The EFT Essentials Course provides high-level information for everyday administrative guidelines, user account control, and end-user web and non-web clients for file exchanges.
Globalscape EFT™ Arcus (MFTaaS) is a cloud-based Managed File Transfer (MFT) service that provides the compliance and efficiency of MFT without the overhead of an on-premises solution.
At Globalscape we want to ensure your EFT projects run as smoothly as possible. Our Techincal Account Managers (TAMs) are certified professionals available to assist you with your EFT initiatives.
Globalscape EFT's High Availability (HA) solution can protect your critical business processes, ensure that your crucial file transfer systems are always on, and that employees, customers, and business partners experience seamless availability of critical applications and information.
The Advanced Workflow Engine (AWE) is a powerful tool that allows rapid construction of Windows automation routines without any programming. It replaces legacy batch files, scripts, and custom application development, enabling complete IT process automation without writing a single line of code.
Slow and inefficient data transfer processes waste valuable company resources. Delivering data using manual processes is vulnerable to workforce limitations, vacations, turnover, and simple human error. Learn about Globalscape EFT's automation capabilities can enable you to deliver data without manual intervention, saving time and avoiding potential errors.
The EFT Professional Certification Course provides information and practice for everyday administrative guidelines, extensive user account control, and post-processing workflow, with a more in-depth look at each of the modules, automation, and practical use of the API.
The Globalscape EFT™ OpenPGP Event Rule Action can encrypt, sign, decrypt, and verify files, even on files larger than 2GB.
The Globalscape EFT Mobile Transfer Client (MTC) mobile app allows your employees to use their own mobile devices to access corporate data, while keeping your network secure within the organizational boundaries.
Page 2 of 4