Frank Kenney

Subscribe to Frank Kenney: eMailAlertsEmail Alerts
Get Frank Kenney: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Related Topics: Security Journal

Blog Feed Post

Moving Beyond FTP: Where to Begin?

Here are a few steps to help you get started

by Hugh Garber

“My company still relies heavily on FTP.  I know we should be using something more secure, but I don’t know where to begin.”

Sound familiar?

The easy answer is that you should migrate away from antiquated FTP software because it could be putting your company’s data at risk – Unsecured data is obviously an enormous liability.  Not only does FTP pose a real security threat, but it also lacks many of the management and enforcement capabilities that modern Managed File Transfer solutions offer.

No, it won’t be as daunting of a task as you think.  Here’s a few steps to help you get started:

  • Identify the various tools that are being used to transfer information in, out, and around your organization. This would include not only all the one-off FTP instances, but also email attachments, file sharing websites, smartphones, EDI, etc.  Chances are, you’ll be surprised to learn some of the methods employees are using to share and move files and data.
  • Map out existing processes for file and data interactions. Include person-to-person, person-to-server, business-to-business and system-to-system scenarios.  Make sure you really understand the business processes that consume and rely on data.
  • Take inventory of the places where files live. Servers, employee computers, network directories, SharePoint, ordering systems, CRM software, etc.  After all, it’s harder to protect information that you don’t even know exists.
  • Think about how much your company depends on the secure and reliable transfer of files and data. What would the effects be of a data breach?  How much does revenue or profitability depend on the underlying business process and the data that feeds them?
  • Determine who has access to sensitive company information. Then think about who really needs access (and who doesn’t) to the various types of information.  If you’re not already controlling access to company information, it should be part of your near-term plan.   Not everybody in your company should have access to everything.

Modern managed file transfer solutions deliver not only the security you know your business requires, but also the ability to better govern and control you data…. As well as provide you with visibility and auditing capabilities into all of your organizations data interactions, including files, events, people, policies and processes.

So what are you waiting for?

Related posts:

  1. Keeping Your Data Secure and Your Employees Productive
  2. When hard work backfires
  3. Webcast: It’s 2 a.m. Do you know where your files are? An Intro to Person-to-Person File Transfer

Read the original blog entry...

More Stories By Frank Kenney

Frank Kenney is Vice President, Global Strategy and Product Management at Ipswitch, responsible for defining the company's vision and strategy and integrating his global perspective into the products, services and messaging. Frank brings an unmatched depth of experience and knowledge in the managed file transfer space to the team.

Most recently, Frank was a Research Director at Gartner, Inc., responsible for analyzing topics including managed file transfer, application integration, SOA, and business process management. He initiated and drove the Magic Quadrants on managed file transfer and SOA governance technologies. Before joining Gartner, Frank was Director of Creative Services and Content Distribution at the Executive Business Group.

Frank holds a degree in Music Technology from the Center for the Media Arts and has studied English and Computer Science at University of Tampa.

When not working, Frank can be found living the life of a frustrated musician and producer in his home studio in Tampa.