Slow and inefficient data transfer processes waste valuable company resources. Delivering data using manual processes is vulnerable to workforce limitations, vacations, turnover, and simple human error. Automation allows you to deliver data without manual intervention, saving time and avoiding potential errors.
Enhanced File Transfer™ (EFT™) Enterprise is perfect for any business that needs automated secure file transfer.
EFT Enterprise provides Event Rules with complex actions, enabling you to streamline business processes without limitations imposed by legacy systems and applications. With an intuitive interface, administrators can easily create sophisticated automation and integration workflows without the need for code, scripting, or complicated batch files. Streamline business processes such as routine transfers, compliance reports, and data retention/ cleanup policies.
Event Rules are based on a simple premise: an event occurs that triggers an action. In the EFT administration interface, you can specify Actions (e.g., send an email) to occur when an Event (e.g., file upload) takes place. Additionally, you can specify one or more Conditions (e.g., specific IP address connected) that must exist before an Action is taken or that influence the Action that is taken. For example, monitor a specific folder for new or changed files, then perform actions on those files, such as sending an email and moving the file to a user’s home folder.
Advanced Workflow Engine (AWE)
Data workflow management between internal systems is a critical component of any enterprise infrastructure. As part of EFT, the Advanced Workflow Engine (AWE) Module allows you to streamline business processes without limitations imposed by legacy systems and applications. AWE extends EFT Event Rules with event-driven, real-time processing of more than 200 automated actions. Similarities between the actions available natively in EFT Enterprise and the actions that are available in AWE workflows include sending an email, invoking web services, and creating files and folders. In AWE, however, you can also specify custom SMTP server settings, specify the email priority, require a Read Receipt, specify a proxy server, and add attachments to the email.
With AWE’s intuitive workflow programming interface, administrators can easily create sophisticated file transfer automation and integration workflows without the need for code, scripting, or complicated batch files. With more than 200 automation actions, including XML/CSV parsing, database connectivity, SNMP, web services, etc., AWE workflows can replace most of your legacy scripts and manual processes.
Data transfers are 5 to 10 times faster with the Accelerate module versus FTP, and more than 20 times faster than over SFTP. Meet SLAs for large file transfers with confidence, even with the challenge of great distances and dispersed servers. Significantly improve the time that it takes for files reach their destination, regardless of the file size or type.
Achieve maximum file transfer speed for any size file with optimal bandwidth usage, lower overhead, and near real-time communication with the Accelerate module.
Remote Agent Module
The Remote Agent Module (RAM) for EFT provides centralized control for automating transactions from distributed systems. With RAM, you can automate interactions between branch offices, pointof-sale terminals, business partners, field agent laptops, or other remote systems and your EFT server residing at your main office.
Cloud Connector Module
The Cloud Connector module (CCM) is an additional action added to the native Event Rule system in EFT. The Cloud action supports transfers to Amazon S3 and Azure containers including advanced settings like multi-part, encryption, requestor-pay, among others. With the CCM admins can connect natively to Amazon S3 and Azure blobs without scripting, manual browsing, or complexity in setting up connections or integrate natively with cloud storage through EFT without the need for outside integration.
Content Integrity Control Module
The Content Integrity Control module (CIC) integrates with antivirus software and DLP (Data Loss Prevention) tools to permit or prevent file transfers based on your organization’s policies, and supports compliance with PCI DSS. When the CIC Action is added to an Event Rule, any file that triggers the Event Rule is sent to a server using the ICAP protocol, the industry standard for antivirus and DLP tools for scanning. With the CIC module, you won’t expose your network to files containing malware, or share confidential/ proprietary information.