Book chapter download

Selecting reliable file transfer solutions: Seven essential requirements

No one intentionally sets out to deploy an insecure and unreliable file transfer system. There are no business drivers that prompt IT professionals to look for a system riddled with security risks or likely to fail during the course of normal operations. Problems with security and reliability often creep in unnoticed when developers focus more on delivering a finished product on time and on budget. This is especially a problem when file transfer is seen as a minor requirement or a simple task that does not warrant as much attention and consideration as other aspects of system design. This is a myth. Enterprise file transfer is a complex process with multiple sources of requirements, a wide range of constraints, and a target for security threats.

In Chapter 3 of the book, The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, author Dan Sullivan identifies essential requirements for a secure and reliable file transfer solution. This identification helps frame discussions about design around actual requirements instead of myths that can thwart your long‐term file transfer objectives.

    Requires Free Membership to View

Chapter 3, Selecting a File Transfer Solution: Seven Essential Requirements, includes information on the following topics: 

  • Myths of reliable file transfer
  • Support for internal and external information flows
  • Support for multiple protocols
  • File transfer security
  • File transfer optimization
  • Alerts and process reporting
  • Event processing

Read more about the reliable file transfer methods that can make wide area network (WAN) engineer's file transfer woes seem obsolete. 

Download this PDF of Chapter 3: Selecting a File Transfer Solution: Seven Essential Requirements.

About this book: In The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, a WAN engineer can learn the shortcomings of traditional file transfers as well as how to update the file transfer process in order to make it more efficient. Learn the key drivers and essential requirements that make a file transfer both secure and functional.

About the author: Dan Sullivan has more than 20 years of IT experience that includes expertise in enterprise security, systems architecture, infrastructure management, and aligning business and IT strategies. On top of The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, he has authored many other Real Time Publishing books including:

Excerpted from The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods by Dan Sullivan (ISBN: 978-1-935581-19-2). Copyright © 2010, Realtime Publishers. All rights reserved.

This was first published in November 2010

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: