Risk
4/15/2010
05:05 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Ipswitch Rolls Out Secure File Transfer Offering

MOVEit DMZ Enterprise 7.0's Ad Hoc Transfer module provides visibility into all file transfer activities

Lexington, MA " April 15, 2010 " Ipswitch, Inc., an innovator of secure managed file transfer solutions, today released MOVEit DMZ Enterprise 7.0 " optimized to give organizations a powerful solution to encrypt, control, authenticate and manage files moving internally and externally.

Widespread data breaches, regulatory compliance and corporate governance requirements make it difficult for IT departments to find the right balance between protecting and managing critical data " and providing employees with the access and information-sharing flexibility they need to effectively do their jobs.

Until now, file transfer solutions have focused almost solely on security " overlooking the critical need for end-to-end visibility, management and policy enforcement around sensitive data, such as credit card information, health records and sales intelligence.

Ipswitch's recent survey uncovered that over 90% of IT and security executives admitted to using thumb drives and other external devices to move data. And nearly 70% said that they have no visibility into files outside of their organization. The MOVEit DMZ managed file transfer solution solves these problems with a secure, easy to use solution that provides organizations with visibility, management and enforcement of policies.

MOVEit DMZ 7.0 also offers an optional Ad Hoc Transfer module which enables secure person-to-person file transfer using a Web browser or Microsoft Outlook. Unlike other software and services that are currently in the market today, Ipswitch's Ad Hoc Transfer module not only allows users to seamlessly share information without sacrificing productivity, it also allows companies to stay firmly within compliance of their auditing policies particularly those around email/email attachment retention and discovery.

"We're setting a new standard for managed file transfer, delivering to organizations the visibility and controls they need, while making it easier than ever for end users to securely transfer files of any size," said Jonathan Lampe, Vice President of Product Management, Ipswitch. "The Outlook plug-in provides a seamless employee experience as they interact with people inside or outside the organization."

MOVEit DMZ's new person-to-person Ad Hoc Transfer module lets organizations:

Quickly and securely transfer files through Microsoft Outlook or a Web browser

Oversee and manage all file transfer activities, internally and externally

Create and enforce file transfer and file sharing policies

Eliminate the "file attachment" burden from the email server

Provides complete visibility into all file transfer activities

Fully auditable, with complete archival and retrieval of all files and messages for discovery and compliance

MOVEit DMZ Enterprise 7.0 and the new Ad Hoc Transfer module are immediately available. For more information on the solutions, please visit the Ipswitch File Transfer website.

About Ipswitch File Transfer Ipswitch File Transfer is a global technology provider that builds solutions to securely move your valuable data. We enable companies and people to better manage their data interactions when visibility, management and enforcement matter. Our managed file transfer solutions deliver the control necessary to enable governance and compliance for our more than 40 million global users " including the majority of Fortune 1000 enterprises and government agencies. These organizations trust Ipswitch File Transfer solutions to secure, manage, automate and streamline their critical and highly sensitive file transfers and data workflows. Learn more at http://www.ipswitchft.com or contact us at http://www.ipswitchft.com/Company/Contact.aspx, or on LinkedIn and Twitter.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0993
Published: 2014-09-15
Buffer overflow in the Vcl.Graphics.TPicture.Bitmap implementation in the Visual Component Library (VCL) in Embarcadero Delphi XE6 20.0.15596.9843 and C++ Builder XE6 20.0.15596.9843 allows remote attackers to execute arbitrary code via a crafted BMP file.

CVE-2014-2375
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to read or write to arbitrary files, and obtain sensitive information or cause a denial of service (disk consumption), via the CSV export feature.

CVE-2014-2376
Published: 2014-09-15
SQL injection vulnerability in Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2377
Published: 2014-09-15
Ecava IntegraXor SCADA Server Stable 4.1.4360 and earlier and Beta 4.1.4392 and earlier allows remote attackers to discover full pathnames via an application tag.

CVE-2014-3077
Published: 2014-09-15
IBM SONAS and System Storage Storwize V7000 Unified (aka V7000U) 1.3.x and 1.4.x before 1.4.3.4 store the chkauth password in the audit log, which allows local users to obtain sensitive information by reading this log file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
CISO Insider: An Interview with James Christiansen, Vice President, Information Risk Management, Office of the CISO, Accuvant