internet-driven world, they have gotten very good at utilizing services such as data storage or data exchange at home, doing their work, and then synchronizing the content. So it’s no surprise that when they log in at work they expect the same options and services, and realize that they don’t have them. But they do have Internet connectivity that enables them to connect to what they need – so they start bleeding their expectations over the line.

There are numerous potential risks when employees use these consumer services instead of proper corporate (or in this case, government-sanctioned) services. Some risks are well-known, such as inadequate security, and accidental data disclosure or data leaks. But the problem around government employees using Megaupload was more one of “collateral damage” – that is, federal employees were using a site that was actually a relatively secure “file locker in the sky,” but other people were using it to securely but illegally distribute copyrighted movies and other pirated material. This illegal activity was discovered, the site was shut down, and everyone’s content was lost due to the illegal actions of only some users.

For the government, this is a prime example of the unintended consequences that can result when there is no detailed, rationalized, CIO-led and IT-driven process for selecting corporate services, with attendant contractual relationships.

To prevent this type of scenario in the future, the CIO must elevate his/her game and challenge IT to fully analyze IT usage patterns and tools across the organization. A detailed understanding of employee needs must be developed – including some type of monitoring of where employees are going on the Web – so that better services, with greater security and control, can be provided.

The type of file sharing that happened on Megaupload is not the only BYOD/BYOA challenge CIOs are facing, but it’s one of the many IT security challenges Axway solves for organizations every day. Whatever technology trend is under scrutiny, the bottom line is that IT cannot afford to be reactive. In order to protect the organization, IT must proactively partner with employees and take consumerization trends seriously. This effort may make things tougher for IT, but in the end, protecting the organization and empowering employees to get the job done is what it’s all about.