No one intentionally sets out to deploy an insecure and unreliable file transfer system. There are no business...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
drivers that prompt IT professionals to look for a system riddled with security risks or likely to fail during the course of normal operations. Problems with security and reliability often creep in unnoticed when developers focus more on delivering a finished product on time and on budget. This is especially a problem when file transfer is seen as a minor requirement or a simple task that does not warrant as much attention and consideration as other aspects of system design. This is a myth. Enterprise file transfer is a complex process with multiple sources of requirements, a wide range of constraints, and a target for security threats.
In Chapter 3 of the book, The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, author Dan Sullivan identifies essential requirements for a secure and reliable file transfer solution. This identification helps frame discussions about design around actual requirements instead of myths that can thwart your long‐term file transfer objectives.
Chapter 3, Selecting a File Transfer Solution: Seven Essential Requirements, includes information on the following topics:
- Myths of reliable file transfer
- Support for internal and external information flows
- Support for multiple protocols
- File transfer security
- File transfer optimization
- Alerts and process reporting
- Event processing
Read more about the reliable file transfer methods that can make wide area network (WAN) engineer's file transfer woes seem obsolete.
|→ Download this PDF of Chapter 3: Selecting a File Transfer Solution: Seven Essential Requirements.|
About this book: In The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, a WAN engineer can learn the shortcomings of traditional file transfers as well as how to update the file transfer process in order to make it more efficient. Learn the key drivers and essential requirements that make a file transfer both secure and functional.
About the author: Dan Sullivan has more than 20 years of IT experience that includes expertise in enterprise security, systems architecture, infrastructure management, and aligning business and IT strategies. On top of The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods, he has authored many other Real Time Publishing books including:
- How to Install SSL Certificates on Microsoft Servers
- Monitoring, Detecting, and Preventing Insider Fraud and Abuse
- The Definitive Guide to Cloud Computing
- The Definitive Guide to Information Theft Prevention
- The Shortcut Guide to Availability, Continuity, and Disaster Recovery
- The Shortcut Guide to Extended Validation SSL Certificates
Excerpted from The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods by Dan Sullivan (ISBN: 978-1-935581-19-2). Copyright © 2010, Realtime Publishers. All rights reserved.