Data SecurityManaged File Transfer (MFT) is becoming well-known now as a highly secure alternative to more traditional (and faulty) methods of data sharing. There are four scenarios in particular that exemplify cases in which using an MFT solution would be incredibly valuable.

  • Email attachments are the most common method of transferring files that leads to confidential information being leaked out. Many users are either unaware or unwilling to encrypt files being sent as attachments before sending them out. And when a file is too large to be attached, users often resort to even more insecure methods such as flash drives and File Transfer Protocol (FTP).
  • File exchange portals are usually FTP-based custom or homegrown solutions for sending and receiving files over the Web. Like many similar FTP solutions, they lack the security and visibility supported by MFT. Web-based solutions without cutting edge security technology to back them up are vulnerable to unauthorized access, malicious or otherwise.
  • File sharing and collaboration services are often free and used to simplify the process of storing and exchanging files. This is one situation in which organizations are exposed to a great deal of vulnerability. Users are dabbling with free, unsecure technologies with limited capabilities. While users have the best intentions, their methods are exposing sensitive and proprietary data.
  • Mobile devices are becoming so commonplace that half of all midsize and large companies are expected to have mobile solutions for file sharing and collaboration within the next three years. As the number of tablet and smartphone business users increases, so do worries about what could happen should a device become lost, stolen, or access an unsecure network.

Check back here December 28, 2012 for part two of this series, “What to look for in an MFT solution,” in which we’ll take a look at what you should require from an MFT solution. Until then, visit our MFT Solution Center to find white papers, case studies, multimedia and more.

Source: “Four Common User Scenarios that Demand MFT,” Gartner, May 21, 2012