Business Integration

File sharing in the fast lane

It’s in our nature to assume we’re immune—that bad stuff only happens to other people.

We tell ourselves that yes, texting and driving is dangerous, but we’re really good drivers so we’re fine. Yes, eating a high-fat diet can cause heart attacks, but those things only happen to other people. Sometimes data breaches happen, and businesses lose millions of dollars and their reputation. But that won’t happen to us. We’re careful and don’t share anything important online anyway.

But do your people really know how to keep things private? Research suggests they probably don’t, as analysts say nearly half of all security breaches are caused by employees and business partners.  Are you absolutely, 100 percent positive there isn’t anything on the free Web file sharing service you use sometimes that you wouldn’t want the whole world to see? file transfer

A new Network World Magazine article, Combating Security Breaches with Managed File Transfer Technology, takes a hard look at some recent security breaches and the technology that helps prevent breaches from ever happening. Read the article today to learn more—then visit our managed file transfer solution center for white papers, case studies and more.

Banking software faces rising glitch rate and “tech debt”

As banks face a growing number of costly incidents, it begs the question, why? According to a recent BBC News article and our own experience—the answer lies somewhere between an overdependence on antiquated code, complex line-of-business and geographical variations, mass mergers and acquisitions, tighter SLAs and changes in data transfer patterns.

Testing alone won’t be enough to fix the problems the industry faces. As analyst Lev Lesokhin told BBC News, “Modern computer systems are so complicated you would need to perform more tests than there are stars in the sky to be 100 percent sure there were no problems in the system.”

The solution rests in a consolidated, secure communications suite. For example, SEEBURGER Business Integration Suite simplifies the complexity of connecting diverse groups of customers, regulators, market infrastructures and stakeholders. The suite also delivers processes that enable end-to-end integration to the legacy systems most banking organizations currently utilize.

secure computerAlong with innovations focused on migration, supporting vendor confidence and eliminating complexity, SEEBURGER Business Integration Suite can also play a key role in meeting the regulatory requirements set forth by Dodd Frank and Basel III. Visit our SEEBURGER financial industry solution center to learn more about what we offer organizations in the financial services sector.



New Forrester report provides key insight into data security today

Security and risk professionals get it. CIOs get it. CEOs get it. The potential costs that a loss of data can cause are staggering. News reports every year remind us of the clear-cut financial and reputation damage that data loss has caused some organizations.

So we know the dangers — but what can we do? A new playbook from analyst firm Forrester provides valuable insights into both the current state of data security  and what can be done to move organizations forward to securing, well, data security of course.

Reaforrester-websitebuttonsd the full report today, it’s on us. Then visit our MFT Solution Center to discover the market’s first single, integrated system for ensuring sensitive files (even the ones of mammoth proportions) are secure, visible, and compliant with governance and regulatory requirements.





SAPinsider covers eight great reasons to modernize B2B architecture

SAPinsider 1.2013B2B integration architecture needs a makeover. When it comes to whether or not it meets the demands of a modern business, many are simply not passing the test. All too often businesses still rely on a veritable soup of integration technology—which is expensive and lacks features like SAP Enterprise Resource Planning (ERP).

Furthermore, a recent analyst survey discovered that more than half of IT managers find legacy B2B landscapes problematic in terms of integrating EDI, supporting partners without EDI capabilities and a whole lot more. As illustrated in the new SAPinsider, here’s a sneak peak at four of the top reasons to modernize B2B architecture:

  1. Eliminate “Integration Spaghetti”
    Spaghetti belongs on a dinner plate. A jumbled mix of B2B components must accommodate various encryption requirements, new protocols, partners and more.
  2. Integrate File Transfer Functionality
    Would you buy one car for work and another for errands? Nope—makes as much sense as one B2B infrastructure for managed file transfer and another for EDI/B2B.
  3. Conquer B2B-related Big Data
    No one wants to go swimming in data, and respondents in one recent survey ranked EDI/B2B supplier community data as one of the most difficult types to work with.
  4. Strengthen Data Security
    Legacy B2B systems lack modern security features that enforce policies, notify of failures and more. Using Web services to transfer files only exacerbates the security gap.

To learn more and read the full list of the eight top reasons legacy B2B has got to go, check out “Does Your B2B Architecture Pass the Test?” in the latest issue of SAPinsider.



SEEBURGER Partner Program Is Fired Up and Running On All Cylinders!!!


ACCELERATE – SAP Global Trade Services Leader, Krypt Inc. not only helps automate and streamline cross-border supply chain trade processes, they are the latest member of the growing SEEBURGER Partner Program.

Krypt is recognized as a leading company in the Supply Chain Execution space with offices across North America and India.  Krypt is a niche systems integrator with 100% of their focus set Trade and Logistics systems implementations, upgrades and support. Together with in-house labs for demos, the latest versions of SAP applications deployed for prototype, proof of concept and product developments, Krypt takes pride in the fact that all their clients are 100% satisfied with the quality of services delivered.

Industry thought leader – Ahead of the curve, providing rapid and robust implementation:

  • Product knowledge
  • Streamlining collaboration with government authorities
  • Industry specific and customer cases for best known methods
  • Accelerators (templates, test cases, BPP, Blue Print)

Partners in the SEEBURGER program are top notch B2B integrators and Krypt follows in that vein. SEEBURGER is delighted to be teamed with Krypt for SAP-focused Business Integration.

Dropbox Hack Highlights Need for BYOD Security

cloud security imageA recent confession by Dropbox that their system was hacked should make every CIO’s blood run cold, not to mention validate IBM’s recent ban on the file hosting service.

In the absence of an enterprise data access strategy that extends to tablets and smartphones, BYOD users are turning to free consumer services like Dropbox to retrieve and share needed files. Hello, data. Goodbye, security, governance and compliance.

Everyone knows the pitfalls. IT has no control over data stored by these services. The encryption keys are held by the service provider. Even though the data is encrypted once it gets to the cloud, the lack of client-side encryption exposes data in transit. In effect, use of these services blasts a gaping hole in the wall you have built to guard against data leakage and regulatory violations.

The need to plug this hole is sparking new interest in Managed File Transfer (MFT), a technology originally developed to protect data exchange in the pre-BYOD era.

MFT not only encrypts data transfers at the point of origin but also requires authentication of both the user and device. It enforces corporate policies on who can send what to whom. It provides an audit trail of all file sharing activities for compliance and forensics purposes.

While most vendors offer a public cloud option, the technology can also be deployed on-premise in an installed or virtual private cloud scenario so that the stored data never leaves the enterprise. Files are downloaded from a central server on an as-needed basis and then deleted from the mobile device. IT can maintain complete control.

The technology also overcomes email file limitations that force users needing large Power Points, CAD drawings or other oversized files to turn to unsafe web services in the first place. And it simplifies IT administration because the same password can be used for desktops, laptops and BYOD devices.

Whether with MFT or another solution, CIOs need to find a way to bring tablets and smartphones under their security wing. Otherwise, it will continue to be a BYOD Wild West out there. No company can afford that risk.

To learn more about MFT and the solution that SEEBURGER offers, visit

MFT Essentials Part 1: Four common situations that call for Managed File Transfer

Data SecurityManaged File Transfer (MFT) is becoming well-known now as a highly secure alternative to more traditional (and faulty) methods of data sharing. There are four scenarios in particular that exemplify cases in which using an MFT solution would be incredibly valuable.

  • Email attachments are the most common method of transferring files that leads to confidential information being leaked out. Many users are either unaware or unwilling to encrypt files being sent as attachments before sending them out. And when a file is too large to be attached, users often resort to even more insecure methods such as flash drives and File Transfer Protocol (FTP).
  • File exchange portals are usually FTP-based custom or homegrown solutions for sending and receiving files over the Web. Like many similar FTP solutions, they lack the security and visibility supported by MFT. Web-based solutions without cutting edge security technology to back them up are vulnerable to unauthorized access, malicious or otherwise.
  • File sharing and collaboration services are often free and used to simplify the process of storing and exchanging files. This is one situation in which organizations are exposed to a great deal of vulnerability. Users are dabbling with free, unsecure technologies with limited capabilities. While users have the best intentions, their methods are exposing sensitive and proprietary data.
  • Mobile devices are becoming so commonplace that half of all midsize and large companies are expected to have mobile solutions for file sharing and collaboration within the next three years. As the number of tablet and smartphone business users increases, so do worries about what could happen should a device become lost, stolen, or access an unsecure network.

Check back here December 28, 2012 for part two of this series, “What to look for in an MFT solution,” in which we’ll take a look at what you should require from an MFT solution. Until then, visit our MFT Solution Center to find white papers, case studies, multimedia and more.

Source: “Four Common User Scenarios that Demand MFT,” Gartner, May 21, 2012


Does your SAP data need security from…you?

In a large organization, chances are there is more than one Rob Johnson, Bill Smith or Susan Hill working there. Whatever the case may be, sending files through SAP to the wrong Rob, Bill or Susan, is just one of the many ways data can get lost inside and outside a company. The fact of the matter is data loss is more likely to be caused by someone inside your company than a hacker.

Data is often lost during simple day-to-day transactions. Unfortunately, SAP doesn’t provide a native way to prevent unauthorized data exports. In this day and age, simply counting on your people to protect what they should is a big leap of faith that can end up costing you a small fortune. Organizations need a way to ensure data falls into the right hands and stays out of the wrong hands.

SEEBURGER Managed File Transfer (SEE MFT) for SAP was specifically designed for ensuring data security in SAP solutions. It overrides SAP’s export function to automatically enforce predefined business policies and permissions to ensure both senders and receivers are authorized to access and transmit a file. It’s a user-friendly solution that’s no muss for the end user and no fuss for you.

We recently published an article in SAPinsider that explains how you can protect your SAP data.  Once you’ve reviewed the article, visit our MFT solution center to learn more.



SEEBURGER Targets the Financial Services Industry

Derek Schwartz shares his insights on joining SEEBURGER to head up the Financial Services Business Unit

Financial institutions have an ever increasing need for agile integration of a variety of constituents onto a consolidated platform that embraces all external and internal data movement patterns and processes. Solving the breadth of requirements securely takes innovation and a paranoid dedication to quality.   After many years in the industry, I found SEEBURGER to possess the unique elements needed for excellent execution in the Financial Services industry.

The dedication to core values at SEEBURGER ensures true ‘cohesive’ development of solutions; delivering total ‘interoperability’, not simply just ‘co-existence’.  Its substantial financial war chest secures the longevity of the business for the benefit of its customers at zero risk.  Large enterprise with mission critical needs like banks and insurance providers deserve this from their vendor.

I’m honored and excited to build on the success already achieved in the Financial Services business at SEEBURGER and look forward to leading the global Financial Services business unit.

To learn more, read today’s announcement.


New poll: Everyone’s data is 100 percent secure

It seems that every four years, we find ourselves searching for the truth a little more than usual. Well in honor of our upcoming election (no political affiliation required) here’s a little fact checking for you.  Our headline was 100 percent false. Sorry.

In fact, only one in five organizations have the policies and tools in place they need to safeguard their data, and every year yet another major organization incurs significant financial and reputational costs after data loss. So, time to fact check your own campaign for data security. Do you have the policies and tools in place you need?

If you don’t, now is a great time to take a look at Forrester’s latest analysis of the state of data security and privacy today, and what can be done to improve it tomorrow.  Download your complimentary copy today and get the facts—not fluff.