A Managed File Transfer (MFT) Alternative to Shadow IT

Post on 21-Feb-2017

324 views 2 download

Transcript of A Managed File Transfer (MFT) Alternative to Shadow IT

Is Your MFT Ready for Digital?

15 USED

AUTHORIZED1 Cloud Services

2

81% of line-of-business employees admitted to using unauthorized SaaS applications

With 38%deliberately using unsanctioned apps because of the IT-approval process.

Source: Gigacom Research – Nov 2014

http://research.gigaom.com/report/shadow-it-data-protection-and-cloud-security/

3

59,5%Employees don’t understand their responsibility

in the organization’s security culture, which

includes file securitySource: Info-Tech n = 145

37%Individuals report that they actively seek

external technology without proper IT support

or supervisionSource: Info-Tech n = 20,270

• Send– A file to a collaborator

– A weekly report

– An updated client list for a marketing campaign

• Receive– An order

– A blueprint

4

• Users have experienced file sharing issues– Account setup - days not minutes

– Difficult process

– Inflexible for new needs

– The tool is outdated

– My partners/customers won’t use the tool

5

• It’s safe, right?– Browser had the

lock shown

– Their site says it isencrypted

– No PII/PHI

– It’s “Just” campaign data

6

7

Who has ongoing or temporary

access to the data?

Is access

ever revoked?

Is data

ever cleaned up?

Does the data persists after

users leave the organization?

FTP

Secure &Enterprise-Grade

• Ultimately it creates new silos– As many exchange channels as individuals

– As it is generally coming with no engagement users are changing of solution as soon they find one more « sexy »

– Each individual is using his own

– Need to define by phone which solution to be used this time

• Ultimately it creates budget problems– When summing up each dollar spent on these different solutions

– It makes a real amount

9

10

Security Governance

Traceability

Efficiency

Compliance

Cost

11

Mainframe application

has no account on

“dropfile.com”

No integration with

established business

processes

System centric

File Transfers

Person centric

File Transfers

Intuitive Open

Scalable Secure

Multi-modal people interactionsEnsure best fit between file transfer need and context of use

Unified GovernanceHomogeneous flow definition, management & repositoryEnd-to-End visibilityRoles management & delegated administration

Gateway to secure external exchangesScalable & Highly availableDelegated administration

Dedicated agents for A2A synchronizationDelegated management of inter-applications file transfer and sharing

Leverages a flow repository and covers all enterprise file transfer needs

14

mobile

CFT

email web SC

ST

appl. appl.

Central Governance

CFT

• Provide a secure and governed alternative

to consumer-grade, cloud-based file sharing

• Use one complete MFT solution to govern all

enterprise MFT patterns, including EFSS

(Enterprise File Sharing and Synchronization)

• Eliminate the use of risky file-sharing services

and enable secure BYOD (Bring Your Own

Device) initiatives

• Apply enterprise security policies to person-to-

person file sharing without requiring people

to change the way they work

• Allow new interactions combining people and

automated business processes

15

mobile

CFT

email web SC

ST

appl. appl.

Central Governance

CFT

16Download Axway white paper: https://www.axway.com/en/gate/1998