Visibility

Correlation & Visibility

Let’s start to examine the impact of end-to-end visibility and ways it can be put to work for your organization.  For starters, let’s dig into correlation. Correlation involves identifying related actions and events as a file moves through a series of business processes (including what happens after a file is […]

Also posted in Auditing, Enforcement, Managed File Transfer, Management | Tagged , , , , , , , , | Leave a comment

The challenge of visibility

Information flows into, within and out of organizations faster and in greater volumes than ever before.  Complicating matters is the growing number of vendor systems, applications and platforms that make up your company’s business infrastructure and touch even your most sensitive and mission-critical information. If you don’t have visibility into […]

Also posted in Auditing, Enforcement, Managed File Transfer, Management | Tagged , , , , , , , | Leave a comment

The importance of visibility

You’re going to be hearing more and more about “VISIBILITY” from Ipswitch, so I’d like to quickly start this blog post with our definition of visibility in the context of files and data flowing into, within and out of your company: Visibility:  “Unobstructed vision into all data interactions, including files, […]

Also posted in Auditing, Enforcement, Managed File Transfer, Management | Tagged , , , , , , | Leave a comment

Moving beyond FTP: Where to begin?

“My company still relies heavily on FTP.  I know we should be using something more secure, but I don’t know where to begin.” Sound familiar? The easy answer is that you should migrate away from antiquated FTP software because it could be putting your company’s data at risk – Unsecured […]

Also posted in Enforcement, FTP, Managed File Transfer, Management, Person-to-Person, Security | Tagged , , , , , , | Leave a comment

Data Breach Primer – What Does it all Mean?

Hey SEC, it’s Frank Kenney at Ipswitch. I don’t mean to rock the boat but I had a few quick questions regarding your recent announcement that you are requiring companies to notify their customers of a breach or risk of breach. What’s a “breach”? Does it mean the bad guys […]

Also posted in Data Breach, File Security, Security | Tagged , , , , , , | Leave a comment

Senator to businesses: Protect data or pay

As George Hulme recently wrote, the vision of Senator Richard Blumenthal’s data breach legislation is simple enough:  Protect individuals’ personally identifiable information from data theft, and penalize firms that don’t adequately secure their customers’ information. Clearly, there’s a need for organizations to better secure confidential and private customer information.  It […]

Also posted in Data Breach, Enforcement, File Security, Managed File Transfer, Management, Security | Tagged , , , , , , | Leave a comment

Caution: Web-searchable servers and databases

August 2011:  Yale University announced that 43,000 social security numbers posted to an insecure FTP server have been available to Google search engine users for the past 10-months. May 2011:  Southern California Medical-Legal Consultants (SCMLC) disclosed that the medical records of 300,000 injured workers were available online to the public […]

Also posted in Auditing, Compliance, Data Breach, Enforcement, File Security, Security | Tagged , , , , , , , , | Leave a comment