0333 123 1240 info@pro2colgroup.com

Pro2col in Pink: Race for Life team

Pro2col in Pink: Race for Life team

Pro2col in pink

Three Pro2col ladies are doing the ‘Pretty Muddy’ Race for Life as team ‘Pro2col in Pink‘.

Lindsay, Michelle and Sally will get stuck into this muddy challenge on Saturday 15th June, raising money for Cancer Research UK. The route goes through Poole Park, Whitecliff Recreational Ground and Harbourside, with a variety of muddy obstacles along the way.

Pro2col MD James Lewis said: “The team are passionate about making a difference to our community and to society in general. So alongside of beach cleans and crisp packet recycling, most of the staff are undertaking different challenges in June to help raise money for charity. They are causes very close to their hearts and I’m really proud of their dedication.”

ABOUT RACE FOR LIFE

Cancer survival rates have doubled over the past 40 years. Consistent progress is being made but improvements to technology and ground-breaking work offer new opportunities to find different ways to prevent, diagnose and treat cancer and improve survival rates even further. Help Cancer Research UK improve results even faster.

1 in 2 people will be diagnosed with cancer in their lifetime. Every single pound you donate makes a difference to Cancer Research UK’s groundbreaking work, so please sponsor us now.

 

MEET THE TEAM

Pro2col in pink

Lindsay Lewis

Pro2col in pink

Michelle Grimaldi

Pro2col in pink

Sally Gates

Secure Mail

Secure Mail

It is very common for staff to share sensitive files via email, risking your organisations security and compliance. Or they need to share files which are too big to attach, so they resort to consumer-grade applications like Dropbox or WeTransfer.

GoAnywhere MFT provides a Secure Mail module, which addresses these challenges. It is a great way for businesses of any size to control and manage sensitive and valuable data exchanges via email to remote or third parties.

In a typical email setup, the servers do not encrypt the email attachment. The GoAnywhere Secure Mail solution allows email attachments to be encrypted and securely transferred. This feature can be accessed either via the Microsoft Outlook plugin or the GoAnywhere HTTPS web interface.

  

Microsoft Outlook plugin

When sending emails using the Outlook plugin, the attached file is not attached to the email itself. It is sent encrypted to the GoAnywhere MFT server and encrypted at rest on the storage. An encoded URL, which can also be password protected, is then embedded into the email body. The recipient can link directly to the stored file or files hosted on and controlled by the GoAnywhere MFT server.

 

GoAnywhere HTTPS client interface

The GoAnywhere HTTPS client interface provides an alternative method to send secure email attachments. The web portal provides a familiar and intuitive interface for users to control and manage this process.

The administration interface allows IT or delegated administrators to manage aspects of the Outlook plugin and secure mail features, giving them control over the size of files attached and enforced settings including: Security controls & protection levels for URL protection, password and certificate delivery.

Address rules allow you to lock down the email domains you can send to or receive from. This level of control is a great solution for business with known trading partners who need that additional level of security.

The Reporting feature provides visibility of activities, while Auditing and Package Manager allow administrators to control the package expiration and maximum downloads for file or files.

Would you like to see GoAnywhere or the Secure Mail module in action? Book a free demo or trial.

Did you find this useful?

Receive GoAnywhere tips and news in your inbox

GoAnywhere MFT
GoAnywhere MFT Top tips

Choosing the right Managed File Transfer protocol

What protocol should I useThis blog post answers your questions about Managed File Transfer protocols. Which are the most widely used file transfer delivery protocols? Which should you be using and how do you identify which solution uses which protocols?

A protocol is the set of rules that determines how files are transferred from one computer to another, through a network. That might be an internal network (from one computer to another within the same network) or more commonly a Wide Area Network such as the internet.

The nature of your data and its destination will determine the right protocol for the transfer. For example, personally identifiable data and credit card information will need a secure protocol.

BASIC PROTOCOLS

FTP
(File transfer protocol)

How can it be used?

Upload/download files
Rename and delete files
Create/delete folders
Execute custom commands on server
Check integrity of files

When can it not be used?

X Secure data at rest
X Secure data in transit (FTPS can)
X Work over just one firewall port
X Provide strong authentication

FTPS
(“FTP Secured” using SSL)

 Secure data in transit
Upload/download files
Rename and delete files
Create/delete folders
Execute custom commands on server
Check integrity of files
 Provide strong authentication

X Secure data at rest
X Work over just one firewall port

SFTP
(“Secure FTP” using SSH)

Secure data in transit
Upload/download files
Rename and delete files
Create/delete folders
 Provide strong authentication
Work over just one firewall port (22)

X Secure data at rest
X Check integrity of files
X Execute custom commands on server

SCP
(“Secure CoPy”)

Secure data in transit
Upload/download files
Work over just one firewall port (22)
 Provide strong authentication

X Rename and delete files
X Create/delete folders
X Check integrity of files
X Execute custom commands on server

ADVANCED PROTOCOLS

HTTP
(HyperText Transfer Protocol)

HTTP CAN ALWAYS
Download files
Work over one firewall port (80)

HTTP CAN SOMETIMES
Upload files
Rename and delete files
Create/delete folders
Execute custom commands on server
Check integrity of files

Secure data at rest
X Secure data in transit (HTTPS can)
X Provide strong authentication

HTTPS
(HTTP Secured with SSL)

HTTPS CAN ALWAYS
✓ Download files
✓ Work over one firewall port (443)
✓ Secure data in transit

HTTPS CAN SOMETIMES
– Upload files
– Rename and delete files
– Create/delete folders
– Execute custom commands on server
– Check integrity of files
Provide strong authentication

Secure data at rest

WebDav

WEBDAV CAN ALWAYS
Download/upload files
✓ Rename and delete files
✓ Create/delete folders
✓ Work over one firewall port (443)
✓ Secure data in transit

WEBDAV CAN SOMETIMES
 Provide strong authentication

Secure data at rest
X Execute custom commands on server
X Check integrity of files

EMAIL PROTOCOLS

SMTP
To send mail

Push files as attachments
✓ Be secured with SSL/TLS
✓ Often uses ports 25, 465 or 587

Pull files from other servers

POP3
To get mail

Pull files from servers as attachments
Delete original email from servers
Be secured with SSL/TLS
Often uses port 995

X Push files as attachments
X Synchronize email folder contents
X Not supported in all email environments
POP3 is becoming obsolete

IMAP
To get mail and sync mail folders

Pull files from servers as attachments
✓ Delete original email from servers
✓ Synchronize email folder contents
✓ Be secured with SSL/TLS
Often uses port 993

Push files as attachments
X Be trusted if its key mailbox is also accessed interactively

Which Managed File Transfer protocol?

Guidance on what constitutes a secure protocol will change, adapting to stay one step ahead of cybercrime. That’s why it’s important to choose a vendor that releases regular product updates. With Pro2col’s free Managed File Transfer comparison service, you submit your requirements via a questionnaire. Our experts compare them against the different solutions and recommend the right product for you. Our experts consistently review the marketplace and only select credible solutions from credible vendors, who provide excellent support and regular software updates.

Managed File Transfer Buyers Guide

Secure online forms and automation

Secure online forms and automation

Businesses need information from their internal users, external customers and suppliers all the time and it is highly likely this will include personal or sensitive data.

It is definitely not appropriate to ask users to share this information over email, but we know that is still common practice for many organisations. Email is not secure, so you risk a breach of the General Data Protection Regulation (GDPR), plus there is no guarantee of delivery. Email cannot support large files either.

Online forms provide a secure, customisable mechanism for your customers, suppliers and internal users to submit information to your business. It is a popular feature of Managed File Transfer systems and can capture any type of information or file size. Fields can also be configured to trigger onward business processes or integrate with internal systems.

To demonstrate the versatility and functionality of secure online forms with automation, let’s look at a use case from the motor insurance industry.

Use case: Motor insurance company

A customer is involved in a collision and needs to claim on their insurance. Using the secure online form, they enter the information required: Policy number, personal details, vehicle information, details of the collision and images of the damage.

Once the data has been received, a number of tasks need to happen to progress the claim.

This is where the technology really comes into its own. Automated actions sitting behind the secure online form, can execute many of these tasks and you can find out more in this video.

Examples of automated workflows

Once the user submits the form, it can trigger a range of automated workflows, such as:

  • Check the policy number meets alphanumeric sequence
  • Validate customer name against policy number
  • Assign claim to a claims handler
  • Automatically input the description directly into the customer database
  • Rename images to a pre-determined format, eg: policynumber_date
  • Move images to the image server
  • Send an automated reply via email or SMS or other business communication platform. The template can be personalised to include the name, assigned claims handler, policy number etc.

All of these processes can take place without any human intervention, demonstrating just how more efficient these labour-intensive tasks can become. You can see how this would suit other industries, such as mortgage brokers, doctors and private healthcare providers, or any outsourced business service, such as HR or payroll.

These are fairly simple use-cases, but there’s no end to the automation capabilities that can be applied. We recently customised secure online forms for a company sequencing hundreds of thousands of anonymised records of biological data. Customised logic built around metadata in mandatory fields in the form triggered the next step in the process.

Can you see how your organisation could benefit from adding secure online forms to your infrastructure? Get in touch for a chat now. Alternatively, complete our Managed File Transfer (MFT) comparison; answer a series of questions about this and other business requirements and our technical experts will recommend the best solution to suit your needs.

Interested in a file transfer solution?

Improve security and efficiency for your clients with online forms and automated workflows

Improve security and efficiency for your clients with online forms and automated workflows

Businesses need information from their internal users, external customers and suppliers all the time and it is highly likely this will include personal or sensitive data.

It is definitely not appropriate to ask users to share this information over email, but we know that is still common practice for many organisations. Email is not secure, so you risk a breach of the General Data Protection Regulation (GDPR), plus there is no guarantee of delivery. Email cannot support large files either.

Online forms provide a secure, customisable mechanism for your customers, suppliers and internal users to submit information to your business. It is a popular feature of Managed File Transfer systems and can capture any type of information or file size. Fields can also be configured to trigger onward business processes or integrate with internal systems.

To demonstrate the versatility and functionality of secure online forms with automation, let’s look at a use case from the motor insurance industry.

 

Use case: Motor insurance company

A customer is involved in a collision and needs to claim on their insurance. Using the secure online form, they enter the information required: Policy number, personal details, vehicle information, details of the collision and images of the damage.

Once the data has been received, a number of tasks need to happen to progress the claim.

This is where the technology really comes into its own. Automated actions sitting behind the secure online form, can execute many of these tasks and you can find out more in this video.

Examples of automated workflows

Once the user submits the form, it can trigger a range of automated workflows, such as:

  • Check the policy number meets alphanumeric sequence
  • Validate customer name against policy number
  • Assign claim to a claims handler
  • Automatically input the description directly into the customer database
  • Rename images to a pre-determined format, eg: policynumber_date
  • Move images to the image server
  • Send an automated reply via email or SMS or other business communication platform. The template can be personalised to include the name, assigned claims handler, policy number etc.

 

All of these processes can take place without any human intervention, demonstrating just how more efficient these labour-intensive tasks can become. You can see how this would suit other industries, such as mortgage brokers, doctors and private healthcare providers, or any outsourced business service, such as HR or payroll.

These are fairly simple use-cases, but there’s no end to the automation capabilities that can be applied. We recently customised secure online forms for a company sequencing hundreds of thousands of anonymised records of biological data. Customised logic built around metadata in mandatory fields in the form triggered the next step in the process.

If you have clients who would benefit from secure online forms with automation, or you would like to add this technology to your product portfolio, get in touch for an informal chat. Just complete our Partnering with Pro2col form.

Do you have a client needing secure online forms right now?
Or would you like to add this technology to your product portfolio?
Work with Pro2col and make big margins on products you wouldn’t ordinarily sell.

Case study: Cambridgeshire County Council

Case study: Cambridgeshire County Council

Managed File Transfer implemented for fast, secure, simple, audited transfers of confidential data files

Managed File Transfer implemented for fast, secure, simple, audited transfers of confidential data files

Cambridgeshire County Council is the UK local government authority responsible for 60 electoral divisions in the county. It is made up of five districts with 69 elected councillors. The council works in partnership with other public services in the area – including the police and NHS – and is connected with other regional councils.

The challenge

Before implementing a Managed File Transfer solution, council staff transferred data between departments and other government services via the Government Connect Gateway or a generic FTP solution. Many found it ‘clunky’, inefficient and awkward to use. And there was no way of sharing sensitive information with other third parties – such as medical, social care or child care data with the emergency services or housing associations. This was a regular requirement, so staff resorted to the complicated, time consuming and costly task of sending 10GB on encrypted CDs via courier services. There were also additional concerns about control, efficiency and security.

Alan Shields is the IT architect team manager within Cambridgeshire County Council. His job is to identify business challenges and new products that can solve them efficiently and effectively. His team of eight specialists looks after as many as 200 sites across the council’s shared service network.

“Awareness of security has increased significantly, and we always have to consider best practices, educating users, and our shared responsibility for maintaining the privacy of the data we handle. We could be sharing information about an elderly member of the community’s care package, or perhaps a child’s education record. We handle varied but equally confidential information that always demands our close attention to privacy and security over and above any standard email protection precautions.” said Shields.

The vision

For Cambridgeshire County Council data protection is always paramount, but speed, flexibility, ease-of-use and value were also pressing concerns. Losing public trust or incurring fines from the Information Commissioner’s Office by not implementing the best possible solution was out of the question.

Local authorities are used to dealing with a range of private data, including commercially sensitive information (from large suppliers) and citizen’s personally identifiable information (such as health and social care details or child care records). With third parties playing an increasingly important role in how local governments deliver services, there is a pressing need to ensure the complete privacy of information that should never enter the public domain.

The pressures of the public sector are well understood – limited budgets, strained resources and a necessity to provide the value of any significant investment. Regardless, Cambridgeshire needed to install the high-level of control expected by central government, while equipping users with the necessary tools to mitigate risks of data leaks without hampering productivity.

They needed a system they could trust, that users would be keen to adopt, and which would give us the confidence to transfer large files or sensitive data quickly, easily and in a total secure and traceable manner.

KEY CHALLENGES

  • Securing file transfer of sensitive or confidential information
  • Connecting with a multitude of systems, servers, and clients used by partners
  • Ensuring visibility and control over file transfers
  • Meeting regulatory guidelines

——————————–

SOLUTION

  • MFT solution with user friendly web interface
  • Ad hoc for secure, efficient email attachments

——————————–

RESULTS

 

  • MFT operates as a secure, reliable hub for transferring sensitive data files
  • Over 4,000 users able to securely send files with complete audit trails
  • Broad protocol support allows regulatory guidelines to be easily met

The solution

​Pro2col Managed File Transfer experts thoroughly scoped Cambridgeshire County Council’s requirements, and set up evaluations for a number of software applications. The council settled on a solution that delivered functionality and ease-of-use, required limited training for users and would integrate simply with existing infrastructure, such as Microsoft Outlook.

Pro2col worked with the council to implement the system, getting it up and running in just a couple of days. This included hooking the solution up seamlessly with Microsoft Active Directory and staying on hand to answer any questions along the way. The MFT solution now allows the council to reliably and securely share files and transfer sensitive data across the region. With a breadth of security protocols, including HTTPS, FTPS, SFTP and AS2, it is trusted by other UK public sector organisations.  The clean look and feel of the web interface proved simple for users to grasp quickly with no training.

Shields said, “It’s easy to underestimate the value of the lack of user training required. We didn’t have to write up a great deal of information to help users to understand the new system, and there was no need for extensive training sessions. They just picked it up and ran with it, because it’s very intuitive.”

Cambridgeshire uses the solution in three ways:

  • To transfer information to third-parties that it cannot securely connect to using existing government gateways. This might be a report concerning a member of the public, or a contractual negotiation with a supplier.
  • Secondly, the solution can be used by anyone wishing to send information to the council. Similar to a self-addressed envelope, a council employee can simply send an empty package to the third party, in which they can place their documentation before pushing it back securely.
  • Finally, because users often prefer MFT to email, it is used for the simple and rapid transfer of very large or numerous files to suppliers.

“The support provided by Pro2col has been first class and has included proactive offerings, such as performing system health checks and publishing product roadmaps. As a result, these products have become key and indispensable parts of our infrastructure.”

Alan Shields
Chief Architect
LGSS IT, Cambridgeshire County Council


 

The future

The MFT solution now operates as a reliable and secure hub, responsible for the transfer of the council’s sensitive data files. With its broad protocol support, the MFT server connects with any system, server or client. Technical teams have the visibility and control they need to confidently meet compliance requirement and public responsibilities, and it is a simple tool for users to get to grips with.

The council now has up to 4000 users who are able to send more data more securely. That includes large files that would ordinarily be blocked by the average email system. And there is a complete audit trail of everything.  This has successfully replaced the lengthy and expensive combination of couriers and encrypted CDs.

Shields and his team are now looking at further automation, as well as mobile file transfers from Android and iOS devices. They are also discussing file sharing practices with Northampton County Council, as well as expanding the shared network of district councils and emergency services. In the future the council hopes to investigate multi-tenancy for shared partnerships, and perhaps even individual branding for each stakeholder portal.

Shields added: “The solution offers all the flexibility we need, it’s just a matter of exploiting the right features at the right time for the council. In terms of success of the project, we know our users and partners are very happy with it. We have successfully changed our file transfer methods with minimal disruption, we have very robust measures in place to prevent leaked data, and we’ve exceeded all of our objectives for the project. The solution does what we wanted it to do and it does it simply, quickly and affordably – that’s like gold dust in the public sector”.

Pro2col can advise you through the different stages of your file transfer and integration project to make sure it’s a success. Whether that’s scoping your requirements, product demos and proof of concept / evaluation, negotiating the best deal with vendors or installations and training, call 0333 123 1240 or complete the online contact form.

Managed File Transfer Buyers Guide