Managed File Transfer – Remote Access Removed or Remote File Termination?
Managed file transfer solutions are the ideal technology to share files securely with remote trading partners and customers. This is what they were designed to do and in the most part, they all provide a simple interface to achieve this. Some provide a web browser facility, whilst others offer additional plugins such as a Microsoft Outlook Plugin or less conventionally, a Lotus Notes Plugin. However the one common way in which the majority of these technologies work is for the file to remain on a web server, to be collected by the intended recipient. This then provides the system with an audit trail of when the file was downloaded and in most cases, to which IP address – confirming the users location.
This is great in most instances but imagine a situation where you’ve sent an email using the plugin within your email client of choice, only to later find that you’ve attached the wrong document. Worse than that, it contains sensitive customer or financial data – what then? You make a frantic call to your IT Help Desk asking them to delete the file or remove access to it. You then get confirmation from the kind Support Desk person to say that they’ve action your request. Great, you’re in the clear…. but upon returning to your email you see that your customer has already downloaded the file and you have the email notification to prove it. Where you usually greet the notification with a shrug of the shoulders in the knowledge that the managed file transfer solution has once again done its job, this time it leaves you cold!
Fortunately not all managed file transfer solutions are built the same. Some have DLP capabilities ensuring that sensitive data is quarantined whilst one vendor we work with provides a very unique capability, remote file termination. How is this done I hear you ask, well give us a call and we’ll tell you! Suffice to say, this type of technology provides the highest levels of security available therefore isn’t pitched at your general ad hoc file transfer users. It’s more appropriate for those companies dealing with extremely sensitive data, e.g. data needing to be exchanged between board members, patent information, IPO, MBO, acquisitions and mergers information and so on.
If your business has a requirement to move data in a more secure manner than your existing file transfer technology allows, speak to Pro2col as we’ve got technologies that can handle the most sensitive of data.