Transmitting files, both internally and externally, and from one computer platform to another, is a widely used procedure. The vast majority of organizations do so in multi-system environments, and this file transfer process is often considered to be part of an organization’s “business-critical” operations. Even though a managed file transfer solution could provide an organization with a secure process for transmitting data, many organizations have yet to implement such a process. As the amount of FTP traffic continues to grow, auditing FTP use and enforcing internal controls and procedures becomes more important every day. To identify data security problems before they occur, an effective audit which incorporates best practice procedures must be performed. (more)
Simply put, the managed file transfer process works wonders for ensuring data security. While data security is just one of the core capabilities of a good managed file transfer software solution, it is definitely a major reason why organizations have come to us lately when looking for a managed file transfer solution. (more)
As the global leader in the managed file transfer field, bTrade is laser-focused on providing innovative and “holistic” solutions for its customers’ managed file transfer needs. Our solutions address every stage of the managed file process, from encryption/compression to compliance/governance. (more)
We’ve had lots of reasons to celebrate lately at bTrade, and here are just a few.
Thanks to our well-designed and executed managed file transfer solution and an outstanding support team, we have seen soaring sales in 2012, as well as a strong first quarter in 2013. We’ve been able to provide managed file transfer solutions to customers from every industry and have heard from them about how our solution, secureXchange, has made their lives easier and their data more secure. (more)
For those who read this blog, the managed file transfer process is no doubt very important. Equally important to the managed file transfer community is how the Executive Order on Improving Critical Infrastructure Cyber Security will affect the landscape of the managed file transfer process (more)
What is FIPS 140-2?
The best managed file transfer software contains the latest encryption, and the latest cryptographic standards are found in FIPS 140-2. The FIPS 140-2 encryption standards were issued by the National Institute of Standards and Technology, and contain strict guidelines for ensuring that cryptographic-based products properly safeguard data transmissions. The government established a FIPS 140-2 accreditation program for vendors that develop cryptographic modules, and the testing of cryptographic modules is handled by approved third-party laboratories. bTrade’s managed file transfer products contain cryptography that has received FIPS 140-2 validation. (more)
Ensuring data security within the Managed File Transfer process is critical for protecting data from cyber attacks. Last week I attended a conference on data security where there was much discussion about the recent high-profile cyber attacks. A dominant theme coming out of the conference was the battle to protect sensitive data through managed file transfer, secure FTP and other secure file transfer technologies. Time and again the data security thought-leaders stressed that enterprises need to know and understand how data security can be compromised. While FTP is thought to be relatively secure, there are risks involved from a security perspective. There was significant discussion regarding managed file transfer as a significantly more secure process than FTP for protecting data security. (more)
Last week, we told you about the White House’s attempt to address the data security crisis through issuance of an Executive Order entitled Improving Critical Infrastructure Cybersecurity (“EO”). As part of this process, the National Institute of Standards and Technology (NIST) is tasked with developing a baseline framework of best practices to help reduce cyber risks. To that end, NIST recently released a Request for Information seeking comments about how best “to guide industry in reducing cyber risks to the networks and computers that support critical infrastructure vital to the nation's economy, security and daily life.” (more)