Archive for June, 2010
Ipswitch File Transfer is going (more) global. We’re thrilled to announce the expansion of our already successful Ipswitch FT Partner Program. It now boasts a number of new benefits for our global partners, including a new Elite Partner Level and a deal registration program.
The Elite Level expansion was created for those partners looking for even greater association and support from Ipswitch File Transfer. A new deal registration program has also been introduced, which will incent resellers with additional discount points for registering qualified net new sales opportunities on the FT Partner Portal.
It’s been a while since I’ve seen “file transfer” as a headlining productivity problem for end users, but here it is making an appearance in an article about how hard it is to use the iPad in the context of an average end user’s collection of gear.
One of the interesting debates in the Managed File Transfer industry right now is how much file transformation really takes place between users and systems.
At one end of the spectrum, you have pure ad-hoc solutions (such as the modules for MOVEit DMZ and WS_FTP Server) that people often use to deliver Word documents, PDFs and engineering documents to each other for manual review. At the other end of the spectrum you have full EDI solutions that dictate and translate specific formats (e.g., ACH, HL7, etc.).
However, there is a great deal of territory in the B2B middle-ground that overlaps both MFT and EDI. For example:
- Word docs that need to automatically turn into PDFs.
- Messages that should be automatically retained for eDiscovery.
- Bulk sets of transactions that need to be split up and sent to a half-dozen mainframe applications.
- Text files that need to be PGP-encrypted.
- All of the above bundled into Zip files.
The truth is that most enterprise file transfer involves intelligent transformation or routing of one kind or another. If you agree, you might also agree that defining the line between MFT and EDI, EDI and B2B and MFT and B2B is very hard to do in practice.
Fortunately, Ipswitch has solutions that span ALL of these needs, from the pure ad-hoc through pure EDI, and they can be dialed up or down to meet tactical or strategic needs.
Here’s an interesting perspective on The Myth of Computer Security.
The myth: “With proper protection, your computer is immune to cyber attacks, viruses and other malware”.
The reality: “(We live in a world of) unprepared software. Microsoft and various security companies are doing their best against the bad guys, who are attacking faster and more creatively than the good guys can keep up”.
Unfortunately, I agree with the premise that computer attacks are becoming more organized, more advanced and more destructive. This is forcing vendors to come up with more complex solutions. As a result, we’re now seeing some extremely complex solutions do more damage themselves than good. The sad truth is that there is no perfect security solution out there and that they are all open to self-inflicted damage.
I think that commenter Red_Flag sums it up best by borrowing a line from author Max Brooks: “With computer security, as with zombie survival, ‘No place is safe, only safer’”.