Business Integration

Calculate your real world FTP costs

For more than 40 years File Transfer Protocol (FTP) has been the mainstay of file transfer management solutions. If it was a married couple we’d be patting it on the back for hanging in there—but it’s not. It’s a 40-year-old file transfer solution that is probably costing a whole lot more than you think.

In fact, some estimates pinpoint the cost of operating 100 FTP servers at right around $1 million. When you consider the fact FTP is not secure and simply not equipped to handle large volumes of mission-critical file transfers, nothing adds up other than the cost of running it.

Use the chart below to estimate what FTP is really costing your business. Don’t forget to include indirect costs (personnel, tech support, etc.) in your final calculation. Then read the TCO of FTP: Hidden Costs of Free File Sharing white paper to learn more about the FTP problem and its solution.

ftp costs chart

For more information, visit our Managed File Transfer resource center: www.seeburgermft.com

Financial services firms, banks and cultural change

fsi-calcLast year’s Barclay Bank Libor-rigging scandal was likely caused by cultural problems following a speedy expansion, according to a recent BBC News article. A study found the financial services firm’s strong culture of winning, siloed departments with different values, and lack of emphasis on customer and client needs led to the breakdown.

The simple fact is that we live in a changing world. The Darwinian theory of having to change in order to survive continues to ring true.  Banks and financial services firms have learned this lesson the hard way—through fines, reputational damage and in some cases, having to close their doors.

This pandemic of high-risk attitudes towards winning at the expense of customers has to be cured. In the case of Barclay’s, the answer to restoring the bank’s reputation lays in comprehensive change, according to the news article.

So how can banks make these much-needed changes? The answer exists in two parts.

  1. Ethics must change throughout the financial services industry, with everyone from the highest C-level executives, to IT help desk technicians ensuring they do. Responsible, transparent behavior needs to be the order of the day. This is by no means going to take place overnight; it will be part of an ongoing journey that all employees must undertake.
  2. Part of the answer lays in flexible, adaptable and manageable financial services IT solutions that provide the governance, monitoring and reporting capabilities needed from top to bottom. To do this properly, banks need to invest in deploying rules-based technology that can provide the deliverables sought.

Ultimately, good ethics or IT capabilities can’t deliver the sweeping sea of change needed in the financial services industry alone. They must be put into place together. The top-down instilment of ethical behavior must be supported by the thorough governance, monitoring and reporting capability of sound financial services IT solutions. The twain will simply have to meet.

Managed File Transfer is key for Governance and Compliance

Imanaged_file_transfert’s a given that Managed File Transfer (MFT) transfers files. But what exactly makes it stand out from other file transfer solutions? For one, MFT supports the highest levels of governance, compliance and security. That’s why a growing number of companies are turning to MFT. Businesses simply can’t afford to lose data these days, and MFT ensures data gets into the right hands—and stays out of the wrong ones.

“MFT solutions deliver reliable capabilities to address file transfer across internal A2A, B2B and cloud environments, while providing centralized governance for file transfers across these environments,” according to a Gartner analysis1 of MFT.

A complete MFT suite features services that support management policies, governance processes, coordination and reliable file transfer. Along with workflow automation, provisioning and technological adaptability, MFT enables:

  • File security through integration with other solutions to manage risk, access and authentication
  • Governance monitoring through data, message, file and transaction tracking capabilities
  • File transfer visibility into transactions, the people involved, and crucial processes and systems
  • Reporting and auditing features that collect file transfer data to provide a complete audit trail

To bring MFT out of the abstract and into the real world, we’ve created an infographic to help explain it. Once you’ve viewed it, visit our MFT Resource Center to learn more.

 

 

1 What MFT Is, and How It Applies to You © 2011 Gartner, Inc. and/or its affiliates. All rights reserved.

SEEBURGER offers financial transaction security with SWIFT qualification

Security and Business Continuity dictate a multi channel strategy for Financial Institutions. So we’ve taken another step towards ensuring financial transaction security. We’re pleased to announce the Society for Worldwide Interbank Financial Telecommunications (SWIFT) has awarded us two key SWIFTNet 7.0 qualifications.

What exactly does this mean? It means the SEEBURGER Business Integration Suite (BIS) has proven it can perform secure data transmission using both FileAct communication protocol variants. This means our customers can rest easy knowing the BIS platform complies with SWIFT’s strict requirements for securely exchanging financial data.

“These initial qualifications demonstrate our ability to meet SWIFT’s stringent requirements, our commitment to the financial services sector and our intention to equip customers in the sector with the tools they need to  solve their business integration challenges,” said Derek Schwartz, SEEBURGER senior VP of financial services.

With these qualifications, financial service organizations using the secure SWIFT network to exchange financial data can use our platform to handle all FileAct traffic and perform other value-added operations. Read the press release to learn more and then visit our website for information on financial services software solutions.

File sharing in the fast lane

It’s in our nature to assume we’re immune—that bad stuff only happens to other people.

We tell ourselves that yes, texting and driving is dangerous, but we’re really good drivers so we’re fine. Yes, eating a high-fat diet can cause heart attacks, but those things only happen to other people. Sometimes data breaches happen, and businesses lose millions of dollars and their reputation. But that won’t happen to us. We’re careful and don’t share anything important online anyway.

But do your people really know how to keep things private? Research suggests they probably don’t, as analysts say nearly half of all security breaches are caused by employees and business partners.  Are you absolutely, 100 percent positive there isn’t anything on the free Web file sharing service you use sometimes that you wouldn’t want the whole world to see? file transfer

A new Network World Magazine article, Combating Security Breaches with Managed File Transfer Technology, takes a hard look at some recent security breaches and the technology that helps prevent breaches from ever happening. Read the article today to learn more—then visit our managed file transfer solution center for white papers, case studies and more.

Banking software faces rising glitch rate and “tech debt”

As banks face a growing number of costly incidents, it begs the question, why? According to a recent BBC News article and our own experience—the answer lies somewhere between an overdependence on antiquated code, complex line-of-business and geographical variations, mass mergers and acquisitions, tighter SLAs and changes in data transfer patterns.

Testing alone won’t be enough to fix the problems the industry faces. As analyst Lev Lesokhin told BBC News, “Modern computer systems are so complicated you would need to perform more tests than there are stars in the sky to be 100 percent sure there were no problems in the system.”

The solution rests in a consolidated, secure communications suite. For example, SEEBURGER Business Integration Suite simplifies the complexity of connecting diverse groups of customers, regulators, market infrastructures and stakeholders. The suite also delivers processes that enable end-to-end integration to the legacy systems most banking organizations currently utilize.

secure computerAlong with innovations focused on migration, supporting vendor confidence and eliminating complexity, SEEBURGER Business Integration Suite can also play a key role in meeting the regulatory requirements set forth by Dodd Frank and Basel III. Visit our SEEBURGER financial industry solution center to learn more about what we offer organizations in the financial services sector.

 

 

New Forrester report provides key insight into data security today

Security and risk professionals get it. CIOs get it. CEOs get it. The potential costs that a loss of data can cause are staggering. News reports every year remind us of the clear-cut financial and reputation damage that data loss has caused some organizations.

So we know the dangers — but what can we do? A new playbook from analyst firm Forrester provides valuable insights into both the current state of data security  and what can be done to move organizations forward to securing, well, data security of course.

Reaforrester-websitebuttonsd the full report today, it’s on us. Then visit our MFT Solution Center to discover the market’s first single, integrated system for ensuring sensitive files (even the ones of mammoth proportions) are secure, visible, and compliant with governance and regulatory requirements.

 

 

 

 

SAPinsider covers eight great reasons to modernize B2B architecture

SAPinsider 1.2013B2B integration architecture needs a makeover. When it comes to whether or not it meets the demands of a modern business, many are simply not passing the test. All too often businesses still rely on a veritable soup of integration technology—which is expensive and lacks features like SAP Enterprise Resource Planning (ERP).

Furthermore, a recent analyst survey discovered that more than half of IT managers find legacy B2B landscapes problematic in terms of integrating EDI, supporting partners without EDI capabilities and a whole lot more. As illustrated in the new SAPinsider, here’s a sneak peak at four of the top reasons to modernize B2B architecture:

  1. Eliminate “Integration Spaghetti”
    Spaghetti belongs on a dinner plate. A jumbled mix of B2B components must accommodate various encryption requirements, new protocols, partners and more.
  2. Integrate File Transfer Functionality
    Would you buy one car for work and another for errands? Nope—makes as much sense as one B2B infrastructure for managed file transfer and another for EDI/B2B.
  3. Conquer B2B-related Big Data
    No one wants to go swimming in data, and respondents in one recent survey ranked EDI/B2B supplier community data as one of the most difficult types to work with.
  4. Strengthen Data Security
    Legacy B2B systems lack modern security features that enforce policies, notify of failures and more. Using Web services to transfer files only exacerbates the security gap.

To learn more and read the full list of the eight top reasons legacy B2B has got to go, check out “Does Your B2B Architecture Pass the Test?” in the latest issue of SAPinsider.

 

 

SEEBURGER Partner Program Is Fired Up and Running On All Cylinders!!!

accelerate

ACCELERATE – SAP Global Trade Services Leader, Krypt Inc. not only helps automate and streamline cross-border supply chain trade processes, they are the latest member of the growing SEEBURGER Partner Program.

Krypt is recognized as a leading company in the Supply Chain Execution space with offices across North America and India.  Krypt is a niche systems integrator with 100% of their focus set Trade and Logistics systems implementations, upgrades and support. Together with in-house labs for demos, the latest versions of SAP applications deployed for prototype, proof of concept and product developments, Krypt takes pride in the fact that all their clients are 100% satisfied with the quality of services delivered.

Industry thought leader – Ahead of the curve, providing rapid and robust implementation:

  • Product knowledge
  • Streamlining collaboration with government authorities
  • Industry specific and customer cases for best known methods
  • Accelerators (templates, test cases, BPP, Blue Print)

Partners in the SEEBURGER program are top notch B2B integrators and Krypt follows in that vein. SEEBURGER is delighted to be teamed with Krypt for SAP-focused Business Integration.

Dropbox Hack Highlights Need for BYOD Security

cloud security imageA recent confession by Dropbox that their system was hacked should make every CIO’s blood run cold, not to mention validate IBM’s recent ban on the file hosting service.

In the absence of an enterprise data access strategy that extends to tablets and smartphones, BYOD users are turning to free consumer services like Dropbox to retrieve and share needed files. Hello, data. Goodbye, security, governance and compliance.

Everyone knows the pitfalls. IT has no control over data stored by these services. The encryption keys are held by the service provider. Even though the data is encrypted once it gets to the cloud, the lack of client-side encryption exposes data in transit. In effect, use of these services blasts a gaping hole in the wall you have built to guard against data leakage and regulatory violations.

The need to plug this hole is sparking new interest in Managed File Transfer (MFT), a technology originally developed to protect data exchange in the pre-BYOD era.

MFT not only encrypts data transfers at the point of origin but also requires authentication of both the user and device. It enforces corporate policies on who can send what to whom. It provides an audit trail of all file sharing activities for compliance and forensics purposes.

While most vendors offer a public cloud option, the technology can also be deployed on-premise in an installed or virtual private cloud scenario so that the stored data never leaves the enterprise. Files are downloaded from a central server on an as-needed basis and then deleted from the mobile device. IT can maintain complete control.

The technology also overcomes email file limitations that force users needing large Power Points, CAD drawings or other oversized files to turn to unsafe web services in the first place. And it simplifies IT administration because the same password can be used for desktops, laptops and BYOD devices.

Whether with MFT or another solution, CIOs need to find a way to bring tablets and smartphones under their security wing. Otherwise, it will continue to be a BYOD Wild West out there. No company can afford that risk.

To learn more about MFT and the solution that SEEBURGER offers, visit http://www.seeburgermft.com