0333 123 1240 info@pro2colgroup.com

Maytech Awarded PAN Government Accreditation for their File Sharing Services

Maytech shows commitment to government secure file transfer having received PAN Government Accreditation. Maytech has announced that they have been awarded a PAN Government Accreditation from CESG (the Information Security arm of GCHQ – Government Communication Head Quarters) for OFFICIAL and OFFICIAL SENSITIVE secure file sharing. This follows a substantial audit process and provides reassurance to government purchasers and SiROs as security concerns or questions have already been risk assessed and approved. As all security questions have been pre-authorised by CESG it ensures a faster procurement process. This coupled with the flexibility and scalability Maytech solutions provide ensure large-scale resource efficiencies and cost savings. Over 80% of government data is OFFICIAL and OFFICIAL SENSITIVE and it is the onus of the IT or Security Manager to ensure that the platform they purchase for these external transfers is robust and secure. Maytech’s CEO John Lynch said: “Achieving OFFICIAL and OFFICIAL-SENSITIVE PAN Government Accreditation is significant for Maytech’s Public Sector offer. PGA makes our secure file sharing services even more accessible and will give public sector organisations added confidence by providing a dedicated service.” This service accreditation complements Maytech’s ISO 27001 certification. Maytech provide access to IT cloud services through the following agreements: GCloud / Digital Marketplace (GCloud service ID: 6392432375627776) SourceUK Direct (through one of our dedicated Government team)   Find out more about Maytech’s solutions for UK Government – speak to a member of the Pro2col team today on 0333 123 1240. Products in the Maytech suite feature multi-layered security, granular controls and detailed tracking and logging: – Quatrix® Business – simple web based secure file sharing. – FTP-Stream...

Moving files, fast. Really fast!

Most of the companies that contact us do so looking for guidance on automating their file transfer. Automation is primarily for B2B and predominately involves using SFTP, a simple but typical example might be that an insurance company receives files from a bank and the files need to be moved to another internal system for processing. Of course there are usually a wide range of other complex processes that accompany it, but you get the idea. In recent times however many of our conversation have gone along the lines of, “How can we move REALLY large files?” With the continuing explosion in data creation companies are having problems moving the large sets of data, many that are gigabytes in size.  All variations of FTP can deliver large volumes of data, but when you add in to the mix that it is in a far flung location and you’ve got a dodgy internet connection, suffering from latency and packet loss then FTP becomes pretty much ineffectual. Latency on the line, measured in round trip times (RTT), is a measure of how long it takes for a packet of data to get from point A to B and back again. We won’t go into the reasons in this blog, but suffice to say the longer the RTT the less efficient FTP becomes as can be seen in the graph here. However all is not lost, there is an resolution to this data transfer problem. A select few vendors have built proprietary protocols based upon the open standard UDP to move data faster. A lot faster! Their protocols generally work the same way in that they maximise the...

A look back at 2014 and our predictions for 2015

Last year saw a year of stability in the Managed File Transfer industry. The stand out news item was the reputed $195m acquisition of Aspera by IBM, which is due to complete shortly, highlighting the increasing importance of the secure movement of Big Data. A few other vendors had board and senior management reshuffles as the increasingly mature marketplace meant new business was hard to come by. This inevitably meant that vendors focused more on their existing customers as support and maintenance renewals became more important. I believe that 2015 will be an interesting year and my predictions are shaped by the maturity of the marketplace and which direction Managed File Transfer vendors decide to develop their platforms. Consolidation of Managed File Transfer Vendors During 2015, I predict that we’ll see further consolidation. Managed File Transfer vendors will find growth difficult, even in light of an increasingly optimistic economy and as a consequence could become acquisition targets. Pure file transfer vendors with little or no interests in other technologies will be the most likely candidates, as their existing client base will be of interest to those vendors with a broader portfolio. The acquisitions of Rhinosoft by SolarWinds is a recent example. Big Data in Managed File Transfer The continued explosion of Big Data will result in more Managed File Transfer vendors adding UDP based delivery protocols to their solutions. The need for timely analysis of Big Data will mean that speed of delivery becomes a higher priority than previously and Managed File Transfer vendors will look to provide this capability to retain current customers and drive new business. IBM ultimately acquired...

Biggest UK Fines By The ICO in 2014

The Information Commissioners Office (ICO) is a government body set up to regulate those organisations which handle personally identifiable data. Retaining a register of companies and their nominated data handler ensures that the ICO can follow up on any reported data leaks or mishandling of data. The ICO has the ability to serve a company with an undertaking, prosecution, enforcement notice or a monetary penalty. None of these are good for business or for the individual involved, especially as all details are available in the public domain. In the past 12 months, the ICO took action on 88 individuals or companies. Below is a list of the worst performing businesses and the fines levied.   British Pregnancy Advice Service £200,000 – 7 March Kent Police £100,000 – 19 March Amber Windows £50,000 – 3 April Think W3 Limited £150,000 – 23 July Reactiv Media Limited £50,000 – 28 July Ministry of Justice £180,000 – 26 August EMC Advisory Services Limited £70,000 – 1 October Worldview Limited £7,500 – 5 November Parklife Weekender £70,000 – 5 December Kwik Fix Plumbers Ltd £90,000 – 22 December   Not all of these cases were data breaches, but data had been misused or not protected sufficiently to comply with current legislation by the company or individuals involved. Without the correct processes and policies in place or tools for the job, employees can easily make simple decisions that can put personally identifiable data at risk. Implementing the right Managed File Transfer or Enterprise File Sync & Share solutions for your organisation need not be difficult and can be a key component of your data security plan. With our assistance we can help you...

Stay Secure: POODLE Vulnerability Update

On October 14th, 2014, Google announced a vulnerability in the design of SSL version 3.0 (CVE-2014-3566), nicknamed POODLE (Padding Oracle On Downgraded Legacy Encryption). The SSLv3 protocol is used in OpenSSL and other commercial products. This vulnerability allows the plaintext of secure connections to be calculated by a network attacker and has an overall CVSS severity rating of MEDIUM. In essence the POODLE weakness allows an attacker to steal the information protected, under normal conditions, by the SSL encryption used to provide communication security and privacy over the Internet for applications such as web, email, instant messaging (IM), and some virtual private networks (VPNs).   Globalscape Solutions EFT supports SSL connections for HTTPS and FTPS. For broad client support and backward compatibility, SSLv3 can be enabled on EFT. The SSLv3 protocol is vulnerable to the POODLE exploit. It is highly recommended, therefore, that you verify and modify the SSL configuration of EFT as needed to protect your information assets. Please see here for the workaround. Mail Express also leverages SSLv3 in its current and historical versions. SSLv3 can be disabled via a configuration file or by enabling FIPS compatibility mode in the administrator UI. Customers can manually change their configuration as described here. Both WAFS and DMZ Gateway are not vulnerable to POODLE exploits.   Ipswitch File Transfer Solutions MOVEit Managed File Transfer and WS_FTP Server is vulnerable to the POODLE exploit. To protect against an attack, Ipswitch recommends that all customers disable SSLv3 for all services and clients. Please find specific instructions for each product here. Please note – These products rely solely on Microsoft Windows to provide...

Webinar – The Evolution of Integration

From Business Ecosystems to Hybrid Data Integration In the aftermath of changes in business to support the “age of the customer” data flows and integration are becoming much more complex than the supply chain data integration of the past. Today’s data collaboration, sharing, cloud, big data, and other integration changes require significantly new thinking along with new strategies to enable business success. This data integration webinar will provide both important items to guide IT practitioners as well as suggestions for a business technology agenda for CIOs. Join this webinar featuring Stefan Ried, VP & Principal Analyst at Forrester Research, to hear how you can redefine your integration strategy to drive your business, instead of being driven. Speakers include; Event Type: Live Webinar Event Date: Wednesday 29th October – 1000Hrs ET   Review this Webinar Dr Stefan Reid Vice President and Principal Analyst, Forrester Stefan has been with Forrester since 2008, bringing more than 15 years of platform and middleware software industry experience in a number of roles leading engineering, product management, and product marketing. Joe Dupree Vice President of Marketing, Cleo As leader of Cleo marketing, Joe has more than 20 years of software industry experience in roles that span product marketing, product management, and software...