Are you attending RSA Conference next week in San Francisco? If so, stop by booth #629 at the Moscone Center and say hello the Ipswitch team.
This will be my third year attending RSA. Not only and I’m looking forward to talking about how Ipswitch’s portfolio of Managed File Transfer solutions can solve the problems you’re experiencing with your current file transfer and B2B environment…. But I’m also looking forward to learning about topics like security attacks, data breaches, mobile threats, cloud security, and compliance along with the other 15,000+ people attending the largest security conference in North America.
If you’re going to be at RSA this year, stop by our Ipswitch booth (#629) to learn how we can help you:
- Mitigate security risks and data breach exposure. We’ll show you how to secure and control all files/data moving between systems and people — both internally and externally
- Reduce complexity by consolidating and replacing the various file transfer products, homegrown solutions, hard to maintain scripts, and tools people use to share files
- Increases productivity and efficiency by automating manual and labor-intensive workflows with a simple point-and-click interface – No scripting required
- Provide visibility and auditability into all data transfer and file sharing activities, including files, events, people, policies and processes
We hope to see you there.
As companies continue to include the cloud in their overall IT initiatives – taking advantage of elasticity, scalability, interoperability and mobility – concerns around management, governance and control of data are preventing some organizations from fully embracing cloud services.
In fact, according to the recent Ponemon cloud survey, over 30% of IT and compliance respondents claim that concerns about data security have kept their organization from adopting cloud services…. And approximately half place a high priority on security when evaluating cloud providers.
That being said, every company’s risk tolerance is different. Some of the variables in play that impact risk tolerance certainly include the type of information being moved and stored in the cloud, the industry (and associated compliance requirements) and of not only the company but also its business partners, as well as the specific security measures provided (or not provided) by cloud providers they are considering.
Not all cloud services are created equal. There are absolutely great differences in the measures different providers have taken to protect information they process and store in the cloud. A few security considerations include authentication and authorization as well as protecting data not only while it’s in transit to the cloud, but also while it remains there.
It’s no secret that more and more companies are turning to the cloud to benefit from all that it has to offer. Subscribing to a cloud service can offer conveniences over deploying software on-premises, including faster deployment, budgeting flexibility, built-in elasticity, near-perfect uptime and it can be significantly less taxing on IT resources.
Managed File Transfer (MFT) is certainly not being left behind in this cloud revolution. According to Gartner, adoption of MFT Cloud Services is growing rapidly and now accounts for approximately 10% of the overall MFT market. While both on-premises and cloud markets will continue to grow about 20% annually, cloud services will become a bigger piece of the MFT pie.
Here’s a nifty graph from the Ponemon Institute’s recently published “The Security of Cloud Infrastructure” report summarizing key cloud drivers from the perspective of both IT/Security and Compliance respondents. Interesting to see that many people believe that cloud services will provide improved security and compliance efforts over doing it themselves on-premises with their resource.
So, how do you feel about cloud security? Are you comfortable with your organization’s data being moved into the cloud?? What cloud security measures would make you feel better???
Let’s start to examine the impact of end-to-end visibility and ways it can be put to work for your organization. For starters, let’s dig into correlation.
Correlation involves identifying related actions and events as a file moves through a series of business processes (including what happens after a file is moved, renamed, or deleted), and using that information to make business decisions. Correlation can also associate file transfer metadata with downstream processes such as whether a product was shipped or an invoice was paid after an order was received from a customer.
Ipswitch’s Frank Kenney shares some thoughts in the video below on why correlation is an especially important part of visibility and how it enables you to really understand not only file transfers, but also the applications, processes, purchase orders and other items in your infrastructure that tie back to customers, SLA’s and revenue..
Correlation enables users to easily view all the events related to the transfer and consumption of a single file or set of files, including subsequent applications and resulting business processes. For example, they can track a file through a complete workflow and throughout its entire lifecycle, even if it was shared with a customer or business partner – critical insight that can impact the quality and timeliness of work, service level agreements, not to mention revenue and profitability.