• open panel

Ipswitch Survey Reveals; Damage to Reputation Seen as Biggest Reason to Comply with Data Protection Laws.

Despite 71% believing UK data protection laws should be stronger, 53% still admit to sending sensitive documents by email and  19% have lost critical documents in transit.

A survey by Ipswitch, managed file transfer (MFT) solutions vendor, reveals that fear of reputational damage is the biggest driver for business professionals to comply with data security laws. Yet the majority are still failing to secure the transfer of critical files.

The survey, conducted at the end of April 2014, asked 415 business professionals working across the EU about attitudes, practices and technologies relating to data security and protection. The results also show that the UK is seen as having tighter data protection laws than Germany or France. However, the vast majority think the UK’s data protection laws need to be even stricter.

Key Conclusions:

  • 31 percent of business professionals say that financial censure is the biggest impetus for complying with data protection or staying in line with ICO guidelines, while nearly half (43 percent) cite fear of reputational damage to their brand as the major reason to fall in line
  • The survey also reveals that over half of respondents (53 percent) admit to sending business sensitive documents over unsecured email, while nearly a fifth (19 percent) also admit to losing critical business documents
  • 64 percent of respondents consider the UK to have the tightest data protection laws, 30 percent name Germany as having the strictest laws, while six percent of respondents say that France has the strictest data protection
  • Almost three-quarters (71 percent) of respondents believe UK data protection laws should be stronger to protect businesses and consumers
  • Over a quarter of respondents (27 percent) have never heard of the UK Information Commissioner’s Office (ICO), the public body which reports to UK Parliament and is sponsored by the Ministry of Justice to oversee data protection and privacy
  • More than half (57 percent) agree that the ICO should be more aggressive in its data protection responsibilities

“It is clear that organisations need to take more responsibility for their own file transfer practices.  Our survey reveals that far too many still rely on unsecured procedures for transferring sensitive files to get work done,” said Loic Triger, VP International Sales for Ipswitch. “Businesses need to have systems in place to mitigate security breaches, and rigorously ensure those systems are appropriately used.”

“Enterprises have come to rely on a mix of DIY approaches for file movement, in the absence of well-defined policies and enterprise-supported alternatives. But it is entirely possible to untangle the web of file transfer applications available and talk about best practices to ensure visibility and control in an increasingly regulated market. We urge all organisations to re-evaluate their file transfer methodologies, before they end up paying the price, either in diminished brand reputation, customer losses, or financial penalties.”

“Business simply cannot afford – either in terms of cost or reputation – to deal with the potential fall-out from unsafe business practices such as unsecured file sharing, and they are clearly looking to the ICO to take the lead in implementing further, stricter regulation.”

 

About Ipswitch
Ipswitch helps solve complex IT problems with simple solutions. The company’s software is trusted by millions of people worldwide to transfer files between systems, business partners and customers; and to monitor networks, applications and servers. Ipswitch was founded in 1991 and is based in Lexington, Massachusetts with offices throughout the U.S., Europe and Asia. Pro2col are Ipswitch’s Elite Partner here in the UK, please do not hesitate to get in contact if you require any further information.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Managed File Transfer & Gartner’s Application, Architecture, Development & Integration Summit.

Gartner AADI Summit

I’ve long held the opinion that the marketplace for Managed File Transfer, as a standalone technology, was coming under pressure from many other technologies, so I jumped at the  opportunity to attend the Gartner Application, Architecture, Development & Integration Summit in London, courtesy of Thru Inc.

Attended by many of Europe’s largest Enterprises, Gartner’s AADI provided me with a unique insight into the challenges Enterprise Architects and CIO’s currently face, in integrating a wide variety of applications within their business.  Of course the main focus for the many sponsors of the event was API’s, what API’s they had, how they could be scaled, how they could be secured and so on.

Being at the show with Thru enabled me to have some interesting conversations, which went far deeper than our typical discussions about how file transfer automation, or how an ad hoc file transfer solution enable companies to meet their customers’ needs. The conversations we’ve had at this event have been much more focused on how Enterprise Applications can leverage APIs to provide Managed File Transfer and the subsequent governance and audit of the data.

Thru’s API differentiates them from many Ad Hoc File Transfer vendors and their wide range of current case uses support this.  For example, well known ISV’s use Thru’s platform to enable software and licence delivery, enabling customers to download large ISO’s or software packages, completely unaware that Thru is doing the grunt work behind the scene.

Thru don’t just have deep integration capabilities via their API, they also have connectors for Microsoft Outlook, Lotus Notes, Microsoft Sharepoint and Salesforce.com.  Coupled with their Cloud, Hybrid or On Premises deployment options, they have a compelling offering to support the continuing drive to leveraging existing Enterprise Applications.

 To learn more about how API’s can ‘off load’ file transfer from your Enterprise Applications, call our consultants on 0333 123 1240.
Share on TwitterShare on FacebookShare on LinkedIn+1
 

The Winner of our Virgin Experience Day voucher is…

The winner is James BishopWe’re delighted to announce that the winner of our £250 Virgin Experience Day voucher is James Bishop, an Information Security Manager in Norwich. James was informed of his win on Thursday evening and couldn’t quite believe his luck.

James let us know that he was at Infosec to attend the workshops and keynote speakers, to keep abreast of current technologies, and to earn valuable CPE points for his professional qualifications. He was lucky enough to attend all three days but shared with us that, “The tube strike had a definite impact on the first day, and I was crammed onto the London Overground from Stratford to West Brompton. Its been a while since I played sardines! Infosec was noticeably quieter on the Tuesday, but became progressively busier!”

Naturally we wanted to know what James would do with his vouchers and he said that he’d, “Probably do something extremely risky and jump out of a plane, drive a sports car really fast… or just share it with my wife!”

Share on TwitterShare on FacebookShare on LinkedIn+1
 


Download our free

Managed File Transfer

solution comparison guide

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Download Our Managed File Transfer Comparison Guide

Download the Managed File Transfer Comparison Guide

Following on from the release of our Ad Hoc comparison guide, we’ve delighted to provide to you the Managed File Transfer comparison guide.

The guide provides a comparison of five of the leading brands including Axway, Cleo, Globalscape, Ipswitch and Jscape. Click to download it here.

If you are about to embark on a managed file transfer project for your company, we would love to speak to you. Please get in touch with one of the team on +44 (0) 333 123 1240.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

A look back at InfoSecurity Europe 2014

InfoSec was a little different for the team at Pro2col this year.  We decided to take our own stand again, rather than working on a vendors and it certainly paid dividends. Whilst the show was undoubtedly quieter, due to the Tube strikes and poor weather, it would be fair to say that those that were committed enough to come were there for a reason.  We had lots of conversations with interesting companies about their need to move data securely, from geo-physics to exam papers and everything in between.  All in all it was definitely a worthwhile investment!

Email & Sam at InfoSecurity EuropeAt the exhibition we had a competition to win £250 of Virgin Experience Day vouchers, which our lovely models Sam & Emily ran for us. To enter they simply needed to scan the badges, the girls did exceptionally well with over 1,000 entries over the three days.  We’ll be announcing the winner on Friday, 9th May so watch this space.

As per usual with exhibitions we over indulged a little with some of our vendor partners outlasting us til the early hours of the morning.  And it wouldn’t be InfoSec without some Champions League football to take in as well.  We’ll be sad to see Earls Court being redeveloped having attended some ten plus exhibitions there over the years, still I’m told Olympia has been ‘done up’ so I guess we’ll be heading there for InfoSec next year.

Finally I want to thank all of the team that helped with the event, our customers for coming along to speak to us, our vendors for their hospitality and our models for the fab job they did!

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Download Our Latest Ad Hoc File Transfer Comparison Guide

Ad Hoc Comparison Guide v2 2014

Hot on the heels of the first release we’re delighted to announce that the version 2 of our Ad Hoc File Transfer Comparison Guide now includes Thru Inc.

Pro2col’s comparison guide features the worlds leading file transfer solutions, helping you to choose the right technology for your business. Click here to download the latest guide.

 

 

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Is PSN approval enough?

Anyone associated with local government right now is aware of the headache of PSN (Public Services Network) approval, the evidence trail, the multiple iterations and the tight timescales. However, with the constant squeeze on local authority budgets and the drive to working with partners to deliver services, is PSN enough? How do you protect the information about a vulnerable child, when sharing it with the school, NHS, Police, private counselling contractor and so on. In a recent survey* 67% of councils stated that they are sharing data with 5 or more partners to deliver the Troubled Families initiative. This number can only increase as other programmes such as the move of children’s public health commissioning to local authorities next year.

Troubled Families

 

One of the issues thrown up by this approach is the ability to share data. Survey respondents raised this as one of their primary concerns: ‘Data Sharing between organisations’; clear and consistent co-ordination and information sharing’; ‘Culture shift from silo working and inconsistent collaboration’. Pro2col already help several councils to address these issues with cost-effective, secure file transfer solutions, including Cambridgeshire County Council.

“Our users and partners are very happy, we have successfully changed our file transfer methods with minimal disruption, we have very robust measures in place to prevent leaked data, and we’ve exceeded all of our objectives for the project.” ALAN SHIELDS. IT Architect Team Manager

If you would like more information on the solution we provided for Cambridgeshire, please download the case study from here.

 

 

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Criteria to consider when choosing the right Managed File Transfer product

Why is it important to have some understanding of the product lifecycle when selecting a MFT solution?  Feature matching is not enough when a solution will become a critical component of your organization’s business workflow.

As with everything in life there is a natural evolution or life cycle that every product will go through i.e. inception, growth, maturity to decline. Of course the length of time in each phase will vary based on a number of different factors like marketing, on-going product development, customer input and a strategic commitment to R&D.  Under these conditions a products growth can continue for a long time.

But there are some things that you can help identify a product that is in or near the declining phase of its lifecycle.

 

 

 

 

 

 

 

 

Here are 10 things to look out for when evaluating a solution:

  1. No product development road map.
  2. Road map is primarily made up of sustaining fixes.
  3. No big enhancements being released in the near term i.e. 6 -  8 months.
  4. No big enhancement(s) released in the last year i.e. reporting, dashboards, etc.
  5. Not up to date with the basic table stakes of MFT functionality.  This could also apply to an immature product as well.  But if a product has been around for some years and is lacking some basic MFT functionality that should be a big red flag.
  6. Declining Sales.  It is easier find out this information for publicly traded companies than private ones.
  7. Little or no marketing promotions for the product(s) you are evaluating.
  8. Still using Old Technology Paradigms.   Sign a company is milking revenue as long as there is a profit.
  9. Little or no R&D infrastructure.
  10. Based on the competitive dynamics of the MFT industry, if company is not electing to employ one of three strategies: Maintain, Defend, or Innovate your product is in the declining phase of its lifecycle.

 

We work with some of the industry’s leading vendors.  In addition to having a close relationship with them, we understand their position in the marketplace, where their product roadmaps are headed and can help to steer you towards the most appropriate technology for your requirements.  Give our offices a call on UK 0333 123 1240 / USA 707 685 7705 to see how we can help with your file transfer project.

 

Share on TwitterShare on FacebookShare on LinkedIn+1
 


Download our free

Person to Person

file transfer solution

comparison guide

Share on TwitterShare on FacebookShare on LinkedIn+1
 
© Pro2col Ltd 2012 | Terms of Sale | Privacy Policy | Sitemap
Part of the Pro2col Group