Digital transformation? Start by consolidating your data transfers

Digital transformation? Start by consolidating your data transfers

Starting your digital transformation is a daunting prospect. It is no secret that success is hard to achieve; researchers at the likes of MIT have proved it! Yet there is a simple starting point, which will get your project off on the right track. We recommend reviewing your data transfer processes and systems first. They tend to underpin most – if not all – of your operational processes, so you will quickly see opportunities to consolidate systems, whilst getting a great overview of what is in scope.

Your review should include, but not be limited to, the following:

  • Existing FTP / SFTP servers;
  • Managed File Transfer solution;
  • Home grown solutions, particularly unmanaged scripts;
  • Ad hoc employee file sharing.

If you already have an MFT solution, we almost guarantee you will spot opportunities to consolidate many of these disparate systems and processes. And if you don’t have one, you will quickly start to see the benefit. There’s the immediate cost savings, plus many more opportunities for efficiencies in the long run. You will also benefit from increased security and visibility, with MFT providing a ‘single pane of glass’ view across all your incoming and outgoing file transfers, plus integration with other security tools such as AV and DLP.

MFT’s data integration capabilities allow you to extend the life of legacy systems, whilst integrating with new cloud-based applications. You keep your options open for future expansion, whilst facilitating the immediate benefits of digital transformation.

Here are the five top ways this technology will drive your digital transformation:

  • Empower employees with an accessible working environment;
  • Gain visibility of all data within and beyond the organisation, enabling data-driven decision making and easier governance;
  • Digitise your processes, including system-to-system, system-to-person, person-to-system and between people. This frees up time for employees to spend on value-add or mission critical work, whilst improving security;
  • You can select the best possible technology for each requirement then integrate between systems using APIs, rather than compromising on a product because it offers the out-of-the-box connectivity you need. You can also easily integrate new technologies as they become available;
  • Capitalise on the benefits of a cloud-based infrastructure, moving files to and from the cloud securely and integrating with applications to deliver onward business processes.

More on MFT and Digital Transformation

You can find out more about this technology in our White Paper, Enablers of Digital Transformation: MFT & Data Integration. You will get a clear understanding of the role Managed File Transfer plays in delivering all aspects of your data strategy, improving operational processes and security by integrating business applications.

Need further expertise? Download our FREE resources

Will ADLP improve the security of my file transfers?

Will ADLP improve the security of my file transfers?

Is it possible to stop users from accidentally leaking personal or sensitive information, or to prevent malware being sent from a trusted partner, without completely disrupting the business processes?

Adaptive Data Loss Prevention (ADLP) adds an additional layer of security to your MFT solution, detecting sensitive data, then carrying out a range of complex onward actions.

“ADLP can detect and modify the data, rather than just blocking the whole file,” explained Clearswift’s Pre-Sales Engineer Steve Jeffery, whose product integrates with Managed File Transfer solutions to scan data entering or leaving the business in automated workflows and ad hoc person-to-person file sharing.

“The Clearswift SECURE ICAP Gateway (SIG) integrates with the MFT ICAP interface to enable the content inspection. This detects certain data from key words or patterns – such as credit card numbers, personally identifiable data, healthcare details, or a more complex examination for Intellectual Property. The results of the inspection are then passed back to the MFT workflow, which will determine what happens next.”

Steve Jeffery, Pre-Sales Engineer at Clearswift

Onward actions might include:

  • Returning the file to the original sender;
  • Quarantining the file and sending an email alert so it can be manually reviewed;
  • Redacting data, eg: replacing digits in credit card data with XXXX.

““It works in reverse too for unwanted data acquisition,” explained Steve. “We worked with a hotel to reject incoming credit card data, which customers sometimes emailed in. The technology detected the data, returned it with the data redacted, and directed the customer to a secure payment portal.”

Some other use cases include:

  • Removing metadata in a document history. This is particularly useful for ad hoc person-to-person transfers, where a document has been updated multiple times. An updated proposal for a new customer, for example, may still contain data relating to a previous customer in the document history;
  • The anti-malware component will remove macros in a document, which can contain malicious code.

Integrating your MFT with Adaptive Data Loss Prevention technology will secure the entire flow of data in and out of your business. It does this without halting business operations when something is detected. It supports compliance with the GDPR and other requirements.

Not all MFT products support this integration. If you would like to discuss whether yours does, please get in touch. You can contact us via the web form, or call 0333 123 1240.

Need further expertise? Download our FREE resources

Supply chain disaster: Do you need an MFT dev environment?

The reasons why you need an MFT dev environment

MFT dev environment - lorries in supply chain disaster

 

In all the years we’ve been working in file transfer, there have been a few occasions when we’ve witnessed the financial impact and reputation damage a system failure can have. This article looks at:

 

  • Why you should think twice before testing in a live environment;
  • When you need to consider a development (dev) environment for your Managed File Transfer (MFT) solution;
  • Details of the six stages for testing and development.

“A few years ago, one organisation was developing workflows in a live environment, and broke other automated processes. The system was down for just a few hours, but the impact was huge. This business supplied products to retailers across the country, but were unable to access the order information. The lorries couldn’t leave the factory and delivery drivers had to be paid overtime. Worse still, the retailers were left out of stock, consumers bought other brands and some ended up staying with that brand. The impact on the business’ finances and reputation were catastrophic.”

 

Richard Auger, Pro2col technical consultant

This particular example could have been prevented if the IT team were developing in a test environment, instead of a live environment. But so many organisations only have a live MFT production licence. That might be to save money, or because decision makers just don’t think a file transfer server needs a test licence. But we know an MFT system is doing so much more than transferring files, so if you have any workflows involved, you need to reconsider.

Is a dev environment business critical?

This will depend on the value of the data your system is handling. Is it critical to business processes? Do you risk breaching service level agreements (SLAs)? Or will you simply not be able to operate, like the example above? While you may be able to send files by some other method for a few hours, it isn’t viable for a sustained period.

You also need a change control policy to meet ISO27001 requirements. While it is down to you to determine the right policy for your unique set of circumstances, example ISO best practice advocates testing in an isolated, controlled and representative environment. Similarly ITIL requires an organisation to follow both ‘change management’ and ‘release and deployment management’ processes from non-production to production systems. It’s an old IT joke that in weaker, less secure environments TIP doesn’t mean ‘Transfer into Production’ – it ends up being ‘Test in Production’ instead.

So to avoid disrupting your system when deploying new releases, building workflows or making other changes, you should follow these six stages for testing, developing and transfer into production:

  1. Sandbox, or experimental environment: This is a local environment no one else can access, where the developer has a working copy of the code. Here they can try it out and change it without putting it live. This environment will typically be an individual developer’s workstation. Once they are happy with it the developer would submit the code to the repository for the next stage of development. Most MFT solutions by default don’t have a sandbox but you can sometimes set it up by installing the software onto a private virtual machine.
  2. Development or integration environment: This is a clean environment where you test how your code is interacting with all the other bits of code associated with the system. The code itself doesn’t get changed in this environment – updates are made to the working copy back in the sandbox and resubmitted. When ready, the developer accepts the code and it is moved to the test environment.
  3. Testing: This is the environment to test the new or changed code, either manually or using automated techniques. You may have different test environments to focus on different types of testing. The developer looks at how it interacts with and impacts other systems and tests performance and availability. If you are upgrading, for example, this will show how your system will behave once the upgrade is in place. From here, the code can be promoted to the next deployment environment.
  4. User acceptance testing (UAT) or quality assurance (QA): In this stage users will trial the software, making sure it can deliver against requirements. Stress testing is also carried out in this stage.
  5. Pre-production, or staging environment: This final stage tests in conjunction with all the other applications in the infrastructure. The aim here is to test all installation, configuration and migration scripts and procedures. For example, load testing happens here. It’s really important that this environment is completely identical to the production (live) environment. All systems should, for example, be the same version.
  6. Production or live environment: Transfer into production – or TIP – is the final stage, bringing the updates live. This is the environment that users actually interact with. This can be done by deploying new code and overwriting the old code, or by deploying a configuration change. Some organisations choose to deploy in phases, in case of any last minute problems.

If you follow these steps you can be confident that any upgrades to the production environment will be completed reliably and efficiently. But if your budget or internal policy won’t allow you to invest in all of these, we would recommend at least a test environment, which should be an exact copy of the production environment.

All our vendors offer test licences at reduced rates. If it’s time to get this set up for your MFT solution, get in touch now. You can contact us via the website or by emailing your account manager.

Interested in a file transfer solution?

Secure online forms and automation

Secure online forms and automation

Businesses need information from their internal users, external customers and suppliers all the time and it is highly likely this will include personal or sensitive data.

It is definitely not appropriate to ask users to share this information over email, but we know that is still common practice for many organisations. Email is not secure, so you risk a breach of the General Data Protection Regulation (GDPR), plus there is no guarantee of delivery. Email cannot support large files either.

Online forms provide a secure, customisable mechanism for your customers, suppliers and internal users to submit information to your business. It is a popular feature of Managed File Transfer systems and can capture any type of information or file size. Fields can also be configured to trigger onward business processes or integrate with internal systems.

To demonstrate the versatility and functionality of secure online forms with automation, let’s look at a use case from the motor insurance industry.

Use case: Motor insurance company

A customer is involved in a collision and needs to claim on their insurance. Using the secure online form, they enter the information required: Policy number, personal details, vehicle information, details of the collision and images of the damage.

Once the data has been received, a number of tasks need to happen to progress the claim.

This is where the technology really comes into its own. Automated actions sitting behind the secure online form, can execute many of these tasks and you can find out more in this video.

Examples of automated workflows

Once the user submits the form, it can trigger a range of automated workflows, such as:

  • Check the policy number meets alphanumeric sequence
  • Validate customer name against policy number
  • Assign claim to a claims handler
  • Automatically input the description directly into the customer database
  • Rename images to a pre-determined format, eg: policynumber_date
  • Move images to the image server
  • Send an automated reply via email or SMS or other business communication platform. The template can be personalised to include the name, assigned claims handler, policy number etc.

All of these processes can take place without any human intervention, demonstrating just how more efficient these labour-intensive tasks can become. You can see how this would suit other industries, such as mortgage brokers, doctors and private healthcare providers, or any outsourced business service, such as HR or payroll.

These are fairly simple use-cases, but there’s no end to the automation capabilities that can be applied. We recently customised secure online forms for a company sequencing hundreds of thousands of anonymised records of biological data. Customised logic built around metadata in mandatory fields in the form triggered the next step in the process.

Can you see how your organisation could benefit from adding secure online forms to your infrastructure? Get in touch for a chat now. Alternatively, complete our Managed File Transfer (MFT) comparison; answer a series of questions about this and other business requirements and our technical experts will recommend the best solution to suit your needs.

Interested in a file transfer solution?

The World Cup 2018: A file transfer use case

A file transfer use case: The World Cup 2018 has many ways MFT can be used

Are you missing the World Cup already? It’s been an exciting few weeks of football!

As the novelty of England’s best performance in years wears off, we turned our attention to the IT infrastructure that underpins a tournament of this scale. It’s actually a really good example of the many ways data is sent, received and processed, and the types of technology that enable this to be done quickly and securely.

This article looks behind the scenes at this file transfer use case, which translates across many different industries.

High definition broadcast

Firstly and most importantly is the high definition broadcast that sports fans have come to expect. Streaming the World Cup involves data sets measuring in tens of terabytes or even in petabytes, and it needs to be moved quickly with perfect quality maintained.

The broadcasters would use a fast file transfer solution combining UDP and TCP technology across high bandwidth networks.

Traditional UDP transfers move big datasets much more quickly than TCP, regardless of size, distance or network conditions. That’s because it continually sends data packets without waiting to see if they are received successfully. In this case, the usual UDP trade-offs (slight distortion, or frames freezing) are offset by the TCP protocol, which ensures any lost packets are resent. An agent at the receiving station reconstructs the data after the transfer.

The result? The viewer sees every kick, goal and penalty in real-time high definition.

 

Sharing sensitive documents securely

During the World Cup or other football tournaments, sensitive data is continually shared between managers, medics, FIFA and other parties. It might be personal information about players, which needs to comply with data protection legislation like the GDPR, or sensitive data critical to a team maintaining a competitive edge. Some examples include:

  • Player details are sent to their training camp with medical and dietary requirements;
  • Medics sharing injury information and treatment plans back to the player’s home club;
  • Referees sharing match reports with the officiating body;
  • In the run up to the tournament, scout reports are shared across the globe, providing valuable insights into the competition;
  • New contracts in the aftermath of a big tournament are uploaded to web portals.

A secure file sharing solution would typically have a set of features to protect the data from hackers and malware: Secure protocols (SFTP, FTPS or HTTPS); Encryption (PGP or AES); Access control with the ability to restrict user permissions; User authentication; Secure data wiping; Administrator view; Audits and reports to show what was transferred, when and how.

 

Of course, these examples aren’t exclusive to the World Cup. The chances are that you face similar challenges in your organisation. Maybe that’s live streaming events or simply sharing employee data.

There are many reasons why a business might decide to implement a file transfer solution. If this has got you thinking about your system, our free resource – Does your organisation require a file transfer solution? – will help.

Inside you’ll find a questionnaire to record your responses to some typical file transfer challenges. There’s information on how a system can resolve these, plus recommended next steps for your project.

Does your organisation need a file transfer solution?
Download our free resource now.

Interested in a file transfer solution?

Upgrade to Diplomat Managed File Transfer v 8.0

Upgrade to Diplomat Managed File Transfer v 8.0


Coviant have released Diplomat Managed File Transfer v8.0. We’d recommend you upgrade as soon as possible to take advantage of the new features and fixes, which include:

Support for Windows Server 2016

  • When using search/move features for keys, partners or transactions, leaving the ‘containing phrase’ field blank displays an unfiltered list of objects. Enter ‘Accelerate’ into the ‘containing phrase’ field when All Fields is selected to identify any SFTP partners that have ‘Accelerate transfers’ selected.
  • Added Reset with accelerator CTRL-R to the top level menus for Public Keys, Key Pairs, SSL Certificates, Partners (Enterprise only) and Transactions.
  • Added accelerators for the Search/Move items of Partners (Enterprise only) and Transactions – CTRL-P and CTRL-T.
  • Added ability to add Integrity Protected Packets to PGP-encrypted files.

Standard and Enterprise only

  • Added initialisation error messages to server startup email going to IT Support email addresses.

Enterprise only

  • If in use, the SQL audit database is updated to add multiple columns to the JOB_AUDIT and JOB_AUDIT_ARCHIVE tables the first time the Diplomat Service is started after an upgrade to v8.0. No data conversion is done, but the SQL audit database can no longer be used by earlier versions of Diplomat MFT.
  • Added fields for API and FILE_MONITORING to SQL audit database to indicate how jobs were initiated.
  • Added ability to zip source files before transferring and unzip destination files after transferring.
  • Added support for shared folders in Citrix Sharefile partner profiles.
  • Added ability to start Diplomat Service in ‘safe startup mode’ with all transactions suspended. Right-click on the Transactions folder to unsuspend any transactions that were not suspended before the Diplomat Service restart.

Fixes

  • Changed scheduling so that previously defined ‘excluded days’ are not considered when the Recurrence Type is Weekly.
  • Corrected scheduling error that occurred when scheduling window spanned midnight. Jobs do not stop at midnight, but now run until the end of the scheduling window.
  • Fixed error in getting correct file modified date when using subfolders in the source file name field.
  • Ensure that SMB partner profiles that are defined with a non-blank Directory field can successfully overwrite destination files.
  • Corrected problem where attempts to create new sub-folders on FTP, FTPS and SFTP destinations were not occurring.
  • Corrected a problem where a Run Now dialog would not display the summary information at the end of the job if the associated transaction was saved while the job was running.
  • Corrected problem where a second job based on a transaction could start while an earlier job based on the transaction was still running.
  • If a left-nav item is selected and the user scrolls it so that it is not visible, the left nav will not scroll back to the selected left-nav item when the display refreshes.

You can download the installation files and related documentation at http://www.coviantsoftware.com/partner-portal.php. You will need your Coviant support username and password.

If have a maintenance contract and experience any difficulties upgrading, please submit a support ticket and one of our technical consultants will be in touch.

Interested in a file transfer solution?