a managed file transfer (mft) alternative to shadow it
Post on 21-Feb-2017
322 Views
Preview:
TRANSCRIPT
Is Your MFT Ready for Digital?
15 USED
AUTHORIZED1 Cloud Services
2
81% of line-of-business employees admitted to using unauthorized SaaS applications
With 38%deliberately using unsanctioned apps because of the IT-approval process.
Source: Gigacom Research – Nov 2014
http://research.gigaom.com/report/shadow-it-data-protection-and-cloud-security/
3
59,5%Employees don’t understand their responsibility
in the organization’s security culture, which
includes file securitySource: Info-Tech n = 145
37%Individuals report that they actively seek
external technology without proper IT support
or supervisionSource: Info-Tech n = 20,270
• Send– A file to a collaborator
– A weekly report
– An updated client list for a marketing campaign
• Receive– An order
– A blueprint
4
• Users have experienced file sharing issues– Account setup - days not minutes
– Difficult process
– Inflexible for new needs
– The tool is outdated
– My partners/customers won’t use the tool
5
• It’s safe, right?– Browser had the
lock shown
– Their site says it isencrypted
– No PII/PHI
– It’s “Just” campaign data
6
7
Who has ongoing or temporary
access to the data?
Is access
ever revoked?
Is data
ever cleaned up?
Does the data persists after
users leave the organization?
FTP
Secure &Enterprise-Grade
• Ultimately it creates new silos– As many exchange channels as individuals
– As it is generally coming with no engagement users are changing of solution as soon they find one more « sexy »
– Each individual is using his own
– Need to define by phone which solution to be used this time
• Ultimately it creates budget problems– When summing up each dollar spent on these different solutions
– It makes a real amount
9
10
Security Governance
Traceability
Efficiency
Compliance
Cost
11
Mainframe application
has no account on
“dropfile.com”
No integration with
established business
processes
System centric
File Transfers
Person centric
File Transfers
Intuitive Open
Scalable Secure
Multi-modal people interactionsEnsure best fit between file transfer need and context of use
Unified GovernanceHomogeneous flow definition, management & repositoryEnd-to-End visibilityRoles management & delegated administration
Gateway to secure external exchangesScalable & Highly availableDelegated administration
Dedicated agents for A2A synchronizationDelegated management of inter-applications file transfer and sharing
Leverages a flow repository and covers all enterprise file transfer needs
14
mobile
CFT
email web SC
ST
appl. appl.
Central Governance
CFT
• Provide a secure and governed alternative
to consumer-grade, cloud-based file sharing
• Use one complete MFT solution to govern all
enterprise MFT patterns, including EFSS
(Enterprise File Sharing and Synchronization)
• Eliminate the use of risky file-sharing services
and enable secure BYOD (Bring Your Own
Device) initiatives
• Apply enterprise security policies to person-to-
person file sharing without requiring people
to change the way they work
• Allow new interactions combining people and
automated business processes
15
mobile
CFT
email web SC
ST
appl. appl.
Central Governance
CFT
16Download Axway white paper: https://www.axway.com/en/gate/1998
top related