Filter by Category

What to Consider When Evaluating Managed File Transfer Solutions

Before looking for a managed file transfer solution, it's important to determine how data is currently being transferred from your organization. You should find out what users and applications are performing the data transfers, where the source of the data resides, how sensitive the data is, how the data is formatted for the partners and what GoAnywhere Managed File Transferprotocols are used to transmit the information. If the files are encrypted or compressed before transmission, find out what tools and standards are being utilized.

After you've done your in-house analysis, start a search for a secure file transfer solution that best fits your needs. Listed below are 10 of the top managed file transfer considerations organizations review when planning their purchase.

  1. Platform Openness: To reduce the points of connection to sensitive data and reduce the risk of exposure to those without a need-to-know, the solution should be installed on the server operating system where the sensitive data and applications reside. If your corporate data mostly resides on the IBM i, then it would make sense to get a MFT solution that runs on the IBM i.
  2. Authorization Controls: To meet many compliance regulations, the MFT solution should provide role based access to limit user access to certain servers or key functions based on user credentials.
  3. Secure FTP: Plain FTP is not secure. The solution should support both SFTP (FTP over SSH) and FTPS (FTP over SSL) protocols for secure FTP transfers.
  4. Encryption Standards: At minimum, the solution should support the industry standard encryption standards: AES, Open PGP, AS2, SSH, SSL, TLS, and S/MIME.
  5. Database Integration: The solution readily connects to DB2, SQL Server, Oracle, MySQL, and other popular database servers for extracting and inserting data.
  6. Data Transformation: The solution gives you the ability to translate data between popular data formats, including XML, CSV, Excel, and fixed-width text.
  7. Data Compression: The solution compresses and packages data using popular standards such as ZIP, GZIP, and TAR to reduce transmission times.
  8. Application Integration: The solution provides commands and APIs for interfacing with your applications.
  9. Scheduling: The solution allows transfers and other key functions or workflows to be scheduled for future dates and times.
  10. Key Management: The solution includes management tools for creating, importing, and exporting keys and certificates.

What else should you look for when buying an MFT solution?

We've got you covered. Use this guide to discover the benefit of MFT, explore its key feature and industry considerations, understand what to ask during the evaluation process, and much more.

Get the Buyer's Guide

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


What’s the Difference Between GoAnywhere 6.0 and 6.1?

May 20, 2019

We’re excited to share that GoAnywhere 6.1 is now available for download! The newest version of our managed file transfer solution includes over 30 new features, such as X12 data…


How to Encrypt Files in Linux

May 16, 2019

If your organization uses Linux operating systems to run key business processes, it’s important to implement tried-and-tested Linux security practices that support critical files as they…


Everything You Need to Know about FTP Automation Software

May 9, 2019

So, you want to automate your FTP file transfers. Whether you send a dozen file transfers a week, hundreds a day, or even more, automation is a smart step for most businesses. The benefits are…


15 Ways to Avoid Document Chaos with Secure Forms

May 9, 2019

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like…


How to Prevent Data Breaches with MFT | Checklist and Plan

May 2, 2019

You know what a data breach looks like in the movies. A character’s computer is suddenly overtaken by lines of green code. Windows and browsers pop up at lightening speed, as if the PC itself…