SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
WHITE PAPER




                                 Making File Transfer Easier,
                                 Compliant and More Secure
ON                                                        An Osterman Research White Paper
                                                                                Published February 2012

                                                                                          SPONSORED BY
                                                                                                                       !
                                                                                                                       !
                                                                                                                       !

                                                                                                                           !
                                                            !                                                              !
                                sponsored by                !                                                              !
                                                            !


                                            sponsored by
sponsored by
          SPON




                                                            !
                                                            !                                                      !
                                                            !                                                      !
                                                                                                                   !

       sponsored by
                 sponsored by             sponsored by
                                                                                          Osterman Research, Inc.
                                                        P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA
                                          Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com
                                                                 www.ostermanresearch.com • twitter.com/mosterman
Making File Transfer Easier, Compliant and Secure




Executive Summary
Email is the primary file-transfer solution in just about every organization. For example, an
Osterman Research surveyi found that only 22% of emails contain attachments, but more than
90% of the bits flowing through an email system are accounted for by these attachments. The
reasons for using email as a file-transfer solution are simple: email is ubiquitous, it is based on
industry standards, and it is very easy to use as a drag-and-drop file transfer utility.

However, email was never designed as a file-transfer system
and users and organizations suffer from using it this way:                      Individually focused
                                                                                solutions, many of
•   Email systems become bloated with content, they become                      which operate in the
    more difficult and more time-consuming for IT staffers to                   cloud, can provide
    manage, and the costs of email management are much                          good functionality
    higher than they should be.
                                                                                for users as an
                                                                                alternate method for
•   Content sent through email is largely unmanaged, offering
    senders no assurance that recipients have received                          sending files, but
    attachments, that the content was not modified by the                       many lack corporate
    recipient or some intermediate party along the way, and                     governance
    with no control over access to it.                                          capabilities that will
                                                                                allow centralized
•   Departments and workgroups cannot gain access to this                       management and
    shared data unless they happen to be on the sender’s list of                control over content.
    recipients.

•   Organizations experience much greater exposure to data breaches and the associated
    financial and other consequences of losing control of sensitive corporate data.

Individually focused solutions, many of which operate in the cloud, can provide good
functionality for users as an alternate method for sending files, but many lack corporate
governance capabilities that will allow centralized management and control over content.

While many organizations have legacy FTP systems in place to act as an alternate channel for
sending files, these systems suffer from lack of governance and lack of security, not to mention
the fact that IT must manage this legacy infrastructure that most users don’t employ anyway.

Other file-transfer alternatives to email, such as physical delivery, are very expensive and much
slower.

KEY TAKEAWAYS
Consequently, what organizations need is:

•   A way for users to send files independently of email that will address the critical
    requirements for corporate governance and information security. These types of transfers
    are truly legitimate, business-oriented activities that don’t come on a regularly scheduled
    basis – performing these transfers is essential to user productivity.



©2012 Osterman Research, Inc.                                                                            1
Making File Transfer Easier, Compliant and Secure



•   Moreover, such a system must integrate seamlessly into the way that individuals work if
    they are to use it. This includes the increasing need to work from either personal or work-
    provisioned smartphones and tablets.

•   The solution should allow internal users to share corporate files across organizational
    boundaries without having to rely on IT to provision licenses.

•   Finally, such a solution should ideally be less expensive than using email and other solutions
    for file transfer in order to achieve additional benefits.

ABOUT THIS WHITE PAPER
This white paper discusses the critical importance of finding a better alternative to email as a
file-sharing mechanism. It also provides information on the four sponsors of this white paper –
Accellion, Inc., Attachmate, FileCatalyst and Ipswitch File Transfer – and their relevant
solutions.



The Current State of File Transfer
HOW CONTENT IS SENT TODAY
Most email users employ email as the primary way to send files like word processing
documents, spreadsheets, presentations, images and other content. In fact, Osterman
Research has calculated that more than 90% of the bits that are sent through email systems
are actually attachments to email messages and not the messages themselves. There are a
number of good reasons for using email as the default file-transfer mechanism, including:

•   Email is very easy to use and requires minimal training in order to send attachments.

•   Email systems are built on industry standards and provide users with a high degree of
    assurance that their emails can be received and opened by recipients (albeit without proof
    that their attachments have actually been received by the recipients).

•   Virtually every corporate user and consumer has email available on a wide range of
    platforms (desktop client at work or home, laptop, browser, smartphone, tablet, etc.)

As a result, email has become the default way to send files in almost all organizations. While
other tools – such as FTP systems, instant messaging and physical delivery – are used to send
electronic files, consumer file-sharing applications, email continues to be the primary platform
that individuals use to send electronic content.

CHANGING TRENDS IN FILE TRANSFER
There are a number of important trends taking place in the context of how attachments are
managed:

•   Attachments are getting larger
    Attachments are becoming larger as users create more content: word processing
    documents, spreadsheets, videos, presentations, PDF files, and other materials. This is
    particularly true as the use of video increases for training and other purposes, and as

©2012 Osterman Research, Inc.                                                                      2
Making File Transfer Easier, Compliant and Secure



    content authoring tools become more sophisticated.

•   Data security is becoming more important
    Another important trend in managing content is the growing importance of data breach
    prevention. Motivated by compliance regulations, growing concerns over data leaks, and
    protection of intellectual property, IT needs greater visibility into who is transferring content
    and the types of content that are sent.

•   File-sharing and synchronization applications are becoming more popular
    There is growing use of file-sharing and data synchronization applications, such as Dropbox
    and SugarSync, that are very useful, but that create the potential for leakage of intellectual
    property and other data breaches.

•   Organizations are more globally distributed
    As organizations, their business partners and their supply chains become more globally
    distributed, there is a need to improve the speed and the reliability of file transfer for
    sharing critical documents, such as design documents between a company in North America
    and its manufacturing partners in Asia.

•   Content lifecycle management is also more important
    Increasingly, IT and individual users need better visibility into how content is sent, who has
    access to it, the assurance of its delivery, and how long content is available.

•   Email is being used more
    Although there are many alternatives for communication,
    collaboration and file transfer, the use of email continues to              Content on FTP
    increase. For example, a September 2011 Osterman                            systems is often
    Research survey found that the average email user sends                     unmanaged, leading
    and receives 145 emails on a typical workday. Moreover,                     to corporate
    42% of those surveyed reported that they are using email                    governance
    more than they did 12 months earlier, while only 10%                        problems. It can sit
    reported using email less over the same time period.
                                                                                on an FTP server for
                                                                                many years, leading
•   Telework and remote work are becoming more
    common                                                                      to potential data
    Employees, contractors and temporary workers are                            breaches from
    becoming more distributed as companies implement                            unauthorized parties
    telework/work-from-home policies to reduce the costs of                     outside a company,
    rent and other expenses associated with providing                           or unauthorized
    employees office space. The result is that employees who                    access to individuals
    can no longer work together physically now rely more on                     inside the company.
    the sharing of documents by email in order to collaborate on
    projects.

    Closely related to this is the shift to BYOD (Bring Your Own Device) mentality among
    employees who increasingly use personal smartphones and tablets to do their work.




©2012 Osterman Research, Inc.                                                                           3
Making File Transfer Easier, Compliant and Secure




The Problem With Current File Transfer Methods
CONSUMER FILE-SHARING APPS LACK CORPORATE GOVERNANCE
Another issue is that IT typically lacks control over content that is sent outside an organization
(and often within it), because unsanctioned use of various free solutions for transferring files is
prevalent behind corporate firewalls. While many of these consumer-focused solutions are
quite useful and work as advertised, they often do not provide IT with the tools to centrally
manage corporate content. In the typical scenario, while IT may be charged with archiving or
otherwise managing content for legal, regulatory or other purposes, it lacks the ability to fully
control the flow of information sent through email. Further, IT has almost no visibility into
content that is sent via means other than email, such as cloud-based file transfer tools,
overnight packages, USB drives, personal email, etc.

Related to this problem is that performing audits on or delivery verification of externally sent
content is difficult in many cases. For example, if a user sends a time-sensitive proposal to a
recipient through email, usually the only way to verify the delivery of this content is to send
another email or call the recipient. Most email systems do not provide the ability to track the
flow of content from sender to recipient throughout the entire transfer process.

FTP SYSTEMS ARE NOT AS SECURE AS THEY SHOULD BE
The venerable FTP systems that have been deployed in most organizations are useful for
sending large files, but they suffer from two serious problems:

•   First, they lack security because so many users share login credentials for the occasional
    large file transfers for which they use these systems.

•   Second, content on FTP systems is often unmanaged, leading to corporate governance
    problems. For example, a user can employ FTP to send a large file, but there is no
    management of the data once the file has been sent. It can sit on an FTP server for many
    years, leading to potential data breaches from unauthorized parties outside a company, or
    unauthorized access to individuals inside the company.

GROWING STORAGE IN EMAIL IS A MAJOR PROBLEM
Many of the problems associated with managing email are directly related to its use as a file-
transfer system. For example, an Osterman Research reportii published in September 2011
found that four of the top five problems in managing email systems are directly related to
email’s use as a file-transfer and storage system:

•   Increasing backup and restore times (54% cite this as a serious or very serious problem)
•   Increasing message size (48%)
•   Lack of messaging-related disk space (40%)
•   Mailboxes are overloaded (39%)

Because email storage is growing in excess of 20% annually, these problems will get
significantly worse over time.

The result is that costs are driven up because more storage is being deployed in corporate
email networks, more IT time is needed to manage email systems, and overall email system

©2012 Osterman Research, Inc.                                                                         4
Making File Transfer Easier, Compliant and Secure



performance degrades. It is important to note that the issue is not the cost of storage itself,
since the cost of storage hardware is actually declining fairly dramatically over time. Instead,
the issue of storage is the cost of IT deploying and managing it – this can be anywhere from
five to eight times the cost of the storage solutions themselves.

FILE TRANSFER CONSUMES LOTS OF EFFORT
Managing file transfer is a relatively time-consuming effort for IT staff. If FTP systems are
used, then IT must manage FTP servers and deal with user issues as they arise. If email is
used instead of FTP or – more commonly – in addition to it, then IT must spend time dealing
with email problems that are caused by the use of email as the file transfer backbone, as
discussed above.

RELIABILITY AND SPEED OF FILE TRANSFER NEEDS IMPROVEMENT
One of the fundamental problems with FTP is its reliability. For example, FTP cannot inherently
recover from an error, it does not send an alert when a problem has occurred, and it has
problems with very large files in some situations. Moreover, FTP will often not maximize the
available bandwidth, sending files at a maximum speed that is only a fraction of the available
bandwidth. This not only means that transfers take much longer than necessary, but that the
value of the purchased bandwidth is not being realized.

THERE ARE INADEQUATE MOBILE SOLUTIONS
Another problem with conventional file transfer solutions is that there are not a lot of good
solutions for mobile users. While some cloud-based file transfer or file synchronization solutions
offer good mobile capabilities, these consumer-focused often do
not fit well in an enterprise environment because they do not
allow IT to govern content as they should – the solutions work        A dedicated and
well for individuals, but not for the organization as a whole.        secure file transfer
                                                                                solution can make
FINDING DATA IS NOT EASY                                                        life much easier for
A serious problem with current file transfer capabilities is that               the IT department in
they do not allow data to be found easily, if at all. For example,              a number of ways,
if users are employing any of the easy-to-use cloud-based file                  by reducing the
transfer or file synchronization solutions, they have addressed                 reliance on email as
their personal requirements for file transfer. However, what                    the file transfer
happens when the organization needs to perform an early case                    backbone, by
assessment in advance of a legal action or a regulatory audit?
                                                                                allowing IT to
What happens when they need to go through an e-discovery
exercise or perform a legal hold? The dispersion of data across
                                                                                manage corporate
the various file transfer solutions that might be in use in an                  data in compliance
organization – and the inaccessibility of these data stores to IT               with corporate
or legal – can create serious problems for an organization when                 policies, and by
they need to find data in a timely manner, assuming that they                   eliminating non-
can even access it at all.                                                      secure solutions that
                                                                                force IT staffers to
CONTENT IS NORMALLY SENT UNENCRYPTED                                            scramble when e-
The majority of emails and their attachments are sent by users                  discovery or other
without any encryption. This not only increases the potential                   problems arise.
for sensitive or confidential information to be exposed to

©2012 Osterman Research, Inc.                                                                           5
Making File Transfer Easier, Compliant and Secure



unauthorized parties, but it increases the risk of non-compliance with a growing variety of legal
and regulatory obligations to protect sensitive data in transit. For example, 46 of the 50 US
states now have data-breach notification laws, and two US states (Nevada and Massachusetts)
have enacted statutes that require the encryption of certain content types when sent to
individuals in those states. Content that is not encrypted can create enormous liabilities for an
organization that suffers a data breach caused by unencrypted email being exposed or lost,
even if the owners of that information do not suffer any harm as a result.

THE BOTTOM LINE: A DEDICATED, SECURE FILE TRANSFER SOLUTION IS
NEEDED
The fundamental issue, then, is that organizations need a dedicated and secure file transfer
solution to address two important issues:

•   To ease the burden on IT
    A dedicated and secure file transfer solution can make life much easier for the IT
    department in a number of ways, by reducing the reliance on email as the file transfer
    backbone, by allowing IT to manage corporate data in compliance with corporate policies,
    and by eliminating non-secure solutions that force IT staffers to scramble when e-discovery
    or other problems arise.

•   To reduce corporate risk
    More importantly, such a file transfer solution can substantially reduce corporate risk by
    putting all corporate data under the centralized management of the IT department,
    compliance department or some other authority within the organization instead of under the
    control of individual users. This can dramatically reduce the potential for data breaches,
    lost data, spoliation of data in legal actions, or an inability to meet regulatory or other
    corporate governance requirements.



Important Considerations in Selecting a Solution
The choice of a file transfer solution will be dependent on a number of factors, including the
size of the organization, how distributed its employees are, the industry(ies) it serves, the
regulations that it must satisfy, its corporate culture and other factors. However, there are a
number of issues that decision makers should consider as they evaluate the best file-transfer
solution for their organization:

•   Make it easy for users and align with existing processes
    One of the most important considerations in selecting a managed file transfer solution is to
    integrate it as seamlessly as possible into the way that employees work today. A solution
    that requires a fundamentally different approach to file transfer, or that requires significant
    training for end users, simply won’t be used and will be a wasted investment. The key is to
    deploy a solution that is as easy to use as consumer-oriented, cloud-based file-sharing
    options, but that do not create a paradigm shift.

•   Reduce (or at last don’t add to) IT costs
    Another important consideration is to use managed file transfer as a way of addressing the
    significant costs associated with IT having to manage existing storage and other problems

©2012 Osterman Research, Inc.                                                                       6
Making File Transfer Easier, Compliant and Secure



    in email and FTP. Because the costs associated with storage-related problems in email
    systems can sap IT budgets, not to mention the costs associated with managing FTP
    servers and the like, a managed file transfer system can actually pay for itself in short order
    by reducing these costs. While a managed file transfer solution should be able to reduce
    storage and related costs, at a minimum the solution should not add to the IT department’s
    budget requirements.

•   Allow the management of content throughout its life cycle
    One of the fundamental benefits of a managed file transfer solution is its ability to manage
    content throughout its lifecycle. Unlike the case with most email and FTP systems in which
    content is largely unmanageable after it is sent, the right managed file transfer system will
    permit content to be managed by the senders and by IT with capabilities like making the
    content available only for a certain period of time or allowing its access only by authorized
    parties. This will make data breaches much less likely and will improve the ability to
    manage data in accordance with regulatory, legal and corporate policy requirements.
    Additionally, some solutions go beyond file transfer to offer file sharing, sync, commenting,
    and online workspaces for increased collaboration and productivity.

•   Satisfy current and anticipated corporate governance requirements
    Corporate governance of data is becoming a much bigger issue as state, provincial and
    national governments are increasingly focused on data breaches and the consequences
    associated with them. Given that 2011 saw a number of major data breaches, we anticipate
    that laws and corporate policies focused on governing data will become stricter in 2012 and
    beyond. A robust managed file transfer solution will be able to satisfy current governance
    requirements – such as HIPAA, Sarbanes-Oxley and PCI DSS – and address future ones, as
    well.

•   Improve the performance over conventional file transfer
    While most organizations will not frequently send multi-gigabit files, another important
    consideration in selecting a file transfer solution to replace FTP or other protocols will be to
    improve the speed of transfer. This improves the delivery time for very large files and
    makes better use of available bandwidth.
                                                                                A good managed file
•   Allow anywhere, anytime, any device access
                                                                                transfer solution will
    The ability to send and receive content using a managed file
                                                                                have a robust mobile
    transfer solution should be universal, allowing users to send
    from any device and from any location. Consequently, a                      capability that will
    good managed file transfer solution will have a robust                      support all of the
    mobile capability that will support all of the smartphone and               smartphone and
    tablet platforms in use by an organization, as well as from                 tablet platforms in
    more traditional venues like desktops, laptops and Web                      use by an organ-
    browsers.                                                                   ization, as well as
                                                                                from more
•   Meet departmental and workgroup needs, not just                             traditional venues
    individual needs                                                            like desktops,
    There are several good managed file transfer solutions that
                                                                                laptops and Web
    can satisfy individual requirements for sending large files
                                                                                browsers.
    independently of email. However, most organizations will


©2012 Osterman Research, Inc.                                                                            7
Making File Transfer Easier, Compliant and Secure



    need a sharing and syncing solution that can satisfy the needs of departments and
    workgroups, as well as meet the needs of the overall organization, in order to satisfy the
    collaboration requirements of individuals and groups who must work together.

•   Provide granular file and folder access control
    A robust managed file transfer solution will enable granular file and folder access control so
    that individual files and folders can have access rights or specific availability periods applied
    to them. Related to this is the need to apply appropriate security to content so that only
    those users who are authorized to access content can view or download files. Moreover,
    granular expiration periods need to be applied to certain types of data so that it is no longer
    available after a certain date or time.

•   Provide tamper proofing and audit trail capabilities
    It is imperative that any managed file transfer solution prevent content from being modified.
    For example, a contract or proposal must be not be modified from the original unless the
    sender has authorized the changes. Moreover, a good managed file transfer system will
    provide robust auditing capabilities so that anyone who accesses content will be logged and
    their attempted changes captured. Both of these capabilities are critical to prevent charges
    of spoliation of evidence, and to apply appropriate governance to corporate content.



Summary
While email is universally deployed and has become the de facto file transport system for most
users and most organizations, there are inherent problems with this method of sending content.
Not least among the problems are the enormous strain placed upon email systems, the inability
to appropriately govern content when sent through email, and the significant risks associated
with data breaches and evidence spoliation.

To address these problems, every organization should deploy a managed file transfer solution.
Doing so will reduce many of the storage-related and other problems associated with email
systems, and will reduce overall corporate risk. The appropriate managed file transfer solution
will provide granular control over content and minimize the impact on users’ workflows and
work patterns.




©2012 Osterman Research, Inc.                                                                       8
Making File Transfer Easier, Compliant and Secure




Sponsors of This White Paper
Accellion, Inc. provides enterprise-class mobile file
sharing solutions that enable secure anytime, anywhere
access to information while ensuring enterprise security
and compliance. The world’s leading corporations and                                                           !

government agencies use Accellion to protect
                                                                                                   Accellion
intellectual property, ensure compliance, improve
                                                                                    1804 Embarcadero Road
business productivity and reduce IT costs.
                                                                                                   Suite 200
                                                                                       Palo Alto, CA 94303
Founded in 1999, Accellion file sharing solutions can be                                                 USA
deployed on public, private and hybrid cloud
environments and provide the ease-of-use business                                        +1 650 485 4300
users need while giving the enterprise organization the                                 www.accellion.com!
flexibility, scalability and protection it needs.

Accellion is a profitable, well-funded, private company with more than 9 million users and 1,400
enterprise organizations that have deployed Accellion with a more than 96 percent annual
renewal rate. Current customers include Procter & Gamble; Activision; Indiana University
Health; Kaiser Permanente; Foley & Mansfield; Lovells; Bridgestone; Ogilvy & Mather; Harvard
University; Guinness World Records; US Securities and Exchange Commission; and NASA.

For more information please visit www.accellion.com or call (650)-485-4300.

Connect with Accellion:
Web: http://www.accellion.com
Twitter: http://www.twitter.com/accellion
Facebook: http://www.facebook.com/accellion
LinkedIn: http://www.linkedin.com/companies/accellion




Attachmate delivers advanced software for secure and
managed file transfer, terminal emulation, legacy                                                            !
modernization, and enterprise fraud management.
Three decades of IT innovation, a solid reputation for                              Attachmate Corporation
customer satisfaction, and a local support presence in                               1500 Dexter Avenue N.
regions throughout the world have distinguished                                          Seattle, WA 98109
Attachmate in the marketplace. In fact, the vast                                                       USA
majority of Global 10,000 companies use our
                                                                                         +1 206 217 7100
technologies to execute billions of transactions every
                                                                                      www.attachmate.com!
day.

Attachmate® FileXpress® delivers the full spectrum of secure and managed file transfer
solutions. For example, FileXpress can help you:




©2012 Osterman Research, Inc.                                                                                      9
Making File Transfer Easier, Compliant and Secure



•   Reduce helpdesk calls from end users who need to send large email attachments inside and
    outside the company.

•   Implement security controls and comply with data security regulations for your business-to-
    business file exchanges.

•   Automate the movement of files between the systems in your datacenter and between
    corporate and branch locations

Attachmate FileXpress helps IT organizations that are looking to maintain a reliable data
infrastructure, balance data security with business efficiency, and respond quickly to new
business initiatives. With FileXpress providing secure and managed file transfer services, your
organization will be able to protect its business data supply lines, leverage data security to
improve efficiency, and quickly build supportable file transfer capabilities into your custom
applications.




FileCatalyst, created by Unlimi-Tech Software, is a
software platform designed to accelerate and manage
file transfers. FileCatalyst is immune to the effects that
latency and packet loss have on traditional file transfer
methods like FTP, HTTP or CIFS. Global organizations                                                       !
                                                                                                           !
use FileCatalyst to solve issues related to file transfer,
                                                                             Unlimi-Tech Software, Inc.
including content distribution, file sharing and offsite               Suite 205, 1725 St. Laurent Blvd.
backups.                                                                                    Ottawa, ON
                                                                                               K1G 3V4
The FileCatalyst transfer protocol is much faster than                                          Canada
FTP, and is capable of reaching 10 Gbps speeds.
Compare transfers for a 10GB file (more than two                                        +1 613 667 2439
DVDs):                                                                                www.filecatalyst.com!


                                                                                     FileCatalyst
                   Speed               Latency (ms)       FTP Transfer Time         Transfer Time
                  100 Mbps                 100               8 hr 18 min                14 min
                   10 Gbps                 100                  53 min                   14 sec




FileCatalyst Webmail – built on the FileCatalyst platform – solves the problem of large file
transfers by securely storing files on your own server while using email for communication. The
process of sending a file is virtually identical to that of sending an email attachment, making
adoption painless. Files sent with Webmail generate a transactional history that provides
governance as well as audit information. Additional features include online storage boxes, user
groups, LDAP/Active Directory integration and an Outlook plugin.




©2012 Osterman Research, Inc.                                                                            10
Making File Transfer Easier, Compliant and Secure



FileCatalyst Workflow, also built on the FileCatalyst platform, combines two powerful web-based
managed file transfer workflows: submission and distribution. Users may submit files to your
organization for processing, with full tracking at every stage; or they may securely distribute
files to anybody with an email address. Additionally, one or more “file areas” allow users to
store files in your organization's private cloud for online access from anywhere in the world.




Ipswitch File Transfer offers secure, managed file
transfer (MFT) solutions that are fast to implement, easy
to use, and backed by exceptional customer support.
Ipswitch solutions are used around the world by
thousands of organizations, including more than 90% of
Fortune 1000 enterprises, many government agencies
and millions of individuals. With a range of solutions that                                     !
offer visibility, management and enforcement
capabilities to suit a wide variety of compliance,                               Ipswitch, Inc.
governance, company and user requirements. Ipswitch                       83 Hartwell Avenue
has long been an innovator when it comes to helping                     Lexington, MA 02421
people and companies move data and files securely.                                         USA
Positioned as a Leader in the Gartner 2009 Magic
                                                                            +1 781 676 5870
Quadrant for Managed File Transfer, Ipswitch is the only
                                                                         www.ipswitchft.com!
company in this space to offer the full spectrum of
products that address the needs of the MFT Maturity
Model, from simple person-to-person through to enterprise-level B2B integration.

Our products are sold worldwide via eCommerce, direct sales, distributors and resellers.




©2012 Osterman Research, Inc.                                                                  11
Making File Transfer Easier, Compliant and Secure



© 2012 Osterman Research, Inc. All rights reserved.

No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of
Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior
written authorization of Osterman Research, Inc.

Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document
or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws
(including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively,
“Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws
referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the
information contained in this document.

THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS,
CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL.




i
     Source: Results of a Survey on End User and IT Messaging Issues; Osterman Research, Inc.; published April 2010
ii
     Source: Content Archiving Market Trends, 2011-2014; Osterman Research, Inc.; published September 2011




©2012 Osterman Research, Inc.                                                                                                      12

Contenu connexe

Similaire à Making File Transfer Easier, Compliant and More Secure

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...AeroFS
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewHybrid Cloud
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions - Topia
The Critical Need for Enterprise-Grade File Sync and Share Solutions - TopiaThe Critical Need for Enterprise-Grade File Sync and Share Solutions - Topia
The Critical Need for Enterprise-Grade File Sync and Share Solutions - TopiaChristian Schilling
 
Enterprise Content Management 101 for Government
Enterprise Content Management 101 for GovernmentEnterprise Content Management 101 for Government
Enterprise Content Management 101 for GovernmentAlfresco Software
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Osterman Research, Inc.
 
Managed File Transfer White Paper
Managed File Transfer White PaperManaged File Transfer White Paper
Managed File Transfer White PaperDeborah Galea
 
Enterprise Compliance in SharePoint and Office 365
Enterprise Compliance in SharePoint and Office 365Enterprise Compliance in SharePoint and Office 365
Enterprise Compliance in SharePoint and Office 365AIIM International
 
Taming the West: ECM and RM in SharePoint 2010
Taming the West: ECM and RM in SharePoint 2010Taming the West: ECM and RM in SharePoint 2010
Taming the West: ECM and RM in SharePoint 2010InnoTech
 
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...eFolder
 
Using The Internet As A Translators Reference Tool[1]
Using The Internet As A Translators Reference Tool[1]Using The Internet As A Translators Reference Tool[1]
Using The Internet As A Translators Reference Tool[1]guestf35528
 
Movin on Up SPSHouston 2017
Movin on Up SPSHouston 2017Movin on Up SPSHouston 2017
Movin on Up SPSHouston 2017Jim Adcock
 
Enterprise Content Management 101 for the Hospitality Industry
Enterprise Content Management 101 for the Hospitality IndustryEnterprise Content Management 101 for the Hospitality Industry
Enterprise Content Management 101 for the Hospitality IndustryAlfresco Software
 
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22Sri Chilukuri
 
SharePoint Meets ECM 2011
SharePoint Meets ECM 2011SharePoint Meets ECM 2011
SharePoint Meets ECM 2011Chris Riley ☁
 
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 EMC
 
5. e20 impact keynote_benefits from e20_as
5. e20 impact keynote_benefits from e20_as5. e20 impact keynote_benefits from e20_as
5. e20 impact keynote_benefits from e20_asDoina Draganescu
 
Enterprise Content Management 101 for Financial Services
Enterprise Content Management 101 for Financial ServicesEnterprise Content Management 101 for Financial Services
Enterprise Content Management 101 for Financial ServicesAlfresco Software
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Osterman Research, Inc.
 
Are you giving your users the best online experience - Webinar
Are you giving your users the best online experience - WebinarAre you giving your users the best online experience - Webinar
Are you giving your users the best online experience - WebinarOpenAthens
 

Similaire à Making File Transfer Easier, Compliant and More Secure (20)

White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 viewThe Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
The Critical Need for Enterprise-Grade File Sync and Share Solutions 1 view
 
The Critical Need for Enterprise-Grade File Sync and Share Solutions - Topia
The Critical Need for Enterprise-Grade File Sync and Share Solutions - TopiaThe Critical Need for Enterprise-Grade File Sync and Share Solutions - Topia
The Critical Need for Enterprise-Grade File Sync and Share Solutions - Topia
 
Enterprise Content Management 101 for Government
Enterprise Content Management 101 for GovernmentEnterprise Content Management 101 for Government
Enterprise Content Management 101 for Government
 
Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012Why You Need to Consider Cloud-Based Security in 2012
Why You Need to Consider Cloud-Based Security in 2012
 
Managed File Transfer White Paper
Managed File Transfer White PaperManaged File Transfer White Paper
Managed File Transfer White Paper
 
Enterprise Compliance in SharePoint and Office 365
Enterprise Compliance in SharePoint and Office 365Enterprise Compliance in SharePoint and Office 365
Enterprise Compliance in SharePoint and Office 365
 
Taming the West: ECM and RM in SharePoint 2010
Taming the West: ECM and RM in SharePoint 2010Taming the West: ECM and RM in SharePoint 2010
Taming the West: ECM and RM in SharePoint 2010
 
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...
eFolder Webinar — More than Dropbox: Five Unique File Sync Deployments for th...
 
Using The Internet As A Translators Reference Tool[1]
Using The Internet As A Translators Reference Tool[1]Using The Internet As A Translators Reference Tool[1]
Using The Internet As A Translators Reference Tool[1]
 
The Concise Guide to E-Discovery
The Concise Guide to E-DiscoveryThe Concise Guide to E-Discovery
The Concise Guide to E-Discovery
 
Movin on Up SPSHouston 2017
Movin on Up SPSHouston 2017Movin on Up SPSHouston 2017
Movin on Up SPSHouston 2017
 
Enterprise Content Management 101 for the Hospitality Industry
Enterprise Content Management 101 for the Hospitality IndustryEnterprise Content Management 101 for the Hospitality Industry
Enterprise Content Management 101 for the Hospitality Industry
 
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22
Gigaom-Intralinks Webcast on %22Harnessing the tyranny of autonomy%22
 
SharePoint Meets ECM 2011
SharePoint Meets ECM 2011SharePoint Meets ECM 2011
SharePoint Meets ECM 2011
 
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010 Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
Whitepaper : Why Third-Party Archiving is Still Necessary in Exchange 2010
 
5. e20 impact keynote_benefits from e20_as
5. e20 impact keynote_benefits from e20_as5. e20 impact keynote_benefits from e20_as
5. e20 impact keynote_benefits from e20_as
 
Enterprise Content Management 101 for Financial Services
Enterprise Content Management 101 for Financial ServicesEnterprise Content Management 101 for Financial Services
Enterprise Content Management 101 for Financial Services
 
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable f...
 
Are you giving your users the best online experience - Webinar
Are you giving your users the best online experience - WebinarAre you giving your users the best online experience - Webinar
Are you giving your users the best online experience - Webinar
 

Plus de Osterman Research, Inc.

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsOsterman Research, Inc.
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessOsterman Research, Inc.
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...Osterman Research, Inc.
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Osterman Research, Inc.
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveOsterman Research, Inc.
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsOsterman Research, Inc.
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Osterman Research, Inc.
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaOsterman Research, Inc.
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?Osterman Research, Inc.
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Osterman Research, Inc.
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsOsterman Research, Inc.
 
Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Osterman Research, Inc.
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantOsterman Research, Inc.
 

Plus de Osterman Research, Inc. (20)

Best Practices for Managing Archive Migrations
Best Practices for Managing Archive MigrationsBest Practices for Managing Archive Migrations
Best Practices for Managing Archive Migrations
 
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessUsing Email, File, Social Media and Mobile Archiving to Grow Your Business
Using Email, File, Social Media and Mobile Archiving to Grow Your Business
 
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
The Need for Third-Party Security, Compliance and Other Capabilities in Micro...
 
Managing BYOD in Corporate Environments
Managing BYOD in Corporate EnvironmentsManaging BYOD in Corporate Environments
Managing BYOD in Corporate Environments
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365Survey Report: Results of a Survey on Microsoft Office 365
Survey Report: Results of a Survey on Microsoft Office 365
 
How the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less ExpensiveHow the Cloud Can Make Government Archiving More Secure and Less Expensive
How the Cloud Can Make Government Archiving More Secure and Less Expensive
 
A Better Method of Authentication
A Better Method of AuthenticationA Better Method of Authentication
A Better Method of Authentication
 
Putting IT Back in Control of BYOD
Putting IT Back in Control of BYODPutting IT Back in Control of BYOD
Putting IT Back in Control of BYOD
 
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsMobile Devices in the Enterprise: MDM Usage and Adoption Trends
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
 
Key Issues in eDiscovery
Key Issues in eDiscoveryKey Issues in eDiscovery
Key Issues in eDiscovery
 
Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010Why Third-Party Archiving is Still Necessary in Exchange 2010
Why Third-Party Archiving is Still Necessary in Exchange 2010
 
Why All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social MediaWhy All Organizations Need to Manage and Archive Social Media
Why All Organizations Need to Manage and Archive Social Media
 
What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?What is the Total Value of Ownership for a Hosted PBX?
What is the Total Value of Ownership for a Hosted PBX?
 
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
Taking a Strategic Approach to Unified Communications: Best of Breed vs. Sing...
 
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsCloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
 
Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...Important Issues for Federal Agencies to Consider When Using Social Media and...
Important Issues for Federal Agencies to Consider When Using Social Media and...
 
Making Office 365 More Secure and Compliant
Making Office 365 More Secure and CompliantMaking Office 365 More Secure and Compliant
Making Office 365 More Secure and Compliant
 
The Policy Survey Project: Fall 2011
The Policy Survey Project: Fall 2011The Policy Survey Project: Fall 2011
The Policy Survey Project: Fall 2011
 
Spam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a ThreatSpam Morphs from a Nuisance to a Threat
Spam Morphs from a Nuisance to a Threat
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Making File Transfer Easier, Compliant and More Secure

  • 1. WHITE PAPER Making File Transfer Easier, Compliant and More Secure ON An Osterman Research White Paper Published February 2012 SPONSORED BY ! ! ! ! ! ! sponsored by ! ! ! sponsored by sponsored by SPON ! ! ! ! ! ! sponsored by sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 • Black Diamond, Washington • 98010-1058 • USA Tel: +1 253 630 5839 • Fax: +1 253 458 0934 • info@ostermanresearch.com www.ostermanresearch.com • twitter.com/mosterman
  • 2. Making File Transfer Easier, Compliant and Secure Executive Summary Email is the primary file-transfer solution in just about every organization. For example, an Osterman Research surveyi found that only 22% of emails contain attachments, but more than 90% of the bits flowing through an email system are accounted for by these attachments. The reasons for using email as a file-transfer solution are simple: email is ubiquitous, it is based on industry standards, and it is very easy to use as a drag-and-drop file transfer utility. However, email was never designed as a file-transfer system and users and organizations suffer from using it this way: Individually focused solutions, many of • Email systems become bloated with content, they become which operate in the more difficult and more time-consuming for IT staffers to cloud, can provide manage, and the costs of email management are much good functionality higher than they should be. for users as an alternate method for • Content sent through email is largely unmanaged, offering senders no assurance that recipients have received sending files, but attachments, that the content was not modified by the many lack corporate recipient or some intermediate party along the way, and governance with no control over access to it. capabilities that will allow centralized • Departments and workgroups cannot gain access to this management and shared data unless they happen to be on the sender’s list of control over content. recipients. • Organizations experience much greater exposure to data breaches and the associated financial and other consequences of losing control of sensitive corporate data. Individually focused solutions, many of which operate in the cloud, can provide good functionality for users as an alternate method for sending files, but many lack corporate governance capabilities that will allow centralized management and control over content. While many organizations have legacy FTP systems in place to act as an alternate channel for sending files, these systems suffer from lack of governance and lack of security, not to mention the fact that IT must manage this legacy infrastructure that most users don’t employ anyway. Other file-transfer alternatives to email, such as physical delivery, are very expensive and much slower. KEY TAKEAWAYS Consequently, what organizations need is: • A way for users to send files independently of email that will address the critical requirements for corporate governance and information security. These types of transfers are truly legitimate, business-oriented activities that don’t come on a regularly scheduled basis – performing these transfers is essential to user productivity. ©2012 Osterman Research, Inc. 1
  • 3. Making File Transfer Easier, Compliant and Secure • Moreover, such a system must integrate seamlessly into the way that individuals work if they are to use it. This includes the increasing need to work from either personal or work- provisioned smartphones and tablets. • The solution should allow internal users to share corporate files across organizational boundaries without having to rely on IT to provision licenses. • Finally, such a solution should ideally be less expensive than using email and other solutions for file transfer in order to achieve additional benefits. ABOUT THIS WHITE PAPER This white paper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the four sponsors of this white paper – Accellion, Inc., Attachmate, FileCatalyst and Ipswitch File Transfer – and their relevant solutions. The Current State of File Transfer HOW CONTENT IS SENT TODAY Most email users employ email as the primary way to send files like word processing documents, spreadsheets, presentations, images and other content. In fact, Osterman Research has calculated that more than 90% of the bits that are sent through email systems are actually attachments to email messages and not the messages themselves. There are a number of good reasons for using email as the default file-transfer mechanism, including: • Email is very easy to use and requires minimal training in order to send attachments. • Email systems are built on industry standards and provide users with a high degree of assurance that their emails can be received and opened by recipients (albeit without proof that their attachments have actually been received by the recipients). • Virtually every corporate user and consumer has email available on a wide range of platforms (desktop client at work or home, laptop, browser, smartphone, tablet, etc.) As a result, email has become the default way to send files in almost all organizations. While other tools – such as FTP systems, instant messaging and physical delivery – are used to send electronic files, consumer file-sharing applications, email continues to be the primary platform that individuals use to send electronic content. CHANGING TRENDS IN FILE TRANSFER There are a number of important trends taking place in the context of how attachments are managed: • Attachments are getting larger Attachments are becoming larger as users create more content: word processing documents, spreadsheets, videos, presentations, PDF files, and other materials. This is particularly true as the use of video increases for training and other purposes, and as ©2012 Osterman Research, Inc. 2
  • 4. Making File Transfer Easier, Compliant and Secure content authoring tools become more sophisticated. • Data security is becoming more important Another important trend in managing content is the growing importance of data breach prevention. Motivated by compliance regulations, growing concerns over data leaks, and protection of intellectual property, IT needs greater visibility into who is transferring content and the types of content that are sent. • File-sharing and synchronization applications are becoming more popular There is growing use of file-sharing and data synchronization applications, such as Dropbox and SugarSync, that are very useful, but that create the potential for leakage of intellectual property and other data breaches. • Organizations are more globally distributed As organizations, their business partners and their supply chains become more globally distributed, there is a need to improve the speed and the reliability of file transfer for sharing critical documents, such as design documents between a company in North America and its manufacturing partners in Asia. • Content lifecycle management is also more important Increasingly, IT and individual users need better visibility into how content is sent, who has access to it, the assurance of its delivery, and how long content is available. • Email is being used more Although there are many alternatives for communication, collaboration and file transfer, the use of email continues to Content on FTP increase. For example, a September 2011 Osterman systems is often Research survey found that the average email user sends unmanaged, leading and receives 145 emails on a typical workday. Moreover, to corporate 42% of those surveyed reported that they are using email governance more than they did 12 months earlier, while only 10% problems. It can sit reported using email less over the same time period. on an FTP server for many years, leading • Telework and remote work are becoming more common to potential data Employees, contractors and temporary workers are breaches from becoming more distributed as companies implement unauthorized parties telework/work-from-home policies to reduce the costs of outside a company, rent and other expenses associated with providing or unauthorized employees office space. The result is that employees who access to individuals can no longer work together physically now rely more on inside the company. the sharing of documents by email in order to collaborate on projects. Closely related to this is the shift to BYOD (Bring Your Own Device) mentality among employees who increasingly use personal smartphones and tablets to do their work. ©2012 Osterman Research, Inc. 3
  • 5. Making File Transfer Easier, Compliant and Secure The Problem With Current File Transfer Methods CONSUMER FILE-SHARING APPS LACK CORPORATE GOVERNANCE Another issue is that IT typically lacks control over content that is sent outside an organization (and often within it), because unsanctioned use of various free solutions for transferring files is prevalent behind corporate firewalls. While many of these consumer-focused solutions are quite useful and work as advertised, they often do not provide IT with the tools to centrally manage corporate content. In the typical scenario, while IT may be charged with archiving or otherwise managing content for legal, regulatory or other purposes, it lacks the ability to fully control the flow of information sent through email. Further, IT has almost no visibility into content that is sent via means other than email, such as cloud-based file transfer tools, overnight packages, USB drives, personal email, etc. Related to this problem is that performing audits on or delivery verification of externally sent content is difficult in many cases. For example, if a user sends a time-sensitive proposal to a recipient through email, usually the only way to verify the delivery of this content is to send another email or call the recipient. Most email systems do not provide the ability to track the flow of content from sender to recipient throughout the entire transfer process. FTP SYSTEMS ARE NOT AS SECURE AS THEY SHOULD BE The venerable FTP systems that have been deployed in most organizations are useful for sending large files, but they suffer from two serious problems: • First, they lack security because so many users share login credentials for the occasional large file transfers for which they use these systems. • Second, content on FTP systems is often unmanaged, leading to corporate governance problems. For example, a user can employ FTP to send a large file, but there is no management of the data once the file has been sent. It can sit on an FTP server for many years, leading to potential data breaches from unauthorized parties outside a company, or unauthorized access to individuals inside the company. GROWING STORAGE IN EMAIL IS A MAJOR PROBLEM Many of the problems associated with managing email are directly related to its use as a file- transfer system. For example, an Osterman Research reportii published in September 2011 found that four of the top five problems in managing email systems are directly related to email’s use as a file-transfer and storage system: • Increasing backup and restore times (54% cite this as a serious or very serious problem) • Increasing message size (48%) • Lack of messaging-related disk space (40%) • Mailboxes are overloaded (39%) Because email storage is growing in excess of 20% annually, these problems will get significantly worse over time. The result is that costs are driven up because more storage is being deployed in corporate email networks, more IT time is needed to manage email systems, and overall email system ©2012 Osterman Research, Inc. 4
  • 6. Making File Transfer Easier, Compliant and Secure performance degrades. It is important to note that the issue is not the cost of storage itself, since the cost of storage hardware is actually declining fairly dramatically over time. Instead, the issue of storage is the cost of IT deploying and managing it – this can be anywhere from five to eight times the cost of the storage solutions themselves. FILE TRANSFER CONSUMES LOTS OF EFFORT Managing file transfer is a relatively time-consuming effort for IT staff. If FTP systems are used, then IT must manage FTP servers and deal with user issues as they arise. If email is used instead of FTP or – more commonly – in addition to it, then IT must spend time dealing with email problems that are caused by the use of email as the file transfer backbone, as discussed above. RELIABILITY AND SPEED OF FILE TRANSFER NEEDS IMPROVEMENT One of the fundamental problems with FTP is its reliability. For example, FTP cannot inherently recover from an error, it does not send an alert when a problem has occurred, and it has problems with very large files in some situations. Moreover, FTP will often not maximize the available bandwidth, sending files at a maximum speed that is only a fraction of the available bandwidth. This not only means that transfers take much longer than necessary, but that the value of the purchased bandwidth is not being realized. THERE ARE INADEQUATE MOBILE SOLUTIONS Another problem with conventional file transfer solutions is that there are not a lot of good solutions for mobile users. While some cloud-based file transfer or file synchronization solutions offer good mobile capabilities, these consumer-focused often do not fit well in an enterprise environment because they do not allow IT to govern content as they should – the solutions work A dedicated and well for individuals, but not for the organization as a whole. secure file transfer solution can make FINDING DATA IS NOT EASY life much easier for A serious problem with current file transfer capabilities is that the IT department in they do not allow data to be found easily, if at all. For example, a number of ways, if users are employing any of the easy-to-use cloud-based file by reducing the transfer or file synchronization solutions, they have addressed reliance on email as their personal requirements for file transfer. However, what the file transfer happens when the organization needs to perform an early case backbone, by assessment in advance of a legal action or a regulatory audit? allowing IT to What happens when they need to go through an e-discovery exercise or perform a legal hold? The dispersion of data across manage corporate the various file transfer solutions that might be in use in an data in compliance organization – and the inaccessibility of these data stores to IT with corporate or legal – can create serious problems for an organization when policies, and by they need to find data in a timely manner, assuming that they eliminating non- can even access it at all. secure solutions that force IT staffers to CONTENT IS NORMALLY SENT UNENCRYPTED scramble when e- The majority of emails and their attachments are sent by users discovery or other without any encryption. This not only increases the potential problems arise. for sensitive or confidential information to be exposed to ©2012 Osterman Research, Inc. 5
  • 7. Making File Transfer Easier, Compliant and Secure unauthorized parties, but it increases the risk of non-compliance with a growing variety of legal and regulatory obligations to protect sensitive data in transit. For example, 46 of the 50 US states now have data-breach notification laws, and two US states (Nevada and Massachusetts) have enacted statutes that require the encryption of certain content types when sent to individuals in those states. Content that is not encrypted can create enormous liabilities for an organization that suffers a data breach caused by unencrypted email being exposed or lost, even if the owners of that information do not suffer any harm as a result. THE BOTTOM LINE: A DEDICATED, SECURE FILE TRANSFER SOLUTION IS NEEDED The fundamental issue, then, is that organizations need a dedicated and secure file transfer solution to address two important issues: • To ease the burden on IT A dedicated and secure file transfer solution can make life much easier for the IT department in a number of ways, by reducing the reliance on email as the file transfer backbone, by allowing IT to manage corporate data in compliance with corporate policies, and by eliminating non-secure solutions that force IT staffers to scramble when e-discovery or other problems arise. • To reduce corporate risk More importantly, such a file transfer solution can substantially reduce corporate risk by putting all corporate data under the centralized management of the IT department, compliance department or some other authority within the organization instead of under the control of individual users. This can dramatically reduce the potential for data breaches, lost data, spoliation of data in legal actions, or an inability to meet regulatory or other corporate governance requirements. Important Considerations in Selecting a Solution The choice of a file transfer solution will be dependent on a number of factors, including the size of the organization, how distributed its employees are, the industry(ies) it serves, the regulations that it must satisfy, its corporate culture and other factors. However, there are a number of issues that decision makers should consider as they evaluate the best file-transfer solution for their organization: • Make it easy for users and align with existing processes One of the most important considerations in selecting a managed file transfer solution is to integrate it as seamlessly as possible into the way that employees work today. A solution that requires a fundamentally different approach to file transfer, or that requires significant training for end users, simply won’t be used and will be a wasted investment. The key is to deploy a solution that is as easy to use as consumer-oriented, cloud-based file-sharing options, but that do not create a paradigm shift. • Reduce (or at last don’t add to) IT costs Another important consideration is to use managed file transfer as a way of addressing the significant costs associated with IT having to manage existing storage and other problems ©2012 Osterman Research, Inc. 6
  • 8. Making File Transfer Easier, Compliant and Secure in email and FTP. Because the costs associated with storage-related problems in email systems can sap IT budgets, not to mention the costs associated with managing FTP servers and the like, a managed file transfer system can actually pay for itself in short order by reducing these costs. While a managed file transfer solution should be able to reduce storage and related costs, at a minimum the solution should not add to the IT department’s budget requirements. • Allow the management of content throughout its life cycle One of the fundamental benefits of a managed file transfer solution is its ability to manage content throughout its lifecycle. Unlike the case with most email and FTP systems in which content is largely unmanageable after it is sent, the right managed file transfer system will permit content to be managed by the senders and by IT with capabilities like making the content available only for a certain period of time or allowing its access only by authorized parties. This will make data breaches much less likely and will improve the ability to manage data in accordance with regulatory, legal and corporate policy requirements. Additionally, some solutions go beyond file transfer to offer file sharing, sync, commenting, and online workspaces for increased collaboration and productivity. • Satisfy current and anticipated corporate governance requirements Corporate governance of data is becoming a much bigger issue as state, provincial and national governments are increasingly focused on data breaches and the consequences associated with them. Given that 2011 saw a number of major data breaches, we anticipate that laws and corporate policies focused on governing data will become stricter in 2012 and beyond. A robust managed file transfer solution will be able to satisfy current governance requirements – such as HIPAA, Sarbanes-Oxley and PCI DSS – and address future ones, as well. • Improve the performance over conventional file transfer While most organizations will not frequently send multi-gigabit files, another important consideration in selecting a file transfer solution to replace FTP or other protocols will be to improve the speed of transfer. This improves the delivery time for very large files and makes better use of available bandwidth. A good managed file • Allow anywhere, anytime, any device access transfer solution will The ability to send and receive content using a managed file have a robust mobile transfer solution should be universal, allowing users to send from any device and from any location. Consequently, a capability that will good managed file transfer solution will have a robust support all of the mobile capability that will support all of the smartphone and smartphone and tablet platforms in use by an organization, as well as from tablet platforms in more traditional venues like desktops, laptops and Web use by an organ- browsers. ization, as well as from more • Meet departmental and workgroup needs, not just traditional venues individual needs like desktops, There are several good managed file transfer solutions that laptops and Web can satisfy individual requirements for sending large files browsers. independently of email. However, most organizations will ©2012 Osterman Research, Inc. 7
  • 9. Making File Transfer Easier, Compliant and Secure need a sharing and syncing solution that can satisfy the needs of departments and workgroups, as well as meet the needs of the overall organization, in order to satisfy the collaboration requirements of individuals and groups who must work together. • Provide granular file and folder access control A robust managed file transfer solution will enable granular file and folder access control so that individual files and folders can have access rights or specific availability periods applied to them. Related to this is the need to apply appropriate security to content so that only those users who are authorized to access content can view or download files. Moreover, granular expiration periods need to be applied to certain types of data so that it is no longer available after a certain date or time. • Provide tamper proofing and audit trail capabilities It is imperative that any managed file transfer solution prevent content from being modified. For example, a contract or proposal must be not be modified from the original unless the sender has authorized the changes. Moreover, a good managed file transfer system will provide robust auditing capabilities so that anyone who accesses content will be logged and their attempted changes captured. Both of these capabilities are critical to prevent charges of spoliation of evidence, and to apply appropriate governance to corporate content. Summary While email is universally deployed and has become the de facto file transport system for most users and most organizations, there are inherent problems with this method of sending content. Not least among the problems are the enormous strain placed upon email systems, the inability to appropriately govern content when sent through email, and the significant risks associated with data breaches and evidence spoliation. To address these problems, every organization should deploy a managed file transfer solution. Doing so will reduce many of the storage-related and other problems associated with email systems, and will reduce overall corporate risk. The appropriate managed file transfer solution will provide granular control over content and minimize the impact on users’ workflows and work patterns. ©2012 Osterman Research, Inc. 8
  • 10. Making File Transfer Easier, Compliant and Secure Sponsors of This White Paper Accellion, Inc. provides enterprise-class mobile file sharing solutions that enable secure anytime, anywhere access to information while ensuring enterprise security and compliance. The world’s leading corporations and ! government agencies use Accellion to protect Accellion intellectual property, ensure compliance, improve 1804 Embarcadero Road business productivity and reduce IT costs. Suite 200 Palo Alto, CA 94303 Founded in 1999, Accellion file sharing solutions can be USA deployed on public, private and hybrid cloud environments and provide the ease-of-use business +1 650 485 4300 users need while giving the enterprise organization the www.accellion.com! flexibility, scalability and protection it needs. Accellion is a profitable, well-funded, private company with more than 9 million users and 1,400 enterprise organizations that have deployed Accellion with a more than 96 percent annual renewal rate. Current customers include Procter & Gamble; Activision; Indiana University Health; Kaiser Permanente; Foley & Mansfield; Lovells; Bridgestone; Ogilvy & Mather; Harvard University; Guinness World Records; US Securities and Exchange Commission; and NASA. For more information please visit www.accellion.com or call (650)-485-4300. Connect with Accellion: Web: http://www.accellion.com Twitter: http://www.twitter.com/accellion Facebook: http://www.facebook.com/accellion LinkedIn: http://www.linkedin.com/companies/accellion Attachmate delivers advanced software for secure and managed file transfer, terminal emulation, legacy ! modernization, and enterprise fraud management. Three decades of IT innovation, a solid reputation for Attachmate Corporation customer satisfaction, and a local support presence in 1500 Dexter Avenue N. regions throughout the world have distinguished Seattle, WA 98109 Attachmate in the marketplace. In fact, the vast USA majority of Global 10,000 companies use our +1 206 217 7100 technologies to execute billions of transactions every www.attachmate.com! day. Attachmate® FileXpress® delivers the full spectrum of secure and managed file transfer solutions. For example, FileXpress can help you: ©2012 Osterman Research, Inc. 9
  • 11. Making File Transfer Easier, Compliant and Secure • Reduce helpdesk calls from end users who need to send large email attachments inside and outside the company. • Implement security controls and comply with data security regulations for your business-to- business file exchanges. • Automate the movement of files between the systems in your datacenter and between corporate and branch locations Attachmate FileXpress helps IT organizations that are looking to maintain a reliable data infrastructure, balance data security with business efficiency, and respond quickly to new business initiatives. With FileXpress providing secure and managed file transfer services, your organization will be able to protect its business data supply lines, leverage data security to improve efficiency, and quickly build supportable file transfer capabilities into your custom applications. FileCatalyst, created by Unlimi-Tech Software, is a software platform designed to accelerate and manage file transfers. FileCatalyst is immune to the effects that latency and packet loss have on traditional file transfer methods like FTP, HTTP or CIFS. Global organizations ! ! use FileCatalyst to solve issues related to file transfer, Unlimi-Tech Software, Inc. including content distribution, file sharing and offsite Suite 205, 1725 St. Laurent Blvd. backups. Ottawa, ON K1G 3V4 The FileCatalyst transfer protocol is much faster than Canada FTP, and is capable of reaching 10 Gbps speeds. Compare transfers for a 10GB file (more than two +1 613 667 2439 DVDs): www.filecatalyst.com! FileCatalyst Speed Latency (ms) FTP Transfer Time Transfer Time 100 Mbps 100 8 hr 18 min 14 min 10 Gbps 100 53 min 14 sec FileCatalyst Webmail – built on the FileCatalyst platform – solves the problem of large file transfers by securely storing files on your own server while using email for communication. The process of sending a file is virtually identical to that of sending an email attachment, making adoption painless. Files sent with Webmail generate a transactional history that provides governance as well as audit information. Additional features include online storage boxes, user groups, LDAP/Active Directory integration and an Outlook plugin. ©2012 Osterman Research, Inc. 10
  • 12. Making File Transfer Easier, Compliant and Secure FileCatalyst Workflow, also built on the FileCatalyst platform, combines two powerful web-based managed file transfer workflows: submission and distribution. Users may submit files to your organization for processing, with full tracking at every stage; or they may securely distribute files to anybody with an email address. Additionally, one or more “file areas” allow users to store files in your organization's private cloud for online access from anywhere in the world. Ipswitch File Transfer offers secure, managed file transfer (MFT) solutions that are fast to implement, easy to use, and backed by exceptional customer support. Ipswitch solutions are used around the world by thousands of organizations, including more than 90% of Fortune 1000 enterprises, many government agencies and millions of individuals. With a range of solutions that ! offer visibility, management and enforcement capabilities to suit a wide variety of compliance, Ipswitch, Inc. governance, company and user requirements. Ipswitch 83 Hartwell Avenue has long been an innovator when it comes to helping Lexington, MA 02421 people and companies move data and files securely. USA Positioned as a Leader in the Gartner 2009 Magic +1 781 676 5870 Quadrant for Managed File Transfer, Ipswitch is the only www.ipswitchft.com! company in this space to offer the full spectrum of products that address the needs of the MFT Maturity Model, from simple person-to-person through to enterprise-level B2B integration. Our products are sold worldwide via eCommerce, direct sales, distributors and resellers. ©2012 Osterman Research, Inc. 11
  • 13. Making File Transfer Easier, Compliant and Secure © 2012 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader’s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, “Laws”)) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL. i Source: Results of a Survey on End User and IT Messaging Issues; Osterman Research, Inc.; published April 2010 ii Source: Content Archiving Market Trends, 2011-2014; Osterman Research, Inc.; published September 2011 ©2012 Osterman Research, Inc. 12