The Enhanced File Transfer™ (EFT™) High Security module (HSM) achieves or exceeds security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2, HIPAA, Sarbanes-Oxley, and many others. Whether your business is obligated to comply or you simply desire the utmost in file transfer security standards, the HSM is your solution for securing data transfer, access, and storage.

  Request Free Trial      Contact Sales


Manage EFT with your Windows accounts

Leverage your existing Active Directory infrastructure for easy EFT administrator account creation. This eliminates the need to create, maintain, and track standards compliance of multiple administrator accounts, while allowing you to maintain and ensure compliance of accounts in one location.

Ongoing standards compliance

Securing sensitive company data requires continuous monitoring and validation of security policies and controls. Globalscape's managed file transfer solution makes it easy for an administrator to create and maintain file-transfer services that meet or exceed these standards with a simple set-up wizard. Once enabled, the HSM is an ever-vigilant security tool that disallows low-security options, captures compensating controls, and generates reports for auditing the system’s compliance status.

Easy security configuration

Setup wizards provide administrators with an easy, step-by-step method to configuring a new high-security-enabled site, with each page describing the requirement and what you need to do to meet that requirement, or to provide a compensating control (workaround).

  PCI-DSS Compliance


Protection of data at rest

The HSM, in concert with EFT and DMZ Gateway®, helps organizations comply with data storage requirements—including not storing data in the network DMZ—using repository encryption and securely sanitizing (wiping) deleted data so that it cannot be reconstituted.

  DMZ Gateway


Protection of data in transit

With support for multiple secure protocols and a built-in FIPS 140-2 cryptographic library, the HSM thoroughly protects data in transit. By enforcing the use of secure protocols, strong ciphers, encryption keys, and password policies, data transfers strictly follow all security guidelines.

  FIPS 140-2 compliant algorithms


Controlled access to data

The HSM enforces account access policy controls such as the automatic lock out of accounts after a set amount of incorrect login attempts and the removal of inactive accounts after a certain period of inactivity. Additional security controls can be set to expire passwords automatically on certain dates, and notifications such as emails and banners can be configured accordingly. For user authentication, you can use AD, NTLM, LDAP, an ODBC-compatible database, or the built-in authentication manager in EFT.

Actively monitor PCI DSS compliance

The HSM actively monitors PCI DSS by alerting on non-compliance, identifying the cause of non-compliance, allowing reverting of security controls, implementing mitigation/workaround techniques. The Auditing and Reporting module (ARM) captures all of this activity in a fully relational database.

  Auditing & Reporting Module