Repeatable Across New Applications and New Trading Partners

Paul French, VP, Product & Solutions Marketing, Axway

“FTP has the perception of being wonderfully inexpensive, but really what it is, it’s reinventing the wheel every single time. It’s a blank sheet of paper, and you have to have a human go in and make specific decisions on what you expect that thing to do, and very rarely is it documented, very rarely is it done in a way that is repeatable across new applications, new trading partners, new security models, etc. So it creates a long-term cost drag. Every time you want to make a change, you have to find some human to deconstruct what was done and re-do it. Every time you want to roll something else out you have to start from scratch, which means your speed to market, your speed to deliver value to the business, is slower than it needs to be.”

Cater to All the Flows

A commentary by Antoine Rizk, VP, B2B Program, Product and Solutions Marketing, Axway, on the article “Consolidation, Virtualization Top State Government CIO Priorities”

“Consolidation is an important measure for IT savings. Not only for IT savings and cost-cutting but also it brings value and adds security, which the survey doesn’t say. It adds security because consolidation makes data flows centralized and governments more efficient. What they need to do when they look at consolidation is make sure that, at least for middleware, make sure that the consolidated platform can cater to all the flows which they see in government administration.”

Process Management: 3 Key Usage Patterns

Cedric Monier, Director, Integration Corporate Program – Product & Solution Marketing, Axway

Managed File Transfer and Health Information Exchange (HIE)

Ruby Raley, Director, Healthcare Solutions, Axway

Data Security to the Files at Rest: A Commentary on the Wall Street Journal’s “Data Theft Hits 3.3 Million Borrowers”

Paul French, VP, Product & Solutions Marketing, Axway

Paul French comments on the Wall Street Journal’s “Data Theft Hits 3.3 Million Borrowers”

Plugging the Holes

Ruby Raley, Director, Healthcare Solutions, Axway

Three Words to Say to C-Level Management About Complete MFT Data Security (Pt. 3)

by Shawn Ryan
VP Technology Marketing & Chief Architect

(To read the first two parts of this blog post, click here and here.)

Is this overkill for file based patterns? Few would argue against a statement of complete data security. However, I think “overkill” arguments could be twofold.

One might be, “I’ve never heard of MFT.” Another might be, “I’m sure we do managed file transfer, I just don’t know where.”

The reality is that anybody who has ever sent a PowerPoint attached to an email, an Excel file attached to an email, has moved a file. Arguably every organization conducting business electronically has moved a file.

Critical transactions supporting your business, such as procurement processes (procure to pay), any order-to-cash-associated transactions done over EDI, payments done electronically, etc.—these are all file transfers over a B2B channel.

Do you have any legacy applications on mainframes, UNIX, as/400s, etc., that you’re integrating with more modern applications? Most companies do. And in the process of managing these different applications, they’re moving files between systems internally. What is the link from internal applications to B2B channels?

You have B2B channels. You have internal applications that generate and consume files. Files move within and throughout your organization on a regular basis, and without a strategy to address governance for all of these transactions, you’re putting your organization at risk.

Finally, but not least of all—let’s consider the human side.

We send emails with attachments, share documents, move files over insecure channels (e.g., FTP, email, USB stick, etc.) and for all of us there has been no common governance over the wild array of options, no easy way to secure this given all the end-user options out there. Times have changed; a level of control and a level of governance on top of all business interactions is possible.

Again, we’re talking about eighty percent of your data. You may have an ESB strategy internally. You may have a number of different strategies you’ve brought online. But are you addressing all systems, all data and all information now? If you can’t answer that question with a yes, you risk your organization, you risk your brand, you risk it all.