« Previous 1 2
Secure data transfer with FTP alternative MFT
Transport Insurance
Examples
An example of MFT software is Policy Patrol MFT [10], which integrates fully into all popular email systems and classifies the attachments in outgoing messages according to defined policies. Another solution that uses MFT as its transmission technology is ShieldShare, by Swedish manufacturer BlockMaster [11]. An open source solution that uses MFT as its transmission technology, JADE (Job Scheduler Advanced Data Exchange, the successor to SOSFTP) [12], was developed by programmers from Germany (SOS GmbH), France (Paris SOS), and Switzerland (SOS AG). JADE offers private users a safe alternative to services like Dropbox. With JADE (Figure 1), the user can select from a range of technologies for transferring files, including WebDAV, UNC, and ZIP.
Other solutions integrate with email systems and extend the email user front end with appropriate buttons. The user must decide whether to classify attachments as confidential and then enable the appropriate function before transferring. If this function is overlooked, the attachments are sent unencrypted.
This solution is problematic in terms of data protection, and the company is liable for security breaches if the user does not follow instructions or misclassifies the attachment, and sensitive data gets into the wrong hands as a result.
Wherever businesses and individuals have primarily used FTP to transfer files, an MFT solution can be quite useful as a standalone application. These MFT systems often work just like email applications and try to duplicate their usability. A local client or a web application is used to send files; the sender must authenticate and then can send the recipient an encrypted message in the style of an email message, including attachments. Once the MFT system has become part of the user's daily grind, the overhead of duplicate administration of targets is something that speaks in favor of an integrated MFT system.
Collaboration and Sharing
MFT technology goes beyond secure data transfer in some of the solutions on offer today by unifying what are otherwise often parallel, isolated solutions, such as file sharing, e-collaboration, online storage, and secure data rooms. An overall solution that offers all of the MFT building blocks is not always useful and also not desired by each administrator. The software available on the market thus usually only provides partial solutions. Usability is often crucial for businesses. If MFT is not ergonomically integrated into standard applications, the extra overhead often causes users to work around the software or simply not use it.
In addition to MFT features for secure file sharing and secure data rooms is online storage that differs significantly from free services like Dropbox, in that all data are encrypted for storage. Because these services are hosted by the company itself, they offer the option of saving files in a private cloud. They also consist of a system for data encryption, as well as access and rights management. If the user data is stored locally in a container, editing is also possible without an Internet connection. When a connection becomes available later, the data is then synchronized and possibly versioned accordingly.
Conclusions
Overall, MFT is capable of exchanging large volumes of encrypted data over insecure public networks. Additional management features enable comprehensive reporting and auditing, as well as proof of successful delivery. To ensure compliance with national and international laws and regulations, it must not be possible to bypass or manipulate the system or for a user to forget to employ the feature. Classification of the files to be sent should not be left to the user; rather, it should be handled automatically by policies. High usability and integration into existing workflows or standard applications like email also increase acceptance. File sharing, e-collaboration, and secure data rooms all use the basic functions of MFT, but each must be optimized for the application in question.
Infos
- "Data Protection Laws, an Ocean Apart" by Natasha Singer, The New York Times , February 2, 2013, http://www.nytimes.com/2013/02/03/technology/consumer-data-protection-laws-an-ocean-apart.html?_r=0
- Directive 95/46/EC of the European Parliament and of the Council, http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML
- Commission proposes a comprehensive reform of data protection rules to increase users' control of their data and to cut costs for businesses, http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en
- Federal Data Protection Act (Bundesdatenschutzgesetz, BDSG): http://www.iuscomp.org/gla/statutes/BDSG.htm
- Sarbanes-Oxley Act: http://en.wikipedia.org/wiki/Sarbanes-Oxley_Act
- Payment Card Industry Data Security Standard: http://en.wikipedia.org/wiki/PCI-DSS
- ISO/IEC 27001: http://en.wikipedia.org/wiki/ISO_27001
- Basel II: http://en.wikipedia.org/wiki/Basel_II
- Overview of online storage: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/Download/Ueberblickspapier_Online-Speicher_pdf.pdf?__blob=publicationFile (in German)
- Policy Patrol MFT: http://www.policypatrol.com/managed-file-transfer/
- ShieldShare: http://www.blockmastersecurity.com/shieldshare-secure-file-sharing/
- JADE: http://www.sos-berlin.com/
« Previous 1 2
Buy ADMIN Magazine
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.