22
Sun, Dec
3 New Articles

Best Practices in Enterprise Managed File Transfer (MFT)

Collaboration & Messaging
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

In today's highly competitive business climate, companies must ensure secure, reliable and integrated communications.

 

Editor's Note: This article introduces both a white paper titled "Best Practices in Managed File Transfer Solutions" and a Webcast titled "nuBridges Exchange i—10 Minutes to a Whole New World of Managed File Transfer for IBM i." They are available free from the MC Press White Paper and Webcast Centers.

 

Globalization, increased competition, and compliance demands are creating new challenges for enterprises. To meet these challenges and gain competitive advantage, today's enterprise must be collaborative, responsive, and agile. This requires secure, reliable, and integrated communication among the people, systems, and applications that enterprises rely on to create, use and move business-critical, sensitive and regulated information.

 

Fortunately, we are entering a new era for MFT solutions. These solutions are improving real-time collaboration in secure, high-availability environments, enabling integration with critical business applications and reducing the cost and complexity of moving large volumes of information. Whether or not you agree with some experts who categorize this new breed of MFT as "disruptive innovation," there is little doubt that implementing a best-in-class MFT solution will eliminate the file-transfer challenges that enterprises have grappled with in the past.

 

To help enterprises analyze the solutions that are currently available, nuBridges presents an in-depth look at the key best practices that define best-in-class MFT solutions.

 

Best Practices

Best practices call for MFT solutions to be secure, protocol- and platform-neutral, integrated with critical business processes, centrally managed, auditable, and usable by business users without IT handholding.  The foundation for these best practices is a single, integrated MFT solution—centrally managed and controlled from a Web-based interface—versus the jumbled, do-it-yourself file transfer methods that have challenged enterprises for decades.

 

The best practices presented in the white paper titled "Best Practices in Managed File Transfer Solutions" effectively meet the file transfer challenges faced by today's enterprises:

 

  • Transfer information faster, store it on more devices, share it with more partners, and protect it like never before
  • Meet compliance and governance requirements
  • Control costs and mitigate risk
  • Standardize on a single integrated file transfer solution for internal and external data exchanges that is platform-, vendor-, and application-neutral
  • Maintain visibility in real-time into all file movements
  • Leverage open standards
  • Support legacy infrastructures

Top Best Practices to Look for in MFT Solutions

 

Lifecycle Data Protection

 

Data in motion should never exist in clear-text. This requires that all communication channels be encrypted. As soon as incoming files are written to a disk in the DMZ, they become data at rest and are no longer protected by transfer protocols. This problem is easily solved by using an MFT solution that provides secure streaming so that no data ever touches the iron in the DMZ. Under this scenario, when files are streamed through the DMZ, they continue to be protected using the same secure file transfer protocols and/or encryption by which they were transferred.

 

Encryption, Tokenization, Key Management

 

Strong encryption is traditionally used to protect data at rest. But now there's a new data security model gaining traction: tokenization. Unlike traditional encryption methods, where the encrypted data or cipher text is stored in databases and applications throughout the enterprise, tokenization substitutes a token, or surrogate value, in place of the original data. Tokens can then be passed around the network between applications, databases and business processes safely while leaving the encrypted data it represents securely stored in a central data vault.

 

With respect to keys, they should be centrally managed in an encrypted state of the file system. Public metadata, such as key expiration, is stored in the database so that information on keys can be easily reported. Keys can be stored on the same main server that other MFT components reside on or any other server that the customer prefers.

 

Tokenization is effective in protecting entire document files as well as payment card information, any type of personal identifiable information and business-critical information stored in databases. What's more, because it takes systems and applications out of audit scope for Payment Card Industry Data Security Standard (PCI DSS) compliance, it simplifies compliance management for data security standards and privacy laws.

 

Streaming Delivery

 

Streaming files through the DMZ also has the added benefit of moving large files faster, since they are never "set down" and "picked back up." It is always recommended to select an MFT solution that supports all secure protocols and encryption methods to maximize ease of interoperability with new trading partners.

 

DMZ Proxy

 

The most secure MFT solutions put trading partner verification and authorization in the DMZ and prevent the need for inbound holes in firewalls. The portion of the MFT solution behind the firewall opens an outbound hole in the inner firewall to receive incoming files into the enterprise. The MFT solution then receives the data and manages the movement between business partners and internal end points. The DMZ proxy has three main operations: identify the sender and receiver, apply cached routing rules and mediate protocols as necessary. Administration is server-side, and all rules and profiles are cached in memory.

 

Ad Hoc File Transfers

 

On-demand file transfers are standard operating procedure in many enterprises. Best-in-class MFT solutions should handle these ad hoc transfers as securely as scheduled and event-driven transfers.  Although ad hoc transfers are outside the parameters set for scheduled and event-drive transactions, best practices call for these transfers to be equally secure.

 

Cross-Platform Protection

 

MFT solutions should provide cross-platform protection to secure the whole enterprise, not just part of it. In other words, enterprises must protect all data, whether on Windows, Linux or IBM i.

  

Workflow Automation

 

A best-in-class MFT solution provides a host of workflow automation features including SOA interface, intelligent routing, transaction chaining, business activity monitoring (BAM), and business process management (BPM).

 

Compliance and Auditability

 

To meet best practices, MFT solutions must have the ability to track all actions so that they can be audited at any time and must maintain the ability to search for desired transactions based on specific criteria. Detailed business-activity tracking is built into the journaling systems so even multi-step activities are recorded. A log file contains information that describes when each file was sent, where it was sent, to whom it was sent and who initiated the transfer. The information is visible locally but managed centrally.

 

Trading Partner Management

 

Best practice calls for MFT solutions to maintain up-to-date trading partner information including profiles of individual users, departments and companies. With a GUI interface, users can view contact information, protocol preferences, security requirements, user roles and access privileges. Self-provisioning of partners from this user interface is an important feature in the on-boarding process. What's more, critical business activities can be easily performed by business users, without the need for IT support.

 

Intelligent Routing

 

Intelligent routing of transactions within the enterprise ensures that documents coming in from trading partners are delivered directly to the intended end point, bypassing intermediate servers and remaining in their secure wrappers all the way to their final destination or multiple destinations. An additional benefit of intelligent routing is that application servers do not have to request files from an intermediate server, where they may be sitting unprotected in clear-text unless a data protection application is used to automatically encrypt the files when they are writing to disk. This eliminates another layer of security management and removes the need for those servers to have an FTP client installed and for scripts to be written requesting and directing files.

 

Transaction Chaining

 

Intelligent routing also includes a method to chain these transactions together based on file characteristics. The benefits are numerous, including the ability for security methods to be automatically changed—for example, from PGP to SSH. Files can be intelligently routed to multiple application destinations or even routed based on the metadata of the file itself. For example, a file can be sent to an external trading partner and the internal finance department on two separate application servers. The result is fewer points to manage and fewer users for whom to grant access.  And the payoff for the enterprise is significantly reduced security risks.

 

Business Activity Monitoring (BAM)

 

Business activity monitoring, which automatically captures information to streamline business processes and improve enterprise productivity, is a key component of best-in-class MFT solutions. BAM allows partners to track and monitor all transactions centrally and view near-real-time status of all transactions—internal or external, regardless of the transport of document type. And not just current activities, but historical ones as well. For example, activity logs allow users to review multi-step business activities in context and in sequence and to drill down to trade exceptions. Users can view transactions—and any scheduled activities related to them—by type, batch, sender or recipient -- at a glance. Since logs are searchable by data, priority, category, and description, retrieval is speedy and accurate.

 

Business Process Management (BPM)

 

To eliminate manual document routing and scheduling,  further enhancing productivity and streamlining operations, MFT solutions should include business process management (BPM). The routing component of BPM provides the intelligence to look at a transaction and intuitively know how to route a file to the proper destination. When sending and receiving documents internally, it means reviewing the document routing information and, based on the user profile, routing it to the proper storage location within the network. For external documents, it means sending them using the correct protocol, based on the business partner profile, and receiving to the proper internal storage location, application and/or user. Scheduling defines tasks on a one-time or recurring basis within sequencing parameters.

Learn More

To find out more about these best practices, download the white paper titled "Best Practices in Managed File Transfer Solutions" and the Webcast titled "nuBridges Exchange i—10 Minutes to a Whole New World of Managed File Transfer for IBM i." They are available free from the MC Press White Paper and Webcast Centers.

 

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: