Upgrade to EFT 7.4.5

Upgrade to EFT 7.4.5

EFT 7.4.5 is now available, including enhancements to existing modules and two new ones. We recommend you upgrade as soon as possible.

New modules and enhancements

7.4.5 includes enhancements to Workspaces and Insight, plus two new modules you can purchase (EFT Enterprise only):

  • The Remote Agent Module (RAM) allows organisations to perform unattended file transfers between remote locations and corporate headquarters with centralised control.
  • The Cloud Connector Module (CCM) gives IT admins a way to securely support data transfers to and from cloud storage or containers like Amazon S3 or Microsoft Azure.

Globalscape’s Vice-President of Software Engineering Gregory Hoffer explains enhancements and new modules in EFT 7.4.5. This was filmed at the recent user group event in London.

Upgrade to 7.4.5 now

If you are currently running version 7.2 or above, you will not need a new licence number. Upgrade to EFT 7.4.5 here.

If you are upgrading from a previous version, please contact the support team  with your current licence number and we can take you through the process.

Resources Available For You

Do you need a File Transfer solution?

Questions regarding need for File Transfer 

get-the-guide

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

get-the-guide

Compare the software on the market!

“Managed File Transfer Comparison guide”

get-the-guide

Coviant Diplomat 7.3 released

Coviant Diplomat 7.3 released

Coviant Diplomat 7.3 is now available, bringing new features, enhancements and fixes. We recommend that you upgrade as soon as possible.

 

New features

Some highlights include:

  • Expanded job-scheduling choice and the ability to view planned execution dates of up to ten job-runs for a transaction.
  • Geo-location information is displayed when using the Test button on HTTP, HTTPS, FTP, FTPS and SFTP partner profiles.
  • Added option to skip specifying a Windows user logon account for the Diplomat MFT Service during installation. NOTE: If you choose not to provide a user account, you must specify a login account with the required privileges for the Diplomat Service after installation.

Standard and Enterprise only

  • Updated SMB capabilities, now supporting SMB 1.0, 2.0 and 3.0.
  • Set dates to be excluded from scheduling (e.g., holidays and other non-business days) under Settings > Calendars from the top menu bar.
  • Improved report formatting.  NOTE: Report generation now requires PDF software on the system where the Diplomat MFT Client is running.
  • Added ability to use a forward proxy server when connecting to HTTP, HTTPS, FTP, FTPS and SFTP servers.

Enterprise only

  • Support for Azure blobs.
  • Support for Box.com.
  • Upgraded to Dropbox API v2. Anyone using or planning to use Dropbox should upgrade to Diplomat MFT v7.3 as soon as possible.

Fixes

Diplomat MFT 7.3 addresses previous bugs, including:

  • Increased buffer size when using SMB as the transport type, which has improved file transfer speeds.
  • Transactions can now be updated and saved whilst another job based on that transaction is being executed.
  • The Run Now problem has been fixed. Previously the window was not being properly populated.
  • The problem using saved partner profile for SFTP with key authentication in Enterprise Edition is now fixed. Previously if partner was changed to <None>, the key was removed from the partner profile.
  • The problem on Windows Server 2008 has been corrected. Previously the drop-down fields were too narrow to show the selected drop-down value.

Upgrade to Coviant Diplomat 7.3 now

To benefit from these enhancements and fixes, we would recommend you upgrade as soon as possible.

If you need any assistance with the transition to Coviant Diplomat 7.3, please contact the support team.


If you would like to find out about upgrading to Enterprise Edition, please contact our sales team.

Resources Available For You

Do you need a File Transfer solution?

Questions regarding need for File Transfer 

get-the-guide

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

get-the-guide

Compare the software on the market!

“Managed File Transfer Comparison guide”

get-the-guide

Where is your data going and why? Wizuda GDPR features

Where is your data going and why? Wizuda GDPR features

Are your impact assessments and reporting procedures in place for GDPR? Danielle Cussen from Wizuda examines these important requirements in her guest blog post, ‘Where is your data going and why?’ Danielle explains what you need to do to comply and how Wizuda GDPR features will simplify compliance. Danielle is Managing Director at Wizuda.

 

 

It’s rare that a day goes by without a mention of the GDPR. Businesses across the globe are striving to achieve compliance by 25 May 2018. That’s when it comes into full force, with no grace period. The GDPR applies to any business collecting or processing personal data belonging to EU citizens.

The UK’s ICO issued a 12 step guide to preparing for the GDPR. The first step is about being aware of the GDPR and its impact. The second is about finding out what personal data you hold, where it’s collected from and where it’s being sent.

As you can imagine, a lot of these questions are going to land on IT’s desk. IT will need to identify transfers between systems and between internal departments, plus transfers to external parties. This might include third party data processors, within the EU and across the globe. IT will need to work with other stakeholders across the business who understand the data and the reasons for the transfer.

Wizuda GDPR impact assessments

Under the GDPR it is now mandatary to conduct Data Protection Impact Assessments (DPIA) wherever there is a possible high risk (Article 35). If the risk level is unknown, doing an impact assessment is probably a good way to find out. Impact assessments will vary across organisations and departments but you’d expect to see certain questions where data transfer is concerned. These would relate to the sensitivity of the data, whether it’s being sent within or outside the European Economic Area (EEA), who will have access to it, and the risk category, among other factors.

Wizuda allows users to build their impact assessments within the software. Users complete a question set, which forms the impact assessment. The system then guides users through the transfer process based on the requirements they have set out. For example, if the user has specified that the data needs to be encrypted in transit, it will guide them towards using SFTP or HTTPS. The system also guides users through any approval process.

This feature helps users to check their transfers are aligned to the requirements specified in the impact assessment. The impact assessments themselves are readily available for reporting and auditing purposes.

Wizuda GDPR reporting

For the GDPR, reporting visibility is key to compliance. Article 5 (and many others) stress the need for “accountability” and “transparency” over all processing activities, not just cross-border transfers. IT need to be able to provide accurate details of the transfers in place at any given time. This is not just come 25 May 2018, but on an on-going basis. They may need to show all of the cross-border transfers outside of the EEA, with impact assessments showing the business reason and sign-off process. An automated process reduces this workload and provides process assurances.

A number of Wizuda features assist the user in accurate reporting of data transfers:

 

Wizuda’s Geographic Visual Maps show real live transfers that are in place across your organisation from one central hub. This view can be filtered by region, such as EEA, Non-EEA, BCR, Model Contracts and so forth.

 

 

 

 

Alternatively, Diagrams can be used to visualise the data flows across your network.


 

 

 

 

Both the Geographic Maps and Network Diagrams have full drilldown capability to view details of the files transferred, the full audit trail, authorisation workflows, and the corresponding impact assessments where applicable. This simplifies the path to demonstrating compliance.

There’s more information available on the Wizuda vendor page.

This is the first in a series of guest blog posts from the leading vendors, highlighting how a file transfer solution can add value to your organisation.

Related links

Are you reviewing your data transfer and file sharing processes and systems for GDPR compliance? Pro2col’s GDPR White Paper is an essential read for you.

Pro2col’s GDPR Advisory Service offers pre- and post-implementation planning options, depending on which stage your organisation is at.

Resources Available For You

Do you need a File Transfer solution?

Questions regarding need for File Transfer 

get-the-guide

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

get-the-guide

Compare the software on the market!

“Managed File Transfer Comparison guide”

get-the-guide

Managed File Transfer Comparison Guide

Managed File Transfer Comparison Guide 

[Updated – September 2017]

Our comparison guide is aimed at businesses of all shapes and sizes wanting to compare Managed File Transfer software. It answers the main questions we’re regularly asked about data transfer solutions and speeds up your selection process by allowing you to compare products side-by-side.

Unlike software vendors, who will obviously want to sell you their product, this guide gives an impartial comparison. That’s because Pro2col are independent experts in data transfer, able help you select and implement the best technology for your business requirements and budget.

Before downloading the guide though, you need to make sure you’re ready to compare solutions. To do this you must understand exactly what you and all your stakeholders within the business need, both now and in the future. Without this information you could source the wrong solution and that will cost you in the long run. If you need to do some more preparation, visit pro2col.com to access other free planning resources and find out about our needs analysis service.

If you’re confident that you’ve got all this information, then this comparison guide is for you. It’s an updated fourth edition and reviews ten instead of the original eight most cost effective, popular and features-rich products on the market. We’ve included a new section on compliance too, which is important to consider with General Data Protection Regulation (GDPR) around the corner.

It’s split into six sections:

  • Solution Basics answers the key questions that more or less everyone
    asks us, when looking for a data transfer solution.
  • Business Strategy prompts you to consider how your solution will be impacted by other policies within the business.
  • Technical Details looks at some of the key features of solutions at a more granular level.
  • Automation Options lists the most commonly required automation features; a key component of any Managed File Transfer solution.
  • Transfer Protocols reviews eleven of the most widely used file transfer delivery protocols.
  • Cloud Connectors lists eight of the most common cloud services that you’re likely to need to connect to.
  • Compliance lists common compliance standards, including GDPR.

Naturally this guide only includes so much detail, but it should give you a clear view of which features you need and which vendors are a good fit. If you have other questions then contact our team of pre-sales and technical consultants, who can provide product information, demonstrations and software evaluations.

If you find this comparison guide useful, then you’ll benefit from reading Pro2col’s other free resources, including hints on building a business case. You can access these from our website pro2col.com.

Resources Available For You

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

Includes;
Questionnaire to identify requirements
Analysis of results with a Pro2col expert
Recommended solution report
Up to one hour of consultation for Q&A

get-the-guide

Are you sharing data securely?

Are you sharing data securely?

Your employees need to share data between themselves to perform their roles effectively, but how do you ensure that this adheres to your organisations’ security policies? What can you do to control this and help them with sharing data securely?

With multiple employees now working from different sites or hot desking, it’s an area that can easily spiral out of control, so we have a possible solution for you to consider.

Let’s take a common example for many organisations. Employees often need to share data with external 3rd parties on an ad-hoc basis. For most of my time in IT, this has been done by sending an attachment in an email. Policies and procedures that users agree to upon employment and mail filter tools, such as Mimecast, would also be options that should be put into place to prevent data that needs to be secured being leaked via e-mail.

However, this doesn’t really address the issue. Sending files by e-mail invariably causes issues at the mail server stage, where space is generally a premium.  Mail sent to multiple recipients in the same organisation will result in numerous copies of the same file being stored, especially problematic when you consider that the majority of users don’t delete e-mails until their mailbox is full.  Additionally, resources on mail servers are often challenged just by handling e-mails with large attachments.  As a consequence, if a user runs into a block or needs a file which is going to be stopped by the mail server, then they may look for an alternative way such as a cloud based file sharing solution.

Several years ago, I was told by an IT manager of a large media company, that their organisation moved nearly a terabyte of data through file sharing services every month. They felt the cost of sharing the data by other means or the delays involved would actually harm the business. The problem was they had no control and didn’t know if the data was authorised to be shared or where the data was going.

Sharing data securely with Ad-Hoc module messaging via an MFT

Using an Ad-Hoc messaging module of a Managed File Transfer (MFT) solution would have allowed them to block sharing sites from all users, yet still allow users to share data in a controlled mannerAd-Hoc messaging (sometimes referred to as EFSS or Electronic File Sync & Share) allows clients to exchange e-mails containing hyperlinks to files, rather than the files themselves; these are stored in a web enabled file transfer server, which both the sender and recipient are granted access.  Although it is clearly desirable to remove the attachments passing through the mail server, it does highlight potential failings around the governance of the data entering or leaving the organisation, such as Data Loss Prevention (DLP) and virus-checking.

MFT solutions now integrate into Anti-Virus (AV) and DLP solutions using an ICAP (Internet content Adaption Protocol) connector. When a file is shared, the MFT solution passes the file and other metadata to the DLP solution using the ICAP protocol. Based on its content, the DLP server will then check if the file should be sent. If the file is allowed, then an “OK” message is sent to the MFT server and the ad-hoc notification message is sent. If the file is blocked by the DLP server, then the MFT gets a “not OK” message and the server does not send the notification mail. The file is then deleted so it is not cached. Incoming and outgoing files can also pass through an AV Scanner using a similar method to ensure that malicious code is not being shared.

When you installed MFT, ICAP may not have been included in your AV or DLP solution, but most now offer it, so it’s definitely worth reviewing your integration options.

ICAP is not a perfect solution and has some technical drawbacks. For example, most ICAP based solutions (and there are only a few) require that you provide the ICAP interface by way of a proxy, which will not necessarily interact well with every MFT solution – be sure to check which specific products are supported by your MFT system.  Another potential issue can be the length of time required to transfer large files to the ICAP server for inspection – in some cases this may result in a perceived lag during the sending of the Ad-Hoc message.  However, combined with the Ad-Hoc module of an MFT solution, it allows the control of data in and out of an organisation to meet IT security policies without restricting the end users from performing their duties.

If you would like to investigate whether an MFT solution would be right for your organisation, you can check out our Expert guide to MFT which includes some questionnaires to help you. Alternatively, If you’d like to discuss your options, feel free to give our team a call on 0333 123 1240.

Resources Available For You

Do you need a File Transfer solution?

Questions regarding need for File Transfer 

get-the-guide

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

get-the-guide

Compare the software on the market!

“Managed File Transfer Comparison guide”

get-the-guide

Password Security in Managed File Transfer

Password Security in Managed File Transfer

Last week was “World Password Day”, a day designed to get people thinking about password security and hopefully change their passwords. I was surprised to see an article from Sophos that the average person has 19 passwords to remember and almost a third struggle with strong passwords.  With the raft of work systems, private emails, social media, online shopping and banking passwords I thought it would be many more. I did a quick tally of my online passwords and worked out I have in excess of 30 passwords, although most of the private account passwords are variations on 4 main passwords.  I worked for one very large organisation who insisted passwords were changed every month but suggested that you simply add the month digit to the end of your password, negating the password security almost entirely.

The full article from Sophos can be found here.

Having strong passwords and authentication methods for file transfer accounts is very important. There are several approaches for user authentication that are supported by most Managed File Transfer (MFT) solutions.

These are

  • Application Controlled
  • External source (AD / LDAP / Other source)
  • Advanced Authentication using RADIUS or a One Time Password system
  • Private key authentication

With application controlled authentication, the MFT solution will control the length, complexity, password history and password expiry using internal systems. Usually users will be prompted to change their passwords either by getting an email, or when they login.

This works well but, for users inside the organisation, passwords can drift out of sync and this can lead to increased issues as users are asked to remember more and more passwords to access different systems. In this case, we usually recommend that the MFT solution uses the internal Active Directory or LDAP source. This allows the user to use the same credentials that they login to their computers with. Responsibility for changing the password then resides with the AD/LDAP system and the MFT solution will not normally track the passwords. When a user presents their credentials to login to the MFT solution, the system will pass the username and password to the AD/LDAP source for verification. If the AD/LDAP system confirms the credentials are correct the MFT solution lets the user in. As there is usually no caching of credentials, if a user changes their password on the AD/LDAP system then that password is reflected instantly in the MFT system.

Increasing the security of using AD/LDAP to authenticate user credentials, RADIUS solutions using time limited one-time password tokens or even SMS messages can be integrated to provide an extra level of security.

In RADIUS authentication, the user or device sends a request to the MFT system to gain access to a particular network resource, then the system passes a RADIUS Access Request message to the RADIUS server, requesting authorization to grant access via the RADIUS protocol. RADIUS servers vary, but most can look up client information in text files, LDAP servers, or databases. The RADIUS server can respond with an Access Reject, Access Challenge, or Access Accept. If the RADIUS server responds with an Access Challenge, additional information is requested from the user or device, such as a secondary password. Access Accept and Access Reject allow or reject the user access respectively.

Using AD/LDAP authentication or RADIUS authentication works well for users who are logging into the system interactively using either a web interface or file transfer client such as FileZilla, but do not work well for accounts which are used as a part of file transfer scripts.

The most popular method of securing these is to use “private key” or “key pair” authentication. With this the account does not use a defined password, but rather the MFT solution encrypts a token and sends that as a challenge to the client. This token is decrypted using the private half of the key at the client end and sent back unencrypted. If the tokens match the MFT solution accepts the user as verified and allows the account access. In this way any scripts which need to access the MFT solution do not need to have passwords encoded into them in raw text. Key pair authentication works with SSH keys for SFTP and SSL Certificates for FTPS and HTTPS connections.

With many more password breaches coming not from brute force attacks but from compromised authentication databases, experts are now advocating not making passwords longer or more complex but to implement Two Factor Authentication (2FA). This can be achieved using a combination of password and Private Key authentication or RADIUS in your MFT solution and works well for users and scripts.

Now maybe a good time to review your MFT password policies and maybe time I change some of my passwords too!!!

Resources Available For You

Do you need a File Transfer solution?

Questions regarding need for File Transfer 

get-the-guide

Find out your File Transfer requirements!

“Needs Analysis Service for File Transfer”

get-the-guide

Compare the software on the market!

“Managed File Transfer Comparison guide”

get-the-guide