Checklist of Features to Consider
Checklist of features to consider
To avoid exposing your organization to security and compliance risks at the file transfer source, I have developed a checklist of five features to consider before selecting a solution:
Feature No. 1: Integrated e-mail and file transfer security features
Security features such as content awareness, encryption, comprehensive tracking and reporting, and archiving should encompass e-mail messages and e-mail file attachments, which contain the bulk of sensitive information. A solution for transferring large files should provide integration with e-mail via a plug-in so that file attachments are sent securely at all times, in compliance, and to reduce the risk of a data breach at the file transfer source.
Feature No. 2: Policy-based content awareness of large file transfers
The ability to set automated security policies for data in motion and conduct content analysis of each attached file is essential for ensuring compliance with corporate data security guidelines. The solution should block or quarantine files if the content within the file does not meet corporate security policies.
Feature No. 3: Disk and file transfer encryption
Encrypting user files before storing them on a disk eliminates risk at the file transfer source. Seamless, client-side encryption of file attachments before they are sent, along with transparent logging and reporting, provides increased confidence and protection. Whether operating in the cloud or on-premise, disk and file transfer encryption helps organizations maintain compliance by ensuring that confidential files remain secure during transfer or in the event of loss, theft or security breach.
Feature No. 4: Business record retention
Protection and retention of electronic business records is vital in the event of corporate litigation. E-mail messages with large file attachments should be continuously monitored to determine which files meet the criteria for archiving. Look for a solution that captures and replicates files subject to corporate archival policies.
Feature No. 5: Flexible deployment options
Flexibility in deployment options provides enterprises with the highest level of performance at the lowest cost by allowing you to leverage the infrastructure you already have or plan to build. If you operate in a mixed environment or anticipate changes, look for a solution that can be deployed in the clouds, on a virtual appliance, and on a physical appliance-which can all be mixed and matched and integrated as one solution.
Unfortunately, in many organizations, the management of e-mail attachments is an afterthought, leading to security vulnerabilities. Given the increase in data breaches and updated and extended compliance regulations such as the Health Insurance Portability and Accountability Act (HIPAA), now is not the time to ignore security vulnerabilities. Organizations large and small are waking up to the hazards of e-mail attachments.
Deploying an enterprise-level managed file transfer solution will protect confidential information and ensure compliance. Linking this technology to your content filtering and corporate archrival policies provides the ultimate security against insider and external threats.
Yorgen Edholm is President and CEO of Accellion. A Silicon Valley veteran, Yorgen has more than 25 years of enterprise software expertise. Yorgen also co-founded Brio Technology. During 12 years as Brio's CEO, he took the company public and grew it to $150 million in revenues, with over 700 employees and a customer base of over 5,000 organizations. In addition, Yorgen was president and CEO of DecisionPoint Applications, an analytical applications company. Yorgen has served on several public and private company boards including most recently Hyperion (sold to Oracle), I-many, Resilience, Verix and Saama. He can be reached at firstname.lastname@example.org.