• open panel
  • Home
  • Posts Tagged'secure file transfer'
  • Page 2

Posts Tagged ‘secure file transfer’

Over 5000 legal staff using Biscom Delivery Server for secure file exchange

Biscom’s recent focus on legal firms has really paid dividends having announced that the number of Biscom Delivery Server licenses sold into the legal sector passes 5000 seats.  It seems that the legal marketplace has very much embraced BDS as a solution that understands the data exchange needs of law firms.  This coupled with the integration options with iManage amongst other legal applications make BDS a stand out winner.

Recent customer wins in the legal sector include Latham and Watkins, Akin Gump Strauss Hauer & Feld LLP, McKenna, Long & Aldrich and Reimer & Braunstein to name a few.

If you’re a UK based legal firm or corporate legal department and would like to take a look at Biscom Delivery Server, please don’t hesitate to contact Pro2col today on 0333 123 1240.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Ipswitch MOVEit DMZ Managed File Transfer Review

SC Magazine have reviewed a number of managed file transfer solutions available in the marketplace – Ipswitch MOVEit DMZ being one of them. This managed file transfer server software helps secure data in transit by encrypting various transfer protocols using industry standards.

After reviewing product attributes such as features, ease of use, performance, documentation, support and value for money, Ipswitch MOVEit DMZ was award a full 5 stars in every category and labelled as one of SC Magazine’s ‘Best Buys’. Stating no possible negative points against the solution, the overall verdict deemed MOVEit DMZ a “A flexible, web-based product which allows tight control over end-to-end file transfer security.”Ipswitch MOVEit SC Magazine Review

See here for full details of the SC Magazine review or for more information regarding the Ipswitch File Transfer product range. Please also feel free to contact Pro2col on 0333 123 1240 to speak to one of our consultants.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

SC Magazine Award Biscom Delivery Server 5 Stars in Latest Review

Nathan Ouellette, an author at SC Magazine produced a great review of Biscom’s secure file transfer software, Biscom Delivery Server 4. Installed using a VMware image, the reviewer rated the product based upon 6 key elements including Features, Ease of Use, Performance, Documentation, Support and Value for Money.

Emerging with an overall rating of 5 stars – it was clear that BDS was found to be easy to deploy, easy to use, and it gets the job done when it comes to transferring sensitive data securely and simply.

SC Magazine Biscom Rating

The numerous advantages such as multi-platform (Windows and Linux supported, and VM), Outlook plug-in, checkpoint restart, no file size limits, strongest back end encryption (AES 256-bit), extremely granular tracking and reporting, Web services SDK, and it’s simple, intuitive web interface means Biscom Delivery Server is one of the most comprehensive ad hoc file transfer solutions in the marketplace.

You can read the full SC Magazine Biscom Delivery Server review here or, for more information regarding the product please visit the Biscom Delivery Server product page on our website or contact Pro2col on 0333 123 1240.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Buy WS_FTP Products Now and Earn Cash Back…

The 2010 Ipswitch Cash Club program makes the decision to purchase any WS_FTP Server solution much easier by offering you cashback on every purchase!

If you make a qualifying purchase from November 1-30, 2010, you will receive 15% of your total purchase in Amazon.com gift cards.

But the clock is ticking…

  • Purchases made from November 1-30, 2010 will receive 15% of the total purchase in Amazon.com gift cards.
  • Purchases made from December 1-31, 2010 will receive 10% of the total purchase in Amazon.com gift cards.

Money Savings

Beat the clock! If you were already considering WS_FTP Professional multi-packs, WS_FTP Server, or one of the powerful WS_FTP Server modules, act now to get the most cash back.

You can get in contact with the team at Pro2col on 0333 123 1240 to find out more.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

How will the changes to PCI DSS affect you?

The PCI Security Standards Council have just released version 2.0 of PCI DSS, the Data Security Standard enforced upon all merchants that accept any form of card payments, designed to secure and protect cardholder details.  Although introducing only minor alterations, the main intention of the amendment is to provide greater clarity and flexibility for small merchants, facilitating a more comprehensive understanding of the requirements that must be satisfied under PCI DSS and making them easier to implement and abide by.

From a long term perspective, the amendments made are designed to help merchants manage evolving risks and data security threats whilst maintaining alignment with industry best practices.  Taking a higher level perspective, the main changes cover:

  • Reinforcement of the need to conduct thorough scoping exercises, so that merchants can identify exactly where their cardholder data resides in the business.
  • The need for more effective log management of credit card data within the business.
  • Allowance for organisations to adopt a more risk based approach when prioritising vulnerabilities, taking into account their specific circumstances.
  • The acceptance of unique business environments and accommodation of their specific needs.

More specifically Jonathan Lampe, VP of Product Management at Ipswitch File Transfer and representative of the PCI Security Council has identified the 5 key changes that will directly effect the transfer of sensitive credit card data:

  • Explicit recognition of SFTP  as a secure protocol.
  • Audit of virtual machine infrastructure and virtualisation hypervisors will be brought within the scope of PCI DSS.
  • Rotation requirements for the purposes of key management will be “based on industry best practices and guidelines” rather than an annual stipulation.
  • Identity and authentication requirements for users, “non-consumers” and administrators will be split further.
  • More specific requirements will be implemented around the auditability and security of timekeeping, especially as recorded in audit logs.  (Coordinated and reliable timestamps are helpful during civil and criminal investigations as well as internal forensics investigations.)

A further step taken by the PCI council to help small merchants achieve the latest 2.0 PCI DSS changes is the introduction of a small microsite.  The implementation life-cycle the of PCI Council’s standards will be extended from the current 2 years to 3 years to give merchants plenty of time to make the necessary changes.  The new 2.0 standard will be effective from 1st January 2011, however validation against the previous 1.2.1 standard will be allowed until 31st December 2011.

For more information regarding PCI DSS compliance and how this can be achieve in terms of secure file transfer, please don’t hesitate to contact the team at Pro2col on 0333 123 1240.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Positive results for Pro2col and co-exhibitors at Infosecurity

We made the decision to attend Infosecurity for the first time this year, with the intent of affirming Pro2col’s position as the UK’s leading supplier and integrator of secure file transfer technologies, with a range of carefully selected products designed to meet the requirements of any business.  Spurred by the formation of partnerships with some of the world’s leading secure file transfer vendors including Aspera, Ipswitch, Data Expedition, Biscom and Stonebranch, we were fortunate enough have experts from two vendors on the Pro2col stand, ready to impart their extensive product knowledge to attendees from around the world.

In customary form, after spending months meticulously planning for Infosec, the days leading up to the show were a little unsettling for us.  With not one but two co-exhibitors traveling from the US to London, nature decided that the pressure of event organisation was not enough and kindly added a humongous ash cloud to the mix – leaving us wondering whether or not half of our stand would actually make the event!

Despite initial concerns over travel arrangements (everyone made it thankfully – even if a little jet lagged), we are excited to say that the show was a great success for all parties involved.  With over 10 years experience within the file transfer arena, we can empathise with how daunting the broad spectrum of solutions in this marketplace can be for businesses when sourcing the most suitable solution for their requirements.  Both resellers and end users alike were very receptive to the impartial file advice and product demonstrations offered by Pro2col representatives, but also pleased to benefit from specialist product information imparted by Jon Laughland – UK Sale Executive for Stonebranch and Charlie Magliato – Channel Manager for Biscom Delivery Server.

From our perspective, it was brilliant to see just how seriously companies are taking the security of their sensitive data.  We spoke to IT professionals from a wide range of market sectors from the public domain (government bodies, healthcare organisations, universities), to retail, publishing, banking, legal firms – the list is endless!  Although unable to give each visitor the time allocated in a typical demonstration or consultation, we were able to glean valuable insight regarding the way businesses are currently moving their sensitive data and provide a neutral recommendation for products to meet their operational needs.

Another factor that surfaced repeatedly during the event, was the financial investment associated with some secure file transfer solutions.  There’s an abundance of smaller companies out there with a requirement to transfer files securely, that just don’t have the budget for a good percentage of the secure file transfer products available.  Similarly, larger corporate organisations don’t want to be paying over the odds for potential solutions.  Pro2col have spent a great deal of time scouring the marketplace to select products that not only cater for all file transfer requirements, but that do so at an affordable cost!

As we are continually looking for ways to improve the services we provide to both existing and potential customers, Infosec was a great learning experience for us in terms of the security marketplace and a productive exercise for the business in terms of relationship building with customers and resellers.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Healthcare Industry Beware!

Recent reports have highlighted that hospitals and physicians in the US have been given a deadline of 2015, to convert all health records into digital form and then, to deploy the accompanying technology to handle these digital assets.  Considering only about a quarter of the US population’s health records are digitally stored – this is a bit of a tall order!

Makes you wonder whether, no lets rephrase that, WHEN the UK will follow in their footsteps.  For those organisations operating in the health sector, it may be

stethoscopewise to start reviewing the security and efficiency of you’re file transfer systems now, especially when you take into account the increased ICO powers of enforcement due to come into effect on 6th April 2010.  If a similar mandate were to come into force in the UK, in order to avoid possible fines of up to £500,000 organisations would need ensure that sensitive client files were secured when being transported between locations.

If your a healthcare organisation and you want to review or evaluate your large file transfer processes, please get in touch with the team at Pro2col on 0333 123 1240.  We offer a comprehensive range of secure file transfer solutions and we’re always happy to help.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Secure File Transfer Standards – Are you Compliant?

With the sheer abundance of security standards, laws and legislation in our society nowadays, it’s really easy to get overwhelmed.  Although a necessary measure to safeguard individual’s confidential information and protect your business against prosecution, it can be difficult to fathom which laws apply to your organisation when it comes to secure file transfer.

To complicate matters further, legislation varies between continents, in the US even between states!!  As a result, we have put together a succinct guide detailing some of the most high-profile legislation governing the US and UK in terms of secure file transfer, including some standards that are recognised internationally.  These include acts such as The Health Insurance Portability Act (HIPAA), Sarbanes Oxley (SOX), Gramm-Leach-Bliley and The Data Protection Act, as well as industry standards like FIPS and ISO 27001.

Data Protection Act

Unfortunately it doesn’t end there.  Once an organisation has established which legislation applies to their business, they then have to make sure that their systems and procedures are actually compliant!  Thankfully, accompanying the majority of legislation is compliance testing – a sure-fire way to guarantee investment in technology and solutions that meet the secure file transfer requirements stipulated by government.

If you would like to discuss security compliance in terms of secure file transfer solutions, don’t hesitate to get in touch – we are happy to provide advice and support.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

UK businesses under increasing pressure to step up data privacy

The European Commission (EC) have publicly stated that the UK Government is not adequately enforcing European data privacy laws and is ready to clamp down on them in 2 months time.  Reported on the Infosecurity web site and backed up by our recent discussions with the ICO; next year is likely to be the year in which Enterprises feel the full force of European legislation regarding the data privacy.  Enterprises will be under increasing pressure to ensure that every step is taken to secure data both at rest (internally) and in transit (e.g. securing file transfers).Judge Hammer

The powers at the disposal of the ICO are also being addressed with individuals responsible for data security breaches potentially being liable for custodial sentences.

Read more: European Commission warns UK over privacy legislation.

Share on TwitterShare on FacebookShare on LinkedIn+1
 

Saving money by ignoring data security – a false economy?

We hear it in the news week in week out.  So and so company has left a laptop on a train containing 4 million unencrypted customer records, a hacker has infiltrated an online payment system stealing thousands of unsuspecting UK consumer credit card details – even today I have walked through the door and the first news alert in my email begins, “ChoicePoint to pay $275,000 for second data breach.” I can’t help but wonder why data security is failing?

Recently, I’ve begun research into the current state of data security in the UK. As part of my research I contacted the ICO (Information Commissioner’s Office) and asked them to provide me with figures detailing reported breaches in the UK over the last few years.  According to ICO figures, 2008 saw the loss of sensitive data on 341 separate occasions, spanning all industry sectors.  So far this year, we as a nation have seen 348 instances of compromised data and we still have 2 1/2 months to go!!!  Before I progress any further I must emphasise the use of the word ‘reported’.  According to a study conducted by The Ponemon Institute using a sample of 615 UK based companies, 70% of the companies surveyed experienced a data breach in the last 12 months – a worrying discovery in itself.  Even more surprisingly, nearly 40% of those surveyed failed to publicly announce a breach in their security, as there’s no legal or regulatory requirement to do so because they are a private sector organisation.

data and lock

Taking into consideration the growing prevalence of digital business systems and processes over the past decade, we all must be aware of the importance of data security in our digitally dominated world.  Especially in light of the abundance of publicity surrounding data breaches – surely it must weigh on the minds of CIO and IT personnel?  So if we are all so acutely aware of the risk, why do some companies not take the precautionary measures required to secure the data they hold or transmit?  I can only make assumptions regarding the factors involved and I would speculate its the cumulative result of a number of factors.

Firstly, the big stumbling block – finance.  From experience, I know there are companies out there that struggle securing the necessary funds from their annual budget to address data security as its often deemed non-critical, especially in the current economic climate.  With the inhibitive cost of some of the security solutions out there, I can’t really blame them.  On the other hand, there are lots of providers emerging in the marketplace offering affordable, scalable solutions, that provide not only the data security they need but also the ability to streamline business processes and reduce operational costs.  Solutions such as this, can provide a significant return on investment and in the long term actually save money – a win-win situation!

The financial consequences of a data breach should also be taken into consideration.  According to a study coordinated by The Ponemon Institute back in 2008, the average cost of a UK data breach incident is £1.73 million – substantially more than the cost of securing the data in the first place!  Then you have to take into consideration the financial implications of a blow to a companies reputation – these intangible costs are likely to be well in excess of any fines.

Secondly, I feel the lack of legislation has a big part to play in the predicament organisations find themselves facing.  Apart from a select few e.g. PCI DSS, the only legal guidelines UK businesses are currently required to abide by, are those outlined in the Data Protection Act.  The problem is, up until very recently the majority of this act has been unenforceable (more to come on that later).  I can’t help but feel this lack of legislation and an authority body promotes a certain amount of apathy in organisations.  If all of these companies in the public eye are receiving minimal fines and a slap on the wrist for contravening Data Protection laws, what is the motivation to spend money on securing data?  Consequently, many organisations opt to sit on an unexploded time bomb and when it finally blows (which it inevitably will)  hold their breath and hope no one gets wind of the incident during the aftermath and leaks the news to valued customers.

The recently appointed UK Information Commissioner, Christopher Graham, has addressed this very issue during his first speech at the Annual Privacy and Data Conference in London on 8th October.  The crux of his speech is that change is afoot.  Mr Graham made it perfectly clear that data privacy and information security are now ‘top of the agenda’ and with the new powers of enforcement being granted to the ICO in the forthcoming Coroners and Justice Bill, he fully intends to use them to maximum effect.  He added: “we’re going to have the resources to go after the bad boys – there’s a well-funded regulator that will hit you hard if you get it wrong… if you don’t take this stuff seriously its going to bite you in the bum.”  He also stated, “If you breach the law you’re going to be in trouble.  It (compliance with data privacy law) isn’t a nice to have – it’s the law of the land.  You will destroy brand value and reputation (by ignoring it).”  Some strong words!

Finally, although aware of the viable threat of data breaches, from our experience as security specialists we have dealt with a number of companies who believe their data is completely secure when in reality – it isn’t.  Therefore a lack of insight and knowledge when addressing company wide data security systems can result in inadequate protection.  This is where the value of a security specialist comes into play.  We can’t be masters of all trades, sometimes its beneficial in the long run to let the experts work their magic as data security can be a minefield, its best left to the professionals.

Taking into consideration the consequences associated with the loss of sensitive data, such as the tangible cost to the company and more significantly a serious blow to reputation, is it really worth risking the security of your company’s data to save money in the short term?

See here to find out more about some of the secure file transfer solutions available in the marketplace.

Share on TwitterShare on FacebookShare on LinkedIn+1
 
© Pro2col Ltd 2012 | Terms of Sale | Privacy Policy | Sitemap
Part of the Pro2col Group