Managed File Transfer

Services

We utilize best in class enterprise solutions to meet this very dynamic and challenging business solution. Our approach is simple in that we collect the business objectives, requirements, and potential regulatory requirements and apply our product knowledge to offer our customers the best fit solution to meet there objectives.

Integration

As part of Managed File Transfer we have experience with many organizations where as part of the total solution it is necessary to integrate MFT with existing solutions within that organization. We offer a wide variety of integration solutions in order to meet those unique requirements.

Reference for the information below: Wikipedia

Managed file transfer (“MFT”) refers to software or a service that manages the secure transfer of data from one computer to another through a network (e.g., the Internet). MFT software is marketed to corporate enterprises as an alternative to using ad-hoc file transfer solutions, such as FTP, HTTP and others.

Typically, MFT offers a higher level of security and control than FTP. Features include reporting (e.g., notification of successful file transfers), non-repudiation, auditability, global visibility, automation of file transfer-related activities and processes, end-to-end security, and performance metrics/monitoring.

MFT applications are available as both on-premises licensed software packages and software-as-a-service (“SaaS”). Some are specially designed for enterprise use while others are for sale to individual consumers. A few enterprise-focused SaaS MFT providers also manage the additions of new trading partners, which can free up a lot of IT (information technology) resources.

MFT applications are characterized by having all or most of the following features:

  • Support multiple file transfer protocols including FTP/S, OFTP, SFTP, SCP, AS2, and HTTP/S.
  • Securely transfer files over public and private networks using encrypted file transfer protocols.
  • Securely store files using multiple data encryption methods.
  • Automate file transfer processes between trading partners and exchanges including detection and handling of failed file transfers.
  • Authenticate users against existing user repositories such as LDAP and Active Directory.
  • Integrate to existing applications using documented APIs (application programming interfaces).
  • Generate detailed reports on user and file transfer activity.