Secure File Transfer

Protecting financial services industry data—from the inside

It’s often said that we are our own worst enemies. According to a Ponemon Institute report, employee or contractor negligence is the root cause of almost half of all data breaches. This is important to note in the financial services and insurancesector—where data breaches can be downright catastrophic. According to the report, the majority of [...]

Read the rest of this entry »

How File Transfer Solutions are Like a Car

In a way, finding the perfect file transfer solution is like finding the perfect car. Like a Lamborghini, some technology is just way out of your budget. Like a Hyundai, some solutions (like email, Dropbox and FTP) seem amazing because they’re super inexpensive. Then there is the reliable BMW, that’s safe, intelligent and full of [...]

Read the rest of this entry »

Email and Data Security — Not a match made in heaven

Alas, some things just aren’t meant to be—Ashton and Demi, Michael Bolton and long hair, dogs and cats, email and sensitive corporate information. Yet most people today use email to send anything without even thinking about data security. The problem is that even though email seems way more advanced than licking a stamp and dropping [...]

Read the rest of this entry »

Now’s the time to secure your data, reputation and brand

The most important asset your company has is information—often highly confidential or proprietary information about your customers, business partners, employees, intellectual property, and more. We’re talking about employee social security numbers, banking and accounting information, and proprietary product information. Here’s the thing. Eighty percent of that information is kept in files, not the ERP systems [...]

Read the rest of this entry »

Managed File Transfer is key for Governance and Compliance

It’s a given that Managed File Transfer (MFT) transfers files. But what exactly makes it stand out from other file transfer solutions? For one, MFT supports the highest levels of governance, compliance and security. That’s why a growing number of companies are turning to MFT. Businesses simply can’t afford to lose data these days, and [...]

Read the rest of this entry »

New Forrester report provides key insight into data security today

Security and risk professionals get it. CIOs get it. CEOs get it. The potential costs that a loss of data can cause are staggering. News reports every year remind us of the clear-cut financial and reputation damage that data loss has caused some organizations. So we know the dangers — but what can we do? [...]

Read the rest of this entry »

Does your SAP data need security from…you?

In a large organization, chances are there is more than one Rob Johnson, Bill Smith or Susan Hill working there. Whatever the case may be, sending files through SAP to the wrong Rob, Bill or Susan, is just one of the many ways data can get lost inside and outside a company. The fact of [...]

Read the rest of this entry »

New poll: Everyone’s data is 100 percent secure

It seems that every four years, we find ourselves searching for the truth a little more than usual. Well in honor of our upcoming election (no political affiliation required) here’s a little fact checking for you.  Our headline was 100 percent false. Sorry. In fact, only one in five organizations have the policies and tools [...]

Read the rest of this entry »

Two minutes can save time, money and secure your SAP data

Say what? We know how it goes. Whether you get chest pain, headaches, or are just plain tired, keeping an IT organization up and running smoothly is no small feat. There’s a lot of pressure in knowing you’re the backbone of the business. That’s why it’s always a pleasant surprise when a solution comes along [...]

Read the rest of this entry »

Securing Your Company’s Big Data

Along with Mobility and Cloud Computing, Big Data is one of the most important IT trends of 2012. In order to compete effectively, companies are evaluating the best way to work with and manage Big Data. How do you ensure that these huge files reach their location safely? Which transmission paths should be used? Many [...]

Read the rest of this entry »