Three Words to Say to C-Level Management About Complete MFT Data Security (Pt. 3)

by Shawn Ryan
VP Technology Marketing & Chief Architect

(To read the first two parts of this blog post, click here and here.)

Is this overkill for file based patterns? Few would argue against a statement of complete data security. However, I think “overkill” arguments could be twofold.

One might be, “I’ve never heard of MFT.” Another might be, “I’m sure we do managed file transfer, I just don’t know where.”

The reality is that anybody who has ever sent a PowerPoint attached to an email, an Excel file attached to an email, has moved a file. Arguably every organization conducting business electronically has moved a file.

Critical transactions supporting your business, such as procurement processes (procure to pay), any order-to-cash-associated transactions done over EDI, payments done electronically, etc.—these are all file transfers over a B2B channel.

Do you have any legacy applications on mainframes, UNIX, as/400s, etc., that you’re integrating with more modern applications? Most companies do. And in the process of managing these different applications, they’re moving files between systems internally. What is the link from internal applications to B2B channels?

You have B2B channels. You have internal applications that generate and consume files. Files move within and throughout your organization on a regular basis, and without a strategy to address governance for all of these transactions, you’re putting your organization at risk.

Finally, but not least of all—let’s consider the human side.

We send emails with attachments, share documents, move files over insecure channels (e.g., FTP, email, USB stick, etc.) and for all of us there has been no common governance over the wild array of options, no easy way to secure this given all the end-user options out there. Times have changed; a level of control and a level of governance on top of all business interactions is possible.

Again, we’re talking about eighty percent of your data. You may have an ESB strategy internally. You may have a number of different strategies you’ve brought online. But are you addressing all systems, all data and all information now? If you can’t answer that question with a yes, you risk your organization, you risk your brand, you risk it all.

Leave a comment

No comments yet.

Comments RSS TrackBack Identifier URI

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s