![Page 1: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/1.jpg)
Is Your MFT Ready for Digital?
15 USED
AUTHORIZED1 Cloud Services
![Page 2: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/2.jpg)
2
81% of line-of-business employees admitted to using unauthorized SaaS applications
With 38%deliberately using unsanctioned apps because of the IT-approval process.
Source: Gigacom Research – Nov 2014
http://research.gigaom.com/report/shadow-it-data-protection-and-cloud-security/
![Page 3: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/3.jpg)
3
59,5%Employees don’t understand their responsibility
in the organization’s security culture, which
includes file securitySource: Info-Tech n = 145
37%Individuals report that they actively seek
external technology without proper IT support
or supervisionSource: Info-Tech n = 20,270
![Page 4: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/4.jpg)
• Send– A file to a collaborator
– A weekly report
– An updated client list for a marketing campaign
• Receive– An order
– A blueprint
4
![Page 5: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/5.jpg)
• Users have experienced file sharing issues– Account setup - days not minutes
– Difficult process
– Inflexible for new needs
– The tool is outdated
– My partners/customers won’t use the tool
5
![Page 6: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/6.jpg)
• It’s safe, right?– Browser had the
lock shown
– Their site says it isencrypted
– No PII/PHI
– It’s “Just” campaign data
6
![Page 7: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/7.jpg)
7
Who has ongoing or temporary
access to the data?
Is access
ever revoked?
Is data
ever cleaned up?
Does the data persists after
users leave the organization?
![Page 8: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/8.jpg)
FTP
Secure &Enterprise-Grade
![Page 9: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/9.jpg)
• Ultimately it creates new silos– As many exchange channels as individuals
– As it is generally coming with no engagement users are changing of solution as soon they find one more « sexy »
– Each individual is using his own
– Need to define by phone which solution to be used this time
• Ultimately it creates budget problems– When summing up each dollar spent on these different solutions
– It makes a real amount
9
![Page 10: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/10.jpg)
10
Security Governance
Traceability
Efficiency
Compliance
Cost
![Page 11: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/11.jpg)
11
Mainframe application
has no account on
“dropfile.com”
No integration with
established business
processes
![Page 12: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/12.jpg)
System centric
File Transfers
Person centric
File Transfers
![Page 13: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/13.jpg)
Intuitive Open
Scalable Secure
![Page 14: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/14.jpg)
Multi-modal people interactionsEnsure best fit between file transfer need and context of use
Unified GovernanceHomogeneous flow definition, management & repositoryEnd-to-End visibilityRoles management & delegated administration
Gateway to secure external exchangesScalable & Highly availableDelegated administration
Dedicated agents for A2A synchronizationDelegated management of inter-applications file transfer and sharing
Leverages a flow repository and covers all enterprise file transfer needs
14
mobile
CFT
email web SC
ST
appl. appl.
Central Governance
CFT
![Page 15: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/15.jpg)
• Provide a secure and governed alternative
to consumer-grade, cloud-based file sharing
• Use one complete MFT solution to govern all
enterprise MFT patterns, including EFSS
(Enterprise File Sharing and Synchronization)
• Eliminate the use of risky file-sharing services
and enable secure BYOD (Bring Your Own
Device) initiatives
• Apply enterprise security policies to person-to-
person file sharing without requiring people
to change the way they work
• Allow new interactions combining people and
automated business processes
15
mobile
CFT
email web SC
ST
appl. appl.
Central Governance
CFT
![Page 16: A Managed File Transfer (MFT) Alternative to Shadow IT](https://reader033.vdocuments.us/reader033/viewer/2022042906/58ac13511a28ab33178b5f65/html5/thumbnails/16.jpg)
16Download Axway white paper: https://www.axway.com/en/gate/1998