SlideShare une entreprise Scribd logo
1  sur  8
The Need
Savvy end users are subscribing to free storage and FTP solutions in the cloud
to facilitate the collaboration and the exchange of documents too large for email.
The Problem.
The use of free Managed File Transfer services:
 Exposes corporate data unwanted leakage
 Exposes endpoints to potential infection from Trojans, Malware and Viruses
 Require users to go outside corporate boundaries thus defeating corporate
controls.
 IT has little or no control over personal cloud accounts
 Requires syncing to endpoints and installation of software at endpoints
 Compromises control of corporate image and messaging
 Causes data to be duplicated throughout the world in multiple data centers.
The cloud never forgets.
ShrinkMail
Manages your user’s exchange of files inside and outside of the organization.
ShrinkMail Automatically Manages:
 File upload and link distribution via HTTPS
 Credentialing for file retrieval
 Receipt notification and tracking
 Encryption and privacy (optional)
 File deletion after download
 Large inbound attachments
ShrinkMail
ShrinkMail integrates with your existing email system. Whenever an email's total
attachment size is greater than your allowable limits, ShrinkMail will automatically
remove the attachment(s) from the email and place them on a secure server for
download.
 Is designed to work in a virtual environment so there is no hardware to
purchase
 Is server based with no clients to manage at the endpoint
 Policy based, and compatible with all email servers
 Works for inbound and outbound messages
 Is regulatory compliant
You will now be able to:
 Block personal clouds such as dropbox, evernote and yousendit…
 Reduce your exposure to accidental data loss
 Facilitate the sending and receiving of files with no practical limitations on
size
 Be regulatory compliant for e-discovery
 Keep users in compliance with corporate policy as it pertains to data
handling
 Have better control on data usage for mobile devices
 Keep your data in your data center where it belongs
Optional features:
 Packet inspection for Data Loss Prevention
 S-MIME and one-time encryption for privacy
 Email backup, archive and discovery
To make us even more unique
We invoice in arrears on actual usage
We calculate per unique user per month
You only PAY for what you USE
Are you already using a licensed based Managed File Transfer service?
FMI:
Contact Kevin Rheaume
kevinr@pacifera.com
1-866-821-2946 x324

Contenu connexe

En vedette

FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceTransweb Global Inc
 
Cara Membangun FTP Server di Windows Server 2008
Cara Membangun FTP Server di Windows Server 2008Cara Membangun FTP Server di Windows Server 2008
Cara Membangun FTP Server di Windows Server 2008Muhamad Prasetyo
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Buku Konfigurasi Debian Server BLC Telkom by Aji Kamaludin
Buku Konfigurasi Debian Server BLC Telkom by Aji KamaludinBuku Konfigurasi Debian Server BLC Telkom by Aji Kamaludin
Buku Konfigurasi Debian Server BLC Telkom by Aji KamaludinSuro Dhemit
 
Ebook Konfigurasi Dasar Linux Debian 7.8
Ebook Konfigurasi Dasar Linux Debian 7.8Ebook Konfigurasi Dasar Linux Debian 7.8
Ebook Konfigurasi Dasar Linux Debian 7.8Walid Umar
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets LayerNascenia IT
 

En vedette (10)

FTP Client and Server | Computer Science
FTP Client and Server | Computer ScienceFTP Client and Server | Computer Science
FTP Client and Server | Computer Science
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Cara Membangun FTP Server di Windows Server 2008
Cara Membangun FTP Server di Windows Server 2008Cara Membangun FTP Server di Windows Server 2008
Cara Membangun FTP Server di Windows Server 2008
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Buku Konfigurasi Debian Server BLC Telkom by Aji Kamaludin
Buku Konfigurasi Debian Server BLC Telkom by Aji KamaludinBuku Konfigurasi Debian Server BLC Telkom by Aji Kamaludin
Buku Konfigurasi Debian Server BLC Telkom by Aji Kamaludin
 
Ftp server
Ftp serverFtp server
Ftp server
 
Ebook Konfigurasi Dasar Linux Debian 7.8
Ebook Konfigurasi Dasar Linux Debian 7.8Ebook Konfigurasi Dasar Linux Debian 7.8
Ebook Konfigurasi Dasar Linux Debian 7.8
 
Http Vs Https .
Http Vs Https . Http Vs Https .
Http Vs Https .
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Xampp installation
Xampp installation Xampp installation
Xampp installation
 

Dernier

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPTiSEO AI
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaCzechDreamin
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty SecureFemke de Vroome
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 

Dernier (20)

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 

Secure File Transfer

  • 1.
  • 2. The Need Savvy end users are subscribing to free storage and FTP solutions in the cloud to facilitate the collaboration and the exchange of documents too large for email.
  • 3. The Problem. The use of free Managed File Transfer services:  Exposes corporate data unwanted leakage  Exposes endpoints to potential infection from Trojans, Malware and Viruses  Require users to go outside corporate boundaries thus defeating corporate controls.  IT has little or no control over personal cloud accounts  Requires syncing to endpoints and installation of software at endpoints  Compromises control of corporate image and messaging  Causes data to be duplicated throughout the world in multiple data centers. The cloud never forgets.
  • 4. ShrinkMail Manages your user’s exchange of files inside and outside of the organization. ShrinkMail Automatically Manages:  File upload and link distribution via HTTPS  Credentialing for file retrieval  Receipt notification and tracking  Encryption and privacy (optional)  File deletion after download  Large inbound attachments
  • 5. ShrinkMail ShrinkMail integrates with your existing email system. Whenever an email's total attachment size is greater than your allowable limits, ShrinkMail will automatically remove the attachment(s) from the email and place them on a secure server for download.  Is designed to work in a virtual environment so there is no hardware to purchase  Is server based with no clients to manage at the endpoint  Policy based, and compatible with all email servers  Works for inbound and outbound messages  Is regulatory compliant
  • 6. You will now be able to:  Block personal clouds such as dropbox, evernote and yousendit…  Reduce your exposure to accidental data loss  Facilitate the sending and receiving of files with no practical limitations on size  Be regulatory compliant for e-discovery  Keep users in compliance with corporate policy as it pertains to data handling  Have better control on data usage for mobile devices  Keep your data in your data center where it belongs
  • 7. Optional features:  Packet inspection for Data Loss Prevention  S-MIME and one-time encryption for privacy  Email backup, archive and discovery
  • 8. To make us even more unique We invoice in arrears on actual usage We calculate per unique user per month You only PAY for what you USE Are you already using a licensed based Managed File Transfer service? FMI: Contact Kevin Rheaume kevinr@pacifera.com 1-866-821-2946 x324