Multi-layered security, customized for your business needs
No matter which version of EFT you start with, you can customize your managed file transfer solution to provide enhanced compliance protections, process files through antivirus and data loss prevention tools, track and report on file transfers, and more.
Advanced Authentication Module
The Advanced Authentication Module (AAM) provides support for easy-to-use authentication methods, including smart card, single sign-on, and multi-factor authentication options. By centralizing authentication methods and using an interoperable solution like AAM with EFT, users can use a single source of authentication across the IT resources they use, including EFT.
The OpenPGP module employs industry-standard OpenPGP technology to safeguard data at rest. The OpenPGP module uses a combination of strong public-key and symmetric cryptography to provide security services for electronic communications and data storage. These services include confidentiality, key management, authentication, and digital signatures. OpenPGP uses a public key and a private key to encrypt data and maintain security.
High Security Module (HSM)
High Security module (HSM) achieves or exceeds security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2, HIPAA, Sarbanes-Oxley, and many others. Whether your business is obligated to comply or you simply desire the utmost in file transfer security standards, the HSM is your solution for securing data transfer, access, and storage.
With the HSM, you can:
- Manage EFT with your Windows accounts
- Maintain ongoing standards compliance
- Configure your security setup with ease
- Protect your data at rest and in transit
- Control access to data
- Actively monitor PCI DSS compliance
Content Integrity Control (CIC) Module
The Content Integrity Control™ module integrates with virus scanners and DLP (Data Loss Prevention) tools to permit or prevent file transfers based on your organization's policies, and supports compliance with PCI DSS. When the CIC Action is added to an Event Rule, any file that triggers the Event Rule is sent to an ICAP server for scanning. With CIC, you won’t expose your network to files containing malware, or share confidential or proprietary information. With the Content Integrity Control™ module, you can maintain confidentiality and keeps your network free of files containing malware.
The Content Integrity module works with the following antivirus and DLP servers:
- Trend Micro
- McAfee (VSES)
- Forcepoint (Formerly Websense)
DMZ Gateway® is a multi-platform solution that works in conjunction with the Enhanced File Transfer™ (EFT) platform and/or Mail Express to create a multi-layered security solution for data storage and retrieval, authentication, and firewall traversal. Using a two-way connection originating inside EFT and/or Mail Express, the DMZ Gateway acts as a communication proxy that replaces inherently insecure inbound connections from the Demilitarized Zone (DMZ) to your network.
Here’s how DMZ Gateway combines security and efficiency to protect your data:
- Data isn’t stored in the DMZ
- Virtual authentication
- Supports all protocols allowed by EFT (FTP/S, SFTP, HTTP/S, AS2, HTTPS)
- Transparent to your partners
- No storage, synchronization, or replication of user database needed
- Support for Linux, Solaris, and Windows operating systems