How Much Does Your File Transfer Infrastructure Cost You?

Paul French, VP, Product & Solutions Marketing, Axway

“How hard is it to move a file? It turns out that the answer to that is twofold. On the most base level, how hard is it to move a file? It’s not so hard. It’s easy to move a file from one platform to the same platform. Or from one box to the same box, depending on the way the architecture or the infrastructure is. But now think about how hard is it to move hundreds of thousands of files, make them encrypted files, make them encrypted files that live inside a strong SLA, make them encrypted files inside a strong SLA with a larger-scale industry or regulatory compliance. And before you know it, the answer to the question is, ‘It’s pretty hard to move a file.'”

A Tough Road

John Wilson, Director of Solution Enablement – FSI, Axway

“In recent times, regulatory pressures have grown dramatically. With the Financial Services Modernization Act, or, as it’s more commonly known, Gramm–Leach–Bliley, and the more recent Dodd–Frank Act, stricter rules are being enforced on the industry. A major focus has been around the area of risk management. As part of these new acts, new visions are being created, specifically to monitor risk and enforce safeguards for data. It’s going to be adding a lot more oversight to this area. As noted in a recent whitepaper by JWG, they highlight the fact that the minimalistic approach to risk architecture that many financial institutions have taken so far is not even enough to cover current regulations.”

What is the Optimal Business Process?

Joe Fisher, EVP Worldwide Marketing, Axway

“Many times, what happens is that we don’t think about enablement, and we put technology in place and it actually becomes a dam or a force field against what the business is trying to accomplish. Typically, it’s growing top-line revenue, controlling costs, protecting the organization from compliance violations, keeping sensitive information secure, (and) protection of intellectual property. There’s a lot of different things we try to do. And the key thing is making sure that we always keep in mind the concept of enablement. How do we enable the business…to grow faster, but within the protected confines that are put up around the organization?”

Consolidation is a Worthwhile Endeavor

Antoine Rizk, VP, B2B Program, Product and Solutions Marketing, Axway

“Using the same B2B gateway for managing the EDI as well as the financial flow, thereby consolidating the management of the full order-to-cash cycle, makes sense, and really brings value. A corporation’s bottom line is directly impacted by its ability to synchronize financial chain information flow and supply chain information flow. So this consolidation of all flows and interaction patterns will reduce TCO and will enable you to have better control over both system and business-service governance.”

An Internal Managed File Transfer Strategy

Paul French, VP, Product & Solutions Marketing, Axway

“They’ve left out this concept of the file, because those infrastructures tend to do okay with small files, but large enterprises and even some small enterprises have lots and lots of large files. Files are everywhere. Files are the nature of collaboration. They’re the nature of integration in a lot of cases. So an internal MFT strategy is really the place where most of the potential operational improvement cost reduction, and, believe it or not, security risks, lie. We’ve spent so much time and effort looking outward at what the security risks might be and we’ve invested in secure Web gateways and in firewalls and in proxies and in all sorts of fun and exciting stuff to protect things going in and leaving the enterprise, we’ve forgotten that a huge percentage of data loss, of data breach, of challenges are associated with internal managed file transfer challenges.”

Secure from Start to Finish

Dave Bennett, CTO, Axway

A commentary by Dave Bennett, CTO, Axway, on the eWeek.com article “How to Assess Cloud-Based E-Mail Security Vendors”

“The challenging part to being just pure cloud is, ‘How do you support deployment models that might vary–appliance and software–versus in the cloud?’… When you look at enterprise vendors and you look at data loss prevention and secure email being on-prem, there’s a good reason why that’s the case, because if you think about what you’re trying to protect, you have to deal with the concept of start-to-finish protection. You can’t just assume that your cloud connection is secure from start to finish.”

Axway CSO Taher Elgamal Posts on DarkReading.com: “It’s About the User”

Axway CSO Taher Elgamal posted a blog post today on DarkReading.com, a news and information portal that focuses on IT security. Please take a look and share your thoughts!

“Inside enterprise applications, even before the web started, we had been strongly authenticating employees and contractors and making sure that only the right people got access to the right stuff. It only made sense that the authentication products and technologies that had enjoyed so much success in the enterprise world could be adapted to the e-commerce world. After all, both of these sets of products were labeled ‘authentication,’ so they must be the same thing, right?

“Not quite.”