Do you want a file transfer process that is secure? Or compliant?
Of course, the answer is "both".
Good business practice dictates data protection for you, your customers, and your business partners — including data-in-motion. But even the best security practices do not alleviate the need to comply with regulations and standards that can carry high contractual, civil and criminal penalties. Plus, the loss of faith of your customers or business partners can negatively impact your bottom line.
Secure file transfer typically includes moving files outside your firewall. Encrypted files are secure on an FTP server outside your firewall, but your Managed File Transfer software processing those files should sit securely inside your firewall.
Control access by limiting which users can set up and execute file transfers. Set up access controls to encrypt access data (e.g., passwords and pass-phrases), limit privileges based on the needs of each user, and terminate inactive sessions.
Automate secure file transfers to reduce errors and limit access to sensitive information. Running jobs automatically means that users do not need to know sensitive access information, such as user names, passwords, and pass-phrases.
Require user authentication to ensure only known users with unique privileges can access your Managed File Transfer software. Then, track all user activity by capturing data each time file transfer set-up data is changed.
Encrypt all files in a secure area before they are transferred to an FTP, web or email server in the DMZ. Using secure transmission protocols only protects data in transit. As soon as files are at rest on a server in the DMZ, they are vulnerable to attack.
Sign and verify files to ensure integrity and non-repudiation. Verifying signatures on every file ensures files have not been altered during transit and confirms the identity of the sender. In other words, the decrypted file is safe to be processed.
Use secure protocols to protect logon data and add extra protection to encrypted files being transferred. Without secure transmission protocols, an encrypted file can be captured intact during transit and attackers can work on decrypting the file at their leisure.
Encrypt data files with your own master key before archiving. Encrypting archival copies of files with your own master key before storing in a secure location creates a repository of secure files that are safe and meet your business needs.
Capture audit data to demonstrate regulatory and internal audit compliance. You can demonstrate regulatory compliance or confirm to a business partner the encryption key and destination location used by a specific file transfer job.
Monitor file transfer jobs to rapidly identify potential security risks. If a security breach occurs, you need visibility of the specific file transfer jobs affected and the ability to suspend them until the security breach has been corrected.
Could you pass a compliance audit?
Molina Healthcare needed to centralize secure file transfers with a solution that would integrate into their existing IT infrastructure. Diplomat MFT software simplified management of secure file transfers while meeting HIPAA compliance requirements.
Sign up once to download literature.
Have a question? Learn more about the free trial »
Diplomat Managed File Transfer software may NOT be downloaded or otherwise exported or re-exported to any parties in Cuba, Iran, North Korea, Sudan, or Syria. You agree not to directly or indirectly export or re-export (including by transmission) Diplomat Managed File Transfer software to any parties in the above countries without first obtaining any required export license or governmental approval.
By downloading or using Diplomat Managed File Transfer software, you are agreeing to the foregoing and you are representing and warranting that you are not located in and are not a national or resident of Cuba, Iran, North Korea, Sudan, or Syria.
DIPLOMAT MANAGED FILE TRANSFER SOFTWARE CONTAINS ENCRYPTION TECHNOLOGY THAT IS CONTROLLED FOR EXPORT BY THE U.S. BUREAU OF INDUSTRY AND SECURITY UNDER THE EXPORT ADMINISTRATION REGULATIONS. IN ADDITION TO OTHER RESTRICTIONS DESCRIBED IN THIS DOCUMENT AND THE DIPLOMAT MANAGED FILE TRANSFER LICENSE AGREEMENT, YOU MAY NOT USE DIPLOMAT TRANSACTION MANAGER, OR EXPORT DIPLOMAT MANAGED FILE TRANSFER TO ANY PARTY WHERE YOU KNOW, OR HAVE GOOD REASON TO BELIEVE, THAT DIPLOMAT MANAGED FILE TRANSFER MAY BE USED IN CONNECTION WITH THE PROLIFERATION OF NUCLEAR, CHEMICAL OR BIOLOGICAL WEAPONS OR MISSILES.
Diplomat Managed File Transfer software is classified under ECCN 5D992B.1 with CCATS # G049200 as of June 14, 2006 which authorizes these products for export and re-export under Section 742.15 (B) (2) of the Export Administration Regulations (“Review Requirement for Mass Market Encryption Commodities and Software Exceeding 64 Bits”).
Don't know which product to try? Get a recommendation »