Tag Archives: Hugh Garber

Correlation & Visibility

Let’s start to examine the impact of end-to-end visibility and ways it can be put to work for your organization.  For starters, let’s dig into correlation. Correlation involves identifying related actions and events as a file moves through a series of business processes (including what happens after a file is […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , , , | Leave a comment

The challenge of visibility

Information flows into, within and out of organizations faster and in greater volumes than ever before.  Complicating matters is the growing number of vendor systems, applications and platforms that make up your company’s business infrastructure and touch even your most sensitive and mission-critical information. If you don’t have visibility into […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , , | Leave a comment

The importance of visibility

You’re going to be hearing more and more about “VISIBILITY” from Ipswitch, so I’d like to quickly start this blog post with our definition of visibility in the context of files and data flowing into, within and out of your company: Visibility:  “Unobstructed vision into all data interactions, including files, […]

Posted in Auditing, Enforcement, Managed File Transfer, Management, Visibility | Also tagged , , , , , | Leave a comment

Encryption: Transport versus File

This morning I was asked if I recommended using transport encryption or file encryption to protect company files and data. My answer:  “Use both of them, together!” For starters, here’s a real quick summary of both encryption types: Transport encryption (“data-in-transit”) protects the file as it travels over protocols such […]

Posted in Compliance, Data Breach, FTP, Managed File Transfer, Security | Also tagged , , , , , , , , | Leave a comment

Moving beyond FTP: Where to begin?

“My company still relies heavily on FTP.  I know we should be using something more secure, but I don’t know where to begin.” Sound familiar? The easy answer is that you should migrate away from antiquated FTP software because it could be putting your company’s data at risk – Unsecured […]

Posted in Enforcement, FTP, Managed File Transfer, Management, Person-to-Person, Security, Visibility | Also tagged , , , , , | Leave a comment

Hackers break browser SSL/TLS Encryption

Word has quickly spread that a serious weakness has been discovered in the Secure Sockets Layer (SSL) protocol that allows attackers to silently decrypt data that’s passing between a web server and an end-user browser. All reports indicate that this vulnerability affects the SSL protocol itself and is not specific […]

Posted in File Security, Security | Also tagged , , , , , , , , | Leave a comment

Senator to businesses: Protect data or pay

As George Hulme recently wrote, the vision of Senator Richard Blumenthal’s data breach legislation is simple enough:  Protect individuals’ personally identifiable information from data theft, and penalize firms that don’t adequately secure their customers’ information. Clearly, there’s a need for organizations to better secure confidential and private customer information.  It […]

Posted in Data Breach, Enforcement, File Security, Managed File Transfer, Management, Security, Visibility | Also tagged , , , , , | Leave a comment