<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>MFT for Everyone</title>
	<atom:link href="https://managedfiletransfer.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://managedfiletransfer.wordpress.com</link>
	<description>From Infrastructure to People</description>
	<lastBuildDate>Mon, 27 Feb 2023 15:31:28 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">8215530</site><cloud domain='managedfiletransfer.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://s0.wp.com/i/buttonw-com.png</url>
		<title>MFT for Everyone</title>
		<link>https://managedfiletransfer.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://managedfiletransfer.wordpress.com/osd.xml" title="MFT for Everyone" />
	<atom:link rel='hub' href='https://managedfiletransfer.wordpress.com/?pushpress=hub'/>
	<item>
		<title>What is MFT and Why do Businesses need it?</title>
		<link>https://managedfiletransfer.wordpress.com/2023/02/27/what-is-mft-and-why-do-businesses-need-it/</link>
					<comments>https://managedfiletransfer.wordpress.com/2023/02/27/what-is-mft-and-why-do-businesses-need-it/#respond</comments>
		
		<dc:creator><![CDATA[Jonathan Gatrell]]></dc:creator>
		<pubDate>Mon, 27 Feb 2023 15:31:28 +0000</pubDate>
				<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=639</guid>

					<description><![CDATA[Managed File Transfer (MFT) is a software-based solution that allows businesses to securely exchange large and sensitive files both internally and externally. MFT provides a secure, reliable, and auditable way of transferring files, which is particularly important for organizations that deal with sensitive data such as financial institutions, healthcare providers, and government agencies. MFT solutions [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph">Managed File Transfer (MFT) is a software-based solution that allows businesses to securely exchange large and sensitive files both internally and externally. MFT provides a secure, reliable, and auditable way of transferring files, which is particularly important for organizations that deal with sensitive data such as financial institutions, healthcare providers, and government agencies.</p>



<p class="wp-block-paragraph"><a href="https://www.ld.com">MFT solutions</a> typically include features such as encryption, authentication, and access controls to ensure that files are securely transmitted and received. They also provide tracking and auditing capabilities, enabling businesses to monitor file transfers and ensure compliance with regulations and policies.</p>



<p class="wp-block-paragraph">MFT solutions can be implemented on-premises, in the cloud, or through a hybrid approach, depending on the organization&#8217;s specific requirements. They can also integrate with other systems and applications, such as enterprise content management systems and workflow automation tools, to streamline business processes and improve efficiency.</p>



<p class="wp-block-paragraph">Overall, managed file transfer is an essential tool for businesses that need to transfer large amounts of data securely and efficiently, while also meeting compliance and regulatory requirements.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2023/02/27/what-is-mft-and-why-do-businesses-need-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">639</post-id>
		<media:content url="https://0.gravatar.com/avatar/c2f0120f9ec2541b85fe4339e5fe454eab593df2fc85d1321950484a164ab0f5?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">Jonathan Gatrell</media:title>
		</media:content>
	</item>
		<item>
		<title>Situation: Inefficiency, Expense and Non-Compliance</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/29/situation-inefficiency-expense-and-non-compliance/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/29/situation-inefficiency-expense-and-non-compliance/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 29 Jun 2010 19:27:31 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[job schedulers]]></category>
		<category><![CDATA[job scheduling]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=632</guid>

					<description><![CDATA[Job Scheduling: Heterogeneous Inefficiency Most enterprises implement multiple job scheduling solutions depending on platform type, application, data center and business owner. Aside from standards like cron, at, SAP&#8217;s, CCMS, i5/OS Advanced Job Scheduler, Oracle&#8217;s DMBS_Scheduler, HP&#8217;s Netbatch for NonStop servers, and others, more than 30 vendors add job scheduling solutions to the enterprise mix. While [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Job Scheduling: Heterogeneous Inefficiency</strong></p>
<p>Most enterprises implement multiple job scheduling solutions depending on platform type, application, data center and business owner. Aside from standards like cron, at, SAP&#8217;s, CCMS, i5/OS Advanced Job Scheduler, Oracle&#8217;s DMBS_Scheduler, HP&#8217;s Netbatch for NonStop servers, and others, more than 30 vendors add job scheduling solutions to the enterprise mix. While a diverse mix of job scheduling software may address the needs of individual business owners, that same mix presents a barrier to consolidated job scheduling.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg"><img data-attachment-id="633" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/29/situation-inefficiency-expense-and-non-compliance/streamlining/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg" data-orig-size="288,288" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="streamlining" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg?w=288" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg?w=288" class="aligncenter size-full wp-image-633" title="streamlining" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg" alt="" width="288" height="288" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg 288w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg?w=150&amp;h=150 150w" sizes="(max-width: 288px) 100vw, 288px" /></a></p>
<p><strong>File Transfer: Exorbitant Pricing and Non-Compliant Adoption</strong></p>
<p>Despite growing budget constraints, many organizations cling to expensive enterprise-class file transfer solutions &#8211; some requiring dedicated connections. Often, the file transfer software is so costly that an organization deploys it only sparingly, allowing internal users to initiate FTP &#8211; a serious issue of audit compliance. Although there are a great many <a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">solutions for B2B communications security</a>, MFT satisfies basic needs with minimal complexity. Simply put, MFT solutions are frequently overpriced.</p>
<p>Learn more. <a href="http://wwww.stonebranch.com/whitepapers/EMA_Stonebranch_MFT_Job_Scheduling.html" target="_blank">Read the white paper</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/29/situation-inefficiency-expense-and-non-compliance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">632</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/streamlining.jpg" medium="image">
			<media:title type="html">streamlining</media:title>
		</media:content>
	</item>
		<item>
		<title>What Causes A Disparate Job Scheduling Environment?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/24/what-causes-a-disparate-job-scheduling-environment/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/24/what-causes-a-disparate-job-scheduling-environment/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 24 Jun 2010 18:29:12 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[indepedent scheduling agents]]></category>
		<category><![CDATA[Indesca]]></category>
		<category><![CDATA[job scheduler]]></category>
		<category><![CDATA[job scheduling]]></category>
		<category><![CDATA[vendor-independent technology]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=628</guid>

					<description><![CDATA[While I have touched on the causes of a complex and disparate job scheduling environment in past posts, let&#8217;s take a more in-depth look at some of leading causes: Acquisitions  &#8211; For many companies that integrate acquisitions, consolidating IT tools such as scheduling is not their highest priority. Although, it will save money in the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>While I have touched on the causes of a complex and disparate job scheduling environment in past posts, let&#8217;s take a more in-depth look at some of leading causes:</p>
<ol>
<li>Acquisitions  &#8211; For many companies that integrate acquisitions, consolidating IT tools such as scheduling is not their highest priority. Although, it will save money in the long run, it is a big project that poses risks. Consequently, scheduling staff members are burdened with managing multiple schedulers.</li>
<li>Departmental Purchasing &#8211; The lack of centralized purchasing or company-wide standards often results in the independent departmental acquisition of different job scheduling solutions that are unable to interoperate with each other and existing tools.</li>
<li>Access to Tools &#8211; Application departments circumvent standard tools and use easier scheduling tools such as Cron. It is simple and easy to set up a Cron tab or schedule a process in Windows, but it is only a quick fix. Moreover, these one-off fixes decrease overall business visibility.</li>
<li>Built-in application capabilities: This is one of the biggest culprits. Companies deploy applications and tools, such as backup products, due to the perceived benefits of a self-contained system that can be managed by its own tools. This thinking ignores the fact that most applications are not self-contained. In fact, they &#8220;touch&#8221; other applications by exchanging data and have dependencies based on the overall business workflow. Implementing these &#8220;point&#8221; solutions prevents the ability to control business workflows from end-to-end.</li>
<li>Lack of management mandate &#8211; Without clear mandates from senior management, there is no ability to enforce centralized control. Thus, departments and application developers will take the path of least resistance.</li>
</ol>
<p>In many cases, sooner or later, IT operations inherit these different applications and tools and are stuck with managing them. With <a href="http://www.stonebranch.com/independentschedulingagent.html" target="_blank">vendor-independent technology</a>, IT organizations can avoid these pitfalls, while saving money, time and resources.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/24/what-causes-a-disparate-job-scheduling-environment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">628</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>
	</item>
		<item>
		<title>Are Your Employees Following Security Policies?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/22/are-your-employees-following-security-policies/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/22/are-your-employees-following-security-policies/#comments</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 22 Jun 2010 17:28:38 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ad hoc managed file transfer]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=624</guid>

					<description><![CDATA[In the Ponemon Institute&#8217;s study, &#8220;Trends in Insider Compliance with Data Security Policies,&#8221; a majority of respondents admit to serious non-compliant workplace behaviors that place their companies at risk. Such behaviors include the insecure use of USB memory sticks, Web-based email, social media, mobile devices and more. What&#8217;s more, the problem seems to be getting [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In the Ponemon Institute&#8217;s study, &#8220;<a href="http://www.ponemon.org/data-security" target="_blank"><em>Trends in Insider Compliance with Data Security Policies</em></a>,&#8221; a majority of respondents admit to serious non-compliant workplace behaviors that place their companies at risk. Such behaviors include the insecure use of USB memory sticks, Web-based email, social media, mobile devices and more. What&#8217;s more, the problem seems to be getting worse. The report sites lost or missing USB memory sticks and other portable data-bearing devices that often not reported to the company or are reported when it is too late.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg"><img data-attachment-id="625" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/22/are-your-employees-following-security-policies/usb-image/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg" data-orig-size="540,175" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="USB image" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=510" class="aligncenter size-medium wp-image-625" title="USB image" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=300" alt="" width="300" height="97" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg 540w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Two key findings?</p>
<ul>
<li>Employee attitudes about their employees affect the level of compliant vs. non-compliant behavior.</li>
<li>Employees do not believe their organizations provide ample training or adequate policies to inform them about data protection and security practices.</li>
</ul>
<p>So, how does your company stack up against the percentages? 61 percent of end users transfer confidential data onto a USB stick and 71 percent says that others do it. What if there was a way to easily transfer sensitive, proprietary and confidential company and client information without using the number 1 cause of lost data? A secure, ad hoc Managed File Transfer solution can let your employees send up to 2GB of confidential information of files without even leaving their email client. No training, no ramp-up time and the ability to track messages and files. Sound too good to be true? <a href="http://www.scribbos.com/scribbos_outlook.html" target="_blank">Learn more</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/22/are-your-employees-following-security-policies/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">624</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/usb-image.jpg?w=300" medium="image">
			<media:title type="html">USB image</media:title>
		</media:content>
	</item>
		<item>
		<title>Managed File Transfer: Preventing Healthcare Identity Theft</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/17/managed-file-transfer-preventing-healthcare-identity-theft/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/17/managed-file-transfer-preventing-healthcare-identity-theft/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 17 Jun 2010 16:32:07 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[B2B File Transfer]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[HITECH ACT]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[PHI]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=618</guid>

					<description><![CDATA[In a recent report by the Smart Card Alliance entitled, &#8220;Medical Identity Theft in Healthcare,&#8221; the study sites that, &#8220;Further evidence of the significance of the medical fraud problem is the allocation of $1.7 billion for fraud detection in the 2011 U.S. Health and Human Services budget.&#8221; In 2009 alone, 68 reported healthcare data breaches [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align:left;">In a recent report by the Smart Card Alliance entitled, &#8220;<a href="http://www.smartcardalliance.org/pages/publications-medical-identity-theft-in-healthcare" target="_blank"><em>Medical Identity Theft in Healthcare</em></a>,&#8221; the study sites that, &#8220;Further evidence of the significance of the medical fraud problem is the allocation of $1.7 billion for fraud detection in the 2011 U.S. Health and Human Services budget.&#8221; In 2009 alone, 68 reported healthcare data breaches in the U.S. put over 11.3 million patient records at risk according to the <a href="http://www.idtheftcenter.org/" target="_blank">Identity Theft and Resource Center</a> (ITRC).</p>
<p style="text-align:left;">
<p><div data-shortcode="caption" id="attachment_619" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg"><img aria-describedby="caption-attachment-619" data-attachment-id="619" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/17/managed-file-transfer-preventing-healthcare-identity-theft/records-page/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg" data-orig-size="460,276" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="records-page" data-image-description="" data-image-caption="&lt;p&gt;Paper records are no longer acceptable for your organization.&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=460" class="size-medium wp-image-619" title="records-page" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=300" alt="" width="300" height="180" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg 460w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-619" class="wp-caption-text">Paper records are no longer acceptable for your organization.</p></div></p>
<p style="text-align:left;">The American Recovery and Reinvestment Act (ARRA) and the associated provisions under the <a href="http://wwww.stonebranch.com/whitepapers/HITECH_means_for_Healthcare.html" target="_blank">Health Information Technology  for Economic and Clinical Health</a> (HITECH),  have highlighted the need to address security and privacy across our healthcare system.</p>
<p style="text-align:left;">The report goes on to state that &#8220;the way to stop medical identity theft confusion is to improve patient identification and provide enhanced data production through strong authentication and encryption.&#8221; How can a healthcare organization achieve this? <a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">B2B Managed File Transfer</a>. Protection of patient information does not happen just inside the four walls of your organization. Think of the providers, health record banks, health insurance and hospital Web portals.</p>
<p style="text-align:left;">The key is two-factor authentication and data encryption. Are you employing these security methodologies at your organization?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/17/managed-file-transfer-preventing-healthcare-identity-theft/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">618</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/records-page.jpg?w=300" medium="image">
			<media:title type="html">records-page</media:title>
		</media:content>
	</item>
		<item>
		<title>Securing Your Customers&#8217; Data</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/15/securing-your-customers-data/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/15/securing-your-customers-data/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 15 Jun 2010 18:07:21 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ad hoc managed file transfer]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[SaaS]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=613</guid>

					<description><![CDATA[Can you guarantee the security of customer and company information with today&#8217;s available communication tools? As a business professional, there are a number of tools from which to choose for communication and collaboration. It would be impossible to conduct business everyday without email. Additionally, you use solutions such as FTP to send large files to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align:center;"><strong>Can you guarantee the security of customer and company information with today&#8217;s available communication tools?</strong></p>
<p style="text-align:left;">As a business professional, there are a number of tools from which to choose for communication and collaboration. It would be impossible to conduct business everyday without email. Additionally, you use solutions such as FTP to send large files to colleagues, business partners and clients. In a hurry, you may use expensive, expedited shipping services or a courier for your confidential and proprietary documents.</p>
<p style="text-align:left;"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg"><img loading="lazy" data-attachment-id="614" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/15/securing-your-customers-data/confidential-file/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg" data-orig-size="250,353" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="confidential-file" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=212" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=250" class="aligncenter size-medium wp-image-614" title="confidential-file" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=212" alt="" width="212" height="300" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=212 212w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=106 106w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg 250w" sizes="(max-width: 212px) 100vw, 212px" /></a></p>
<p style="text-align:left;">While there are many forms of communication, do you have 100 percent confidence that the content of the message or file being exchanged is secure? While these services, &#8220;get the job done&#8221; in most cases, they ineffective, costly and provide no guarantee that your documents will arrive securely or on time. So how can you transfer messages and files securely, instantly and a reasonable price?</p>
<p style="text-align:left;">A <a href="http://www.scribbos.com" target="_blank">secure business communications solution</a> can be used to exchange information or files quickly and securely inside and outside of your organization. As easy-to-use as <a href="http://www.scribbos.com/scribbos_outlook.html" target="_blank">email</a>, a secure business communications solution, enables you to send important, confidential or proprietary information instantly. Just type a message or attach a file and click to send.</p>
<p style="text-align:left;"><a href="http://www.scribbos.com/facts.html" target="_blank">Learn more</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/15/securing-your-customers-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">613</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/confidential-file.jpg?w=212" medium="image">
			<media:title type="html">confidential-file</media:title>
		</media:content>
	</item>
		<item>
		<title>What Data Are Your Employees Sending Out?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/10/what-data-are-your-employees-sending-out/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/10/what-data-are-your-employees-sending-out/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 10 Jun 2010 14:21:54 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[SaaS]]></category>
		<category><![CDATA[secure business communications]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=609</guid>

					<description><![CDATA[Business communications today is a complex issue for most organizations. With so many tools, whether its email, mobile apps or FTP, it is difficult for users to know the most effective solution for sending confidential or proprietary information. From an information security standpoint, these data exchange solutions are insecure, ineffective and can potentially cause data [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Business communications today is a complex issue for most organizations. With so many tools, whether its email, mobile apps or <a href="http://www.stonebranch.com/whitepapers/securing-your-business-with-managed-file-transfer.html" target="_blank">FTP</a>, it is difficult for users to know the most effective solution for sending confidential or proprietary information. From an information security standpoint, these data exchange solutions are insecure, ineffective and can potentially cause data breaches within your organization.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg"><img loading="lazy" data-attachment-id="610" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/10/what-data-are-your-employees-sending-out/desktop_security_splash/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg" data-orig-size="300,340" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Desktop_security_splash" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=265" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=300" class="aligncenter size-medium wp-image-610" title="Desktop_security_splash" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=264" alt="" width="264" height="300" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=264 264w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=132 132w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg 300w" sizes="(max-width: 264px) 100vw, 264px" /></a></p>
<p>As an IT manager, are you constantly concerned with how and what information your employees are exchanging  within and outside your organization? With a <a href="http://www.scribbos.com/" target="_blank">secure business communications solution</a>, you gain visibility and control over your organization&#8217;s business communications with process status, exceptions and transactions and trends. Additionally, deploying via <a href="http://www.scribbos.com/scribbos_on_demand.html">SaaS</a> provides an affordable cost of ownership and quick return on investment due to ease of use and quick implementation.</p>
<p>Finally, providing your business users with a way to communicate securely and seamlessly without disrupting their daily activities enables you to relax knowing they aren&#8217;t circumventing IT by uses one-off, insecure communication methods to get their job done.</p>
<p>Do you know how your users send out confidential or sensitive information?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/10/what-data-are-your-employees-sending-out/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">609</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/desktop_security_splash.jpg?w=264" medium="image">
			<media:title type="html">Desktop_security_splash</media:title>
		</media:content>
	</item>
		<item>
		<title>Technology Independent Scheduling Agents: Part Two</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/08/technology-independent-scheduling-agents-part-two/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/08/technology-independent-scheduling-agents-part-two/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 08 Jun 2010 17:48:30 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[Various]]></category>
		<category><![CDATA[independent scheduling agents]]></category>
		<category><![CDATA[job schedulers]]></category>
		<category><![CDATA[technology independent]]></category>
		<category><![CDATA[workload automation]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=603</guid>

					<description><![CDATA[Besides minimizing risk and costs, vendor-independent technology enables you to simplify your IT infrastructure by standardizing processes to execute workload automation anywhere in the environment. Moreover, if business requirements dictate a new workload tool, the standard process is transportable, saving your original investment in configuration, training and deployment. This is all accomplished without getting locked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Besides minimizing risk and costs, vendor-independent technology enables you to simplify your IT infrastructure by standardizing processes to execute workload automation anywhere in the environment. Moreover, if business requirements dictate a new workload tool, the standard process is transportable, saving your original investment in configuration, training and deployment. This is all accomplished without getting locked in to a single vendor, which has negative implications for both price and functionality.</p>
<p>For example, assume you have two schedulers and each has its own proprietary agent technology. These schedulers each need to run processes across shared systems. Without vendor-independent technology, this would require a proprietary agent from each of the two schedulers installed on each of the systems, which not only creates significant cost but also  causes complexity for scheduling and operations staff. Vendor-independent technology can speak to each of these systems, requiring only one agent, while receiving processing requests from the two schedulers. This significantly simplifies the communication in your job scheduling environment.</p>
<p>By using vendor-independent technology, there is no need to retrain employees on new schedulers. You can re-use your existing technology investments in software, processes and skill sets, while simplifying your environment. You gain control over your job scheduling infrastructure while providing greater visibility in your production environment.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/08/technology-independent-scheduling-agents-part-two/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">603</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>
	</item>
		<item>
		<title>Job Scheduling Agents at a Reasonable Cost: Feed Your Piggy Bank</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/03/job-scheduling-agents-at-a-reasonable-cost-feed-your-piggy-bank/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/03/job-scheduling-agents-at-a-reasonable-cost-feed-your-piggy-bank/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 03 Jun 2010 19:05:58 +0000</pubDate>
				<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[Various]]></category>
		<category><![CDATA[independent scheduling agents]]></category>
		<category><![CDATA[Indesca]]></category>
		<category><![CDATA[job schedulers]]></category>
		<category><![CDATA[job scheduling]]></category>
		<category><![CDATA[scheduling agents]]></category>
		<category><![CDATA[technology independent]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=597</guid>

					<description><![CDATA[Are expensive scheduling agents preventing you from meeting you Job Scheduling requirements? Replacing or even acquiring additional legacy scheduling agents is a costly, daunting and resource-draining task. Vendor-independent technology enables you to avoid these risks while streamlining, optimizing and modernizing your Job Scheduling environment without replacing a single agent. Not to mention you can add [&#8230;]]]></description>
										<content:encoded><![CDATA[<p style="text-align:center;"><strong>Are expensive scheduling agents preventing you from meeting you Job Scheduling requirements?</strong></p>
<p style="text-align:left;">Replacing or even acquiring additional legacy scheduling agents is a costly, daunting and resource-draining task. <a href="http://www.stonebranch.com/independentschedulingagent.html" target="_blank">Vendor-independent technology</a> enables you to avoid these risks while streamlining, optimizing and modernizing your Job Scheduling environment without replacing a single agent. Not to mention you can add agents to meet your growing requirements at the fraction of the cost of purchasing additional agents from existing scheduling vendor. All of which significantly reduces cost and increases your return on investment.</p>
<p style="text-align:left;">
<p><div data-shortcode="caption" id="attachment_600" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg"><img aria-describedby="caption-attachment-600" loading="lazy" data-attachment-id="600" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/03/job-scheduling-agents-at-a-reasonable-cost-feed-your-piggy-bank/piggy/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg" data-orig-size="509,339" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;8&quot;,&quot;credit&quot;:&quot;Christine Glade&quot;,&quot;camera&quot;:&quot;Canon EOS DIGITAL REBEL XT&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;1200920164&quot;,&quot;copyright&quot;:&quot;\u00c2\u00a9 2007 Christine Glade&quot;,&quot;focal_length&quot;:&quot;50&quot;,&quot;iso&quot;:&quot;200&quot;,&quot;shutter_speed&quot;:&quot;0.005&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="piggy" data-image-description="" data-image-caption="&lt;p&gt;Are you throwing money away with legacy scheduler agents?&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=509" class="size-medium wp-image-600" title="piggy" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=300" alt="" width="300" height="199" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg 509w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-600" class="wp-caption-text">Are you throwing money away with legacy scheduler agents?</p></div></p>
<p style="text-align:left;"><a href="http://www.stonebranch.com/indesca_beat_system_video.html" target="_blank">Vendor-independent technology</a> works alongside your existing schedulers and provides you with one single point of management and control for your entire environment. No matter what the scheduling tool, every agent can be controlled and monitored from one central location, providing visibility across your entire workflow. Vendor-independent technology allows you to execute programs outside of Job Scheduling, making it more than just a scheduling agent; it&#8217;s an automation tool.</p>
<p style="text-align:left;">Costs can increase because your scheduling vendor bases agent cost on multiple CPUs. <a href="http://wwww.stonebranch.com/whitepapers/ISA_Technical_Whitepaper.html" target="_blank">With technology-independent technology</a>, whether it&#8217;s one CPU or 20, the cost remains the same. You are not locked down by a particular vendor, platform or scheduling system. You gain value and additional functionality at a reasonable price that is not offered by Job Scheduling vendors.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/03/job-scheduling-agents-at-a-reasonable-cost-feed-your-piggy-bank/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">597</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/06/piggy.jpg?w=300" medium="image">
			<media:title type="html">piggy</media:title>
		</media:content>
	</item>
		<item>
		<title>Platform-Specific Vs. Technology Independent: A Scheduler or a Agent?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/06/01/platform-specific-vs-technology-independent-a-scheduler-or-a-agent/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/06/01/platform-specific-vs-technology-independent-a-scheduler-or-a-agent/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 01 Jun 2010 14:54:12 +0000</pubDate>
				<category><![CDATA[Consulting Services]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[Various]]></category>
		<category><![CDATA[independent scheduling agents]]></category>
		<category><![CDATA[job schedlulers]]></category>
		<category><![CDATA[job scheduler]]></category>
		<category><![CDATA[platform-agnostic]]></category>
		<category><![CDATA[scheduling agents]]></category>
		<category><![CDATA[technology independent]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=590</guid>

					<description><![CDATA[The key to solving both IT and business issues is to simplify and complement your existing job schedulers by deploying vendor-independent technology across the enterprise. This technology enables you to integrate with your existing schedulers and provides a more comprehensive view of your IT infrastructure.  Vendor-independent technology enables people to work across platforms without specialization, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The key to solving both IT and business issues is to simplify and complement your existing job schedulers by deploying vendor-independent technology across the enterprise. This technology enables you to integrate with your existing schedulers and provides a more comprehensive view of your IT infrastructure.  Vendor-independent technology enables people to work across platforms without specialization, standardizing processes and consolidating tools, improving IT maturity while significantly reducing hard and soft costs.</p>
<p><div data-shortcode="caption" id="attachment_591" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg"><img aria-describedby="caption-attachment-591" loading="lazy" data-attachment-id="591" data-permalink="https://managedfiletransfer.wordpress.com/2010/06/01/platform-specific-vs-technology-independent-a-scheduler-or-a-agent/streamlined-job-scheduling-environment/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg" data-orig-size="378,188" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Streamlined Job Scheduling Environment" data-image-description="" data-image-caption="&lt;p&gt;A simplified job scheduling environment using vendor-independent technology.&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=378" class="size-medium wp-image-591" title="Streamlined Job Scheduling Environment" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=300" alt="" width="300" height="149" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg 378w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-591" class="wp-caption-text">A simplified job scheduling environment using vendor-independent technology.</p></div></p>
<p>For example, suppose Scheduler A needs to communicate with three different backend applications. The cost of purchasing agents for those backend applications from Vendor A is cost prohibitive. Consequently, IT decides to use vendor-independent technology to complement the existing scheduler, enabling Scheduler A to communicate with all three backend applications at a much lower cost.</p>
<p>A key benefit to this <a href="http://www.stonebranch.com/independentschedulingagent.html" target="_blank">approach</a> is that you can leverage your existing investment in Scheduler A at reduced risk, cost and effort. Additionally, vendor-independent technology increases your business&#8217;s ability to support emerging technologies such as service-oriented architecture and other Web-based technologies.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/06/01/platform-specific-vs-technology-independent-a-scheduler-or-a-agent/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">590</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/streamlined-job-scheduling-environment.jpg?w=300" medium="image">
			<media:title type="html">Streamlined Job Scheduling Environment</media:title>
		</media:content>
	</item>
		<item>
		<title>Protecting Your Data and Your Partnerships</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/24/protecting-your-data-and-your-partnerships/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/24/protecting-your-data-and-your-partnerships/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Mon, 24 May 2010 16:01:44 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ad hoc managed file transfer]]></category>
		<category><![CDATA[B2B communicatons]]></category>
		<category><![CDATA[B2B File Transfer]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[EDI]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=584</guid>

					<description><![CDATA[In an Information Week Analytics report, &#8220;Inside Out: Protecting Your Partnerships and Your Data,&#8221; Curtis Franklin, Jr. of Dark Reading writes, &#8220;Partners are a critical element (to enterprise security) &#8211; in fact, their importance is matched only by the potential threat they pose to the security of corporate data and the network infrastructure. For IT [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In an Information Week Analytics report, &#8220;<a href="http://www.darkreading.com/insiderthreat/security/management/showArticle.jhtml?articleID=222301181" target="_blank"><em>Inside Out: Protecting Your Partnerships and Your Data</em></a>,&#8221; Curtis Franklin, Jr. of Dark Reading writes, &#8220;Partners are a critical element (to enterprise security) &#8211; in fact, their importance is matched only by the potential threat they pose to the security of corporate data and the network infrastructure. For IT professionals, the vital question is how to balance trust versus risk in enabling communication between the organization and partners.&#8221;</p>
<p><div data-shortcode="caption" id="attachment_586" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg"><img aria-describedby="caption-attachment-586" loading="lazy" data-attachment-id="586" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/24/protecting-your-data-and-your-partnerships/bridges-2/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg" data-orig-size="795,509" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="bridges" data-image-description="" data-image-caption="&lt;p&gt;Secure all points of contact with partners.&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=510" class="size-medium wp-image-586" title="bridges" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=300" alt="" width="300" height="192" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=600 600w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=150 150w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-586" class="wp-caption-text">Secure all points of contact with partners.</p></div></p>
<p>The report adds, &#8220;there have been instances in which partner connections were used to steal data or sabotage computer systems. These breaches show us that enterprises must stay vigilant about security, even in dealing with their closest and most trusted suppliers.&#8221; Other findings? &#8220;The difference between employee and partner risk varies by industry &#8211; in food service, partners accounted for as many as 70 percent of breaches; in the technology arena, partners accounted for only 18 percent.&#8221;</p>
<p>Organizations must be wary of:</p>
<ul>
<li>the introduction of malware</li>
<li>confidential software theft</li>
<li>the data at risk &#8211; proprietary, intellectual property to private customer information</li>
</ul>
<p>While concrete corporate security policies, firewalls and other security measures, help alleviate the threat, how do you ensure B2B partner and trading partner security is achieved while still optimizing those partnerships, making it easier for your partners to do business with you?</p>
<p><a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">B2B Managed File Transfer</a> &#8211; From secure ad-hoc file transfer to EDI to enterprise-wide Managed File Transfer a complete B2B communications solution can prevent these breaches from happening to you. Because whether the breach is accidental or intentional, the damage has still been done.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/24/protecting-your-data-and-your-partnerships/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">584</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/bridges1.jpg?w=300" medium="image">
			<media:title type="html">bridges</media:title>
		</media:content>
	</item>
		<item>
		<title>When Do You Consolidate Apps?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/20/when-do-you-consolidate-apps/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/20/when-do-you-consolidate-apps/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 20 May 2010 13:30:12 +0000</pubDate>
				<category><![CDATA[Consulting Services]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[Consolidation]]></category>
		<category><![CDATA[Consulting]]></category>
		<category><![CDATA[independent scheduling agents]]></category>
		<category><![CDATA[job schedulers]]></category>
		<category><![CDATA[job scheduling]]></category>
		<category><![CDATA[ROI]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=578</guid>

					<description><![CDATA[In the InformationWeek article, &#8220;The Sprawl Stops Here!,&#8221; Michael Biddick makes important points in the benefits of application consolidation. The article starts out with the statement, &#8220;Application consolidation should never go out of style.&#8221; The debate between growth and trimming maintenance and support costs seems to be an argument that will continue to polarize IT [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In the InformationWeek article, &#8220;<em>The Sprawl Stops Here!</em>,&#8221; Michael Biddick makes important points in the benefits of application consolidation. The article starts out with the statement, &#8220;<em>Application consolidation should never go out of style.</em>&#8221; The debate between growth and trimming maintenance and support costs seems to be an argument that will continue to polarize IT executives.  Moreover, the article states, &#8220;<em>i</em><em>n terms of business justification, the case for consolidating apps is one of the easiest to make but the hardest to implement</em>.&#8221;</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg"><img loading="lazy" data-attachment-id="579" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/20/when-do-you-consolidate-apps/consolidation/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg" data-orig-size="300,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="consolidation" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg?w=300" class="aligncenter size-full wp-image-579" title="consolidation" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg" alt="" width="300" height="300" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg?w=150&amp;h=150 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Why? Most people don&#8217;t like change. Many people, may in fact, have a vested interest in an application, whether homegrown, customized or proprietary. The article states, &#8220;<em>custom products cost more to maintain than commercial alternatives, if they exist</em>.&#8221; To successfully consolidate application across the enterprise, all affected departments need to be on board. This often becomes challenging, especially in time of mergers &amp; acquisitions, when tensions are high and most staff members are thinking about redundant positions or departments.  Also, preferred applications or custom-built applications will be met with much opposition due to the resources and time put into developing the app. The question becomes: &#8220;Is there business value in the app?&#8221;</p>
<p>Consolidation drivers are clear: reduce cost and complexity. Biddick writes, &#8220;<em>The more complex the software and systems involved, the greater the return for consolidation.&#8221;</em></p>
<p>Applications that are interoperable can bring further consolidation. What if you were able to <a href="http://wwww.stonebranch.com/whitepapers/EMA_Stonebranch_MFT_Job_Scheduling.html" target="_blank">consolidate</a> your file transfer along with your job scheduling processes? The result would be increased visibility enterprise-wide, better communications between departments, less complexity, and ultimately affecting the bottom line.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/20/when-do-you-consolidate-apps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">578</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/consolidation.jpg" medium="image">
			<media:title type="html">consolidation</media:title>
		</media:content>
	</item>
		<item>
		<title>P2P Networks Vs. Managed File Transfer</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/18/p2p-networks-vs-managed-file-transfer/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/18/p2p-networks-vs-managed-file-transfer/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Tue, 18 May 2010 14:49:05 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[data leaks]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[HITECH]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[P2P file sharing]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=572</guid>

					<description><![CDATA[In a recent ComputerWorld&#8217;s, &#8220;P2P networks a treasure trove of leaked health care data, study finds,&#8221; the article states, &#8220;that nearly eight months after new rules were enacted requiring stronger protection of healthcare information, organizations are still leaking such data on file-sharing networks. In a research paper to be presented today at the IEEE Security [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In a recent ComputerWorld&#8217;s, &#8220;<a href="http://www.computerworld.com/s/article/9176883/P2P_networks_a_treasure_trove_of_leaked_health_care_data_study_finds?taxonomyId=16" target="_blank"><em>P2P networks a treasure trove of leaked health care data, study finds</em></a>,&#8221; the article states, &#8220;that nearly eight months after new rules were enacted requiring stronger protection of healthcare information, organizations are still leaking such data on file-sharing networks. In a research paper to be presented today at the IEEE Security Symposium, the findings include thousands of documents containing sensitive patient information on popular P2P networks such as Limewire, eDonkey and BearShare.  Further research by Eric Johnson, a Dartmouth college professor, finds that &#8220;one of more than 3,000 files discovered by researchers was a spreadsheet containing insurance details, personally identifying information, physician names and diagnosis codes on more than 28,000 individuals.&#8221; At a time when a person&#8217;s private healthcare information (PHI) is coming under closer scrutiny due to the Health Information for Economic and Clinical Health (<a href="http://wwww.stonebranch.com/whitepapers/HITECH_means_for_Healthcare.html" target="_blank">HITECH</a>) Act, it seems surprising that these P2P networks are still in use.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg"><img loading="lazy" data-attachment-id="573" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/18/p2p-networks-vs-managed-file-transfer/p2p_sharing/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg" data-orig-size="400,253" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="p2p_sharing" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=400" class="aligncenter size-medium wp-image-573" title="p2p_sharing" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=300" alt="" width="300" height="189" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg 400w" sizes="(max-width: 300px) 100vw, 300px" /></a>The problem with P2P software is that it is usually improperly installed on a computer that contains sensitive data.  While the use of the P2P software might be as benign as sharing music and video files, if installed improperly, the P2P software makes all data on the computer visible. Healthcare is not the only industry that has been burned by this issue &#8211; businesses and government alike face the same problem. So how do you securely share movies, music, photos and other files without jeopardizing the security of sensitive information? <a href="http://www.scribbos.com" target="_blank">Ad-hoc Managed File Transfer</a>. Similar to P2P networks ad-hoc managed file transfer solution enables you to send large files up to 2GB without disrupting sensitive data that may be on your machine.</p>
<p>Moreover, due to the secure nature of Managed File Transfer, you can send proprietary, confidential or sensitive information and not just large files. The ability to send messages and files securely with the ability to track when the recipient has received the message or file, gives the end user more control over how they send information and gives businesses, healthcare organizations and the government a secure person-to-person file sharing tool that prevents the leak of private information.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/18/p2p-networks-vs-managed-file-transfer/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">572</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/p2p_sharing.jpg?w=300" medium="image">
			<media:title type="html">p2p_sharing</media:title>
		</media:content>
	</item>
		<item>
		<title>Is Data Security a Priority for Hotels?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/17/is-data-security-a-priority-for-hotels/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/17/is-data-security-a-priority-for-hotels/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Mon, 17 May 2010 15:30:43 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[secure file transfer]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=562</guid>

					<description><![CDATA[In a recent Hotel News Now article &#8220;Hotel data breaches the result of basic failures within the industry,&#8221; the editor discusses the many headlines that have recently focused on the hospitality industry. Whether, it&#8217;s Wyndham Hotels &#38; Resorts, Radison Hotel &#38; Resorts or the Westin Bonaventure Hotel &#38; Suites in Los Angeles, hotels have been [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In a recent <em>Hotel News Now</em> article <em>&#8220;<a href="http://www.hotelnewsnow.com/Articles.aspx?ArticleId=3329&amp;ArticleType=35&amp;PageType=News" target="_blank">Hotel data breaches the result of basic failures within the industry</a>,&#8221;</em> the editor discusses the many headlines that have recently focused on the hospitality industry. Whether, it&#8217;s Wyndham Hotels &amp; Resorts, Radison Hotel &amp; Resorts or the Westin Bonaventure Hotel &amp; Suites in Los Angeles, hotels have been hit hard by data breaches. The article goes on to state that the hotel industry is lacking in very basic security measures that could have otherwise prevented these occurrences, including password resets and remote access. The first article in a five-part series, the editor points to a study conducted by The Center for Hospitality Research in association with the Cornell Hospitality Report dated September 2008. The report, &#8220;<em>Hotel Network Security: A Study of Computer Networks in U.S. Hotels,</em>&#8221; states, &#8220;many hotels have flaws in their network topology that allow for exploitation by malicious users, thereby resulting in the loss of privacy for guests.&#8221;</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg"><img loading="lazy" data-attachment-id="566" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/17/is-data-security-a-priority-for-hotels/hotel_check_in-2/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg" data-orig-size="258,500" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="hotel_check_in" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg?w=155" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg?w=258" class="aligncenter size-medium wp-image-566" title="hotel_check_in" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg?w=154" alt="" width="154" height="300" /></a></p>
<p>The results of the survey found that about one out of five hotels still uses an antiquated hub-based network, an arrangement that is inherently flawed in terms of security. Also, hotels are providing unsecured wi-fi connections that are not encrypted and are subject to hacking. In fact, just six of the 39 wireless properties were using encryption. So, how can hotels secure their customers&#8217; private information and communications? While the article suggests a series of steps (all good measures), additional security measures should be taken. Between hotel suppliers, customers and employees, secure communication should be established both internally within the hotel and external to other business partners. A complete solution from <a href="http://www.scribbos.com" target="_blank">encrypted ad hoc information and file transfer</a> to an enterprise-wide <a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">solution</a> that goes beyond the four walls of the hotel is necessary to provide the most secure infrastructure possible.</p>
<p>Have you experienced a security breach while staying at a hotel?</p>
<p><a name="pd_a_3214997"></a><div class="CSS_Poll PDS_Poll" id="PDI_container3214997" data-settings="{&quot;url&quot;:&quot;https://secure.polldaddy.com/p/3214997.js&quot;}" style=""></div><div id="PD_superContainer"></div><noscript><a href="https://polldaddy.com/p/3214997" target="_blank" rel="noopener noreferrer">Take Our Poll</a></noscript></p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/17/is-data-security-a-priority-for-hotels/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">562</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/hotel_check_in1.jpg?w=154" medium="image">
			<media:title type="html">hotel_check_in</media:title>
		</media:content>
	</item>
		<item>
		<title>What Would a $140 Million Loss Mean for Your Business?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/14/what-would-a-140-million-loss-mean-for-your-business/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/14/what-would-a-140-million-loss-mean-for-your-business/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Fri, 14 May 2010 13:59:49 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[data transfer]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[ftp]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=553</guid>

					<description><![CDATA[A recent Computerworld article, &#8220;Heartland breach expenses begged at $140M &#8212; so far,&#8221; discusses the devastating effects of the Heartland Payments Systems Inc. data breach, costing the company $139.4 to date. In Heartland&#8217;s case, credit card data was compromised from the company&#8217;s network last year. The 139.4m includes settlement money from class action law suits, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>A recent Computerworld article, &#8220;<a href="http://www.computerworld.com/s/article/9176507/Heartland_breach_expenses_pegged_at_140M_so_far" target="_blank"><em>Heartland breach expenses begged at $140M &#8212; so far</em></a>,&#8221; discusses the devastating effects of the Heartland Payments Systems Inc. data breach, costing the company $139.4 to date. In Heartland&#8217;s case, credit card data was compromised from the company&#8217;s network last year. The 139.4m includes settlement money from class action law suits, data breach fines and ongoing litigation fees. Moreover, no price can be placed on the damage done to its reputation. Consider it a precautionary tale.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg"><img loading="lazy" data-attachment-id="555" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/14/what-would-a-140-million-loss-mean-for-your-business/wep-2/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg" data-orig-size="480,319" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="wep" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=480" class="aligncenter size-medium wp-image-555" title="wep" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=300" alt="" width="300" height="199" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg 480w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p style="text-align:center;"><em><strong>How can you prevent this from happening to your organization? </strong></em></p>
<p style="text-align:left;">Security measures such as firewalls are not enough to prevent a data breach and while FTP might be a &#8220;free&#8221; file transfer solution, it&#8217;s not secure. The key to ensure a data breach doesn&#8217;t happen to your business is <a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">B2B Managed File Transfer and Communications</a>.</p>
<ul>
<li>Ensure security throughout the entire file transfer process</li>
<li>Verify that only authorized customers and partners can send data into your network</li>
<li>Protect your mission-critical data in and out of the DMZ</li>
<li>Verify authorization before data is passed through your internal firewall</li>
<li>Secure ad hoc communications including large files and attachments</li>
</ul>
<p>How protected is your network?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/14/what-would-a-140-million-loss-mean-for-your-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">553</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/wep1.jpg?w=300" medium="image">
			<media:title type="html">wep</media:title>
		</media:content>
	</item>
		<item>
		<title>The Law of the Land &#8211; States Without Data Breach Laws Face Serious Problems</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/12/the-law-of-the-land-states-without-data-breach-laws-face-serious-problems/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/12/the-law-of-the-land-states-without-data-breach-laws-face-serious-problems/#respond</comments>
		
		<dc:creator><![CDATA[Andrew G]]></dc:creator>
		<pubDate>Wed, 12 May 2010 17:45:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Alabama]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach law]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Kentucky]]></category>
		<category><![CDATA[New Mexico]]></category>
		<category><![CDATA[South Dakota]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=549</guid>

					<description><![CDATA[There are currently four states in the US that lack any data breach legislation.  Alabama, Kentucky, New Mexico and South Dakota make up this list.  It is great to see that so many states are currently pursuing legislation and have legislation in place to make data breaches less dangerous for those involved.  However, with four [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There are currently four states in the US that lack any data breach legislation.  Alabama, Kentucky, New Mexico and South Dakota make up this list.  It is great to see that so many states are currently pursuing legislation and have legislation in place to make data breaches less dangerous for those involved.  However, with four states still lagging behind in this area, many companies are still not liable for notification because of location.  For instance, many companies that would normally have to report any sensitive data loss or breach in their business may not have to with their corporate headquarters located in these areas.</p>
<p>Kentucky recently suffered a data breach with the <a href="http://www.esecurityplanet.com/news/article.php/3880471/Hospital-Data-Breach-in-Kentucky-Affects-Thousands.htm" target="_blank">Our Lady Peace hospital compromising thousands of patients&#8217; personal information</a>.  The hospital did notify the patients, which was very positive in a state where it is not made mandatory.  However, it&#8217;s clear that breaches can occur anywhere and thus, everywhere needs to have some laws in place.</p>
<p>I&#8217;m certainly not calling out states to force companies to reveal data breaches, but when someone&#8217;s data is in the wrong hands, it&#8217;s important for them to know so that they can take the necessary action to prevent any problems.  This has nothing to do with company integrity.  This is about people who may suffer a fate of financial downfall or complete identity theft with the loss of their data.</p>
<p>States without data breach laws are soon to follow as their ranks shrink.  With Mississippi enacting data breach legislation this year, it is becoming apparent that data security is necessary in this increasingly data-filled world.</p>
<p>As we continue to discuss Data Breach Laws in our &#8220;Law of the Land&#8221; blog series, look for your own state to learn more about what laws are in place.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/12/the-law-of-the-land-states-without-data-breach-laws-face-serious-problems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">549</post-id>
		<media:content url="https://2.gravatar.com/avatar/8352ccc3f9c2b2e089ea1162713beaafeb2fa5156ea73358ba0c790edc42943f?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">Andy The Intern</media:title>
		</media:content>
	</item>
		<item>
		<title>Data Breaches: Stop the Insanity!</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/10/data-breaches-stop-the-insanity/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/10/data-breaches-stop-the-insanity/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Mon, 10 May 2010 16:40:36 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[ad hoc managed file transfer]]></category>
		<category><![CDATA[B2B File Transfer]]></category>
		<category><![CDATA[Data Breaches]]></category>
		<category><![CDATA[email encryption]]></category>
		<category><![CDATA[Encryption]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[PII]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=544</guid>

					<description><![CDATA[In a recent article by the Identity Theft Resource Center (ITRC), entitled, &#8220;Data Breaches: The Insanity Continues,&#8221; the ITRC discusses the highlights of 2009 data breaches: Paper breaches account for nearly 26 percent of known breaches (an increase of 46 percent over 2008) Business sector climbed from 21 percent to 41 percent between 2006 to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>In a recent article by the Identity Theft Resource Center (ITRC), entitled, &#8220;<a href="http://www.idtheftcenter.org/artman2/publish/lib_survey/Breaches_2009.shtml" target="_blank"><em>Data Breaches: The Insanity Continues</em></a>,&#8221; the ITRC discusses the highlights of 2009 data breaches:</p>
<ul>
<li>Paper breaches account for nearly 26 percent of known breaches (an increase of 46 percent over 2008)</li>
<li>Business sector climbed from 21 percent to 41 percent between 2006 to 2009, the worst sector performance by far</li>
<li>Malicious attacks have surpassed human error for the first time in three years</li>
<li>Out of 498 breaches, only six reported that they had either encryption or other strong security features protecting the exposed data</li>
</ul>
<p><div data-shortcode="caption" id="attachment_545" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg"><img aria-describedby="caption-attachment-545" loading="lazy" data-attachment-id="545" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/10/data-breaches-stop-the-insanity/sub-pic-data/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg" data-orig-size="484,328" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="sub-pic-data" data-image-description="" data-image-caption="&lt;p&gt;What will the stats be for 2010? Take Preventative Measures.&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=484" class="size-medium wp-image-545" title="sub-pic-data" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=300" alt="" width="300" height="203" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=150 150w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg 484w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-545" class="wp-caption-text">What will the stats be for 2010? Take Preventative Measures.</p></div></p>
<p>The article goes on, stating, &#8220;Insanity might well be defined as repeating the same action again and again, and expecting a different outcome.&#8221; So, the ITRC compiled a list related to how businesses are addressing data breaches and security:</p>
<ul>
<li><strong>Insanity 1 </strong>&#8211; Electronic Breaches: After all the articles about hacking and the ever-growing cost of a breach, why isn&#8217;t <a href="http://www.scribbos.com/tech_intro_scribbos.html" target="_blank">encryption</a> being used to protect personal identifying information? Proprietary information almost always seems to be well protected. Why not our customer/consumer personal identifying information (PII)?</li>
<li><strong>Insanity 2 </strong>&#8211; Paper breaches: Why aren’t more state legislators passing laws about rendering <a href="http://www.scribbos.com/healthcare.html" target="_blank">paper documents</a> unreadable prior to disposal if they contain PII? Do we dare ask that those laws be actually enforceable? Perhaps we are waiting for paper breaches to reach 35% of the total.</li>
<li><strong>Insanity 3</strong> &#8211; Breaches happen: Deal with it! You will get notification letters. Breach notification does not equal identity theft. Let’s stop the “blame game” and instead require breached entities to report breach incidents via a single public website. This would allow analysts (and law enforcement) to look for trends and link crimes to a single ring or hacker faster.</li>
<li><strong>Insanity 4</strong> &#8211; A Breach is a Breach: Let’s not kid ourselves. “Risk of harm” is not a useful standard for determining if the public and consumers should be notified about a breach, especially if the company involved gets to define “risk of harm.” If it is your #$@%2 SSN that is out on the Internet, do YOU think there is “risk of harm?” Some companies might say “no.”</li>
<li><strong>Insanity 5</strong> &#8211; Data on the Move: You will notice that statistically this is a bright spot, with a decreasing incidence in the past 3 years. But, really! This is 100% avoidable, either through use of encryption, or <a href="http://www.stonebranch.com/infitran/index.html" target="_blank">other safety measures</a>. Laptops, portable storage devices and briefcases full of files, outside of the workplace, are still “breaches waiting to happen.” With tiered permissions, truncation, redaction and other recording tools, PII can be left where it belongs – behind encrypted walls at the workplace.</li>
</ul>
<p>So how are you protecting your data internally and <a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">externally</a>?</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/10/data-breaches-stop-the-insanity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">544</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/sub-pic-data.jpg?w=300" medium="image">
			<media:title type="html">sub-pic-data</media:title>
		</media:content>
	</item>
		<item>
		<title>Efficiency and Growth with B2B Communications</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/06/efficiency-and-growth-with-b2b-communications/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/06/efficiency-and-growth-with-b2b-communications/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Thu, 06 May 2010 13:37:16 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[B2B]]></category>
		<category><![CDATA[B2B File Transfer]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[secure data exchage]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=536</guid>

					<description><![CDATA[Efficiency and growth are key concerns to businesses in a global market. A B2B solution&#8217;s flexibility should allow you to easily integrate with back-end systems like EDI translators and databases, or application to application &#8211; migrating those legacy systems into a secure and automated file transfer system. A true B2B file transfer solution provides real-time [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Efficiency and growth are key concerns to businesses in a global market. A B2B solution&#8217;s flexibility should allow you to easily integrate with back-end systems like EDI translators and databases, or application to application &#8211; migrating those legacy systems into a secure and automated file transfer system. A true B2B file transfer solution provides real-time visibility to all transfers and data exchanges taking place &#8211; creating greater efficiency and r<a href="http://www.stonebranch.com/infitran/b2b_saas_offerings.html" target="_blank">esulting in avoidance of fines due to SLAs, payment delays and performance gaps</a>.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg"><img loading="lazy" data-attachment-id="537" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/06/efficiency-and-growth-with-b2b-communications/business-growth-bar-chart/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg" data-orig-size="3000,2250" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Business Growth Bar Chart" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=510" class="aligncenter size-medium wp-image-537" title="Business Growth Bar Chart" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=300" alt="" width="300" height="225" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=600 600w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=150 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Growth is easy when you can on-board new partners quickly and securely. You can provide your partners with tools that make it easier for them to do business with you. In a business environment that is full of mergers and acquisitions and technology consolidations, data management is critical. The need  for an easy and manageable way to keep control becomes more and more apparent. Managed File Transfer is one of the easiest ways to get your data under control, ensuring it&#8217;s secure while in transit &#8211; every  step of the way.</p>
<p><a href="http://www.stonebranch.com/infitran/b2b_main.html" target="_blank">B2B Managed File Transfer</a> provides security at the highest level while also providing visibility to transactions. Meet necessary compliance and regulatory standards, manage your data exchanges with 100 percent up-time, merge disparate systems to create a seamless flow of information and position your enterprise for growth. Additionally, B2B MFT allows you to manage your data exchanges through secure, multi-industry protocols. This increased security also resolves ad hoc communication issues, including large files or attachments containing sensitive information.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/06/efficiency-and-growth-with-b2b-communications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">536</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/business-growth-bar-chart.jpg?w=300" medium="image">
			<media:title type="html">Business Growth Bar Chart</media:title>
		</media:content>
	</item>
		<item>
		<title>How Do Multiple Job Schedulers Affect Your Business?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/05/how-do-multiple-job-schedulers-affect-your-business/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/05/how-do-multiple-job-schedulers-affect-your-business/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Wed, 05 May 2010 13:10:16 +0000</pubDate>
				<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Scheduling]]></category>
		<category><![CDATA[business process]]></category>
		<category><![CDATA[complexity]]></category>
		<category><![CDATA[independent scheduling agents]]></category>
		<category><![CDATA[job schedulers]]></category>
		<category><![CDATA[job scheduling]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=531</guid>

					<description><![CDATA[One of the most devastating effects of a multiple job scheduler environment on businesses is the delay of mission-critical business information. Having multiple scheduling systems leads to complexity. It also leads to multiple points of failure and delays in supplying the business with the information it needs to competitively operate. Additionally, unnecessary complexity leads to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>One of the most devastating effects of a multiple job scheduler environment on businesses is the delay of mission-critical business information. Having multiple scheduling systems leads to complexity. It also leads to multiple points of failure and delays in supplying the business with the information it needs to competitively operate.</p>
<p><div data-shortcode="caption" id="attachment_532" style="width: 310px" class="wp-caption aligncenter"><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg"><img aria-describedby="caption-attachment-532" loading="lazy" data-attachment-id="532" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/05/how-do-multiple-job-schedulers-affect-your-business/complexity650-300/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg" data-orig-size="650,300" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Complexity650-300" data-image-description="" data-image-caption="&lt;p&gt;How does complexity affect your business?&lt;/p&gt;
" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=510" class="size-medium wp-image-532" title="Complexity650-300" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=300" alt="" width="300" height="138" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=600 600w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=150 150w" sizes="(max-width: 300px) 100vw, 300px" /></a><p id="caption-attachment-532" class="wp-caption-text">How does complexity affect your business?</p></div></p>
<p>Additionally, unnecessary complexity leads to more money spent on IT. There are always investments in new technology needed to help businesses stay current on compete. The problem is that the money available to IT is limited. Money that could be spent on staying competitive is instead spent on operating a complex, multiple scheduling infrastructure, depleting the budget for more revenue-driving technologies.</p>
<p>Moreover, the complexity of multiple scheduling environments affects the mindset of IT. The effort required by IT to maintain a multiple scheduling environment requires it to focus resources on managing the day-to-day issues instead of preparing for the evolving needs of the business.</p>
<p>Want to learn more about how to solve these issues? Read the<a href="http://esj.com/articles/2010/05/04/multiple-job-schedulers.aspx" target="_blank"> article</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/05/how-do-multiple-job-schedulers-affect-your-business/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">531</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/complexity650-300.jpg?w=300" medium="image">
			<media:title type="html">Complexity650-300</media:title>
		</media:content>
	</item>
		<item>
		<title>Internal Forces the Cause of Lost Data?</title>
		<link>https://managedfiletransfer.wordpress.com/2010/05/03/internal-forces-the-cause-of-lost-data/</link>
					<comments>https://managedfiletransfer.wordpress.com/2010/05/03/internal-forces-the-cause-of-lost-data/#respond</comments>
		
		<dc:creator><![CDATA[Ashley]]></dc:creator>
		<pubDate>Mon, 03 May 2010 17:59:18 +0000</pubDate>
				<category><![CDATA[Data Exchange]]></category>
		<category><![CDATA[MFT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[internal data controls]]></category>
		<category><![CDATA[internal data policies]]></category>
		<category><![CDATA[Managed File Transfer]]></category>
		<category><![CDATA[mft ad-hoc]]></category>
		<category><![CDATA[unauthorized]]></category>
		<guid isPermaLink="false">http://managedfiletransfer.wordpress.com/?p=520</guid>

					<description><![CDATA[Last week, I blogged about Accenture&#8217;s new report, &#8220;How Global Organizations Approach the Challenge of Protecting Personal Data,&#8221; and focused on their first finding, &#8220;there is a notable difference between organizations&#8217; intentions regarding data privacy and how they actually protect it, creating an uneven trust landscape.&#8221; This week, let&#8217;s look at the second key finding: [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Last week, I blogged about Accenture&#8217;s new report, &#8220;<a href="http://www.accenture.com/Global/Technology/Infrastructure_Solutions/Security_Solutions/R_and_I/How-Global-Data.htm" target="_blank"><em>How Global Organizations Approach the Challenge of Protecting Personal Data,</em></a>&#8221; and focused on their first finding, &#8220;there is a notable difference between organizations&#8217; intentions regarding data privacy and how they actually protect it, creating an uneven trust landscape.&#8221; This week, let&#8217;s look at the second key finding:</p>
<p>&#8220;A majority of organizations have lost sensitive personal information, and among these organizations, the biggest causes are internal and therefore something they could potentially control. This suggests accountability for and ownership of how sensitive data is used may be lacking in many organizations.&#8221; The report goes on state that, &#8220;larger organizations struggle more to prevent breaches than smaller ones &#8211; likely because, with many more employees and more geographically dispersed operations, the opportunities for data to be lost or compromised is greater.&#8221;</p>
<p>The report found that 70 percent of organizations with more than 75,000 employees have experienced a loss of sensitive personal information compared to 40 percent of organizations with fewer than 500 people. Internal issues &#8211; employees (48 percent) and business or system failure (57 percent) &#8211; were cited most often the source of data breaches &#8211; a stark contrast to the common perception that external forces are the biggest threats to security and privacy.  Reasons for internal causes of data loss?</p>
<ul>
<li>Lack of adequate policies and training programs</li>
<li>Lack of adequate controls &#8211; employees have too much access to sensitive data</li>
<li>Not having a full understanding of data flows across the organization</li>
</ul>
<p>From an employee standpoint, there are simple measures that can be taken to ensure sensitive, proprietary or confidential information is not compromised. By giving employees an <a href="http://www.scribbos.com" target="_blank">easy-to-use tool</a> to encrypt and protect data, you are one step ahead of the game.</p>
<p><a href="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg"><img loading="lazy" data-attachment-id="521" data-permalink="https://managedfiletransfer.wordpress.com/2010/05/03/internal-forces-the-cause-of-lost-data/security-desktop/" data-orig-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg" data-orig-size="600,428" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;}" data-image-title="Security Desktop" data-image-description="" data-image-caption="" data-medium-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=300" data-large-file="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=510" class="aligncenter size-medium wp-image-521" title="Security Desktop" src="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=300" alt="" width="300" height="214" srcset="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=300 300w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg 600w, https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=150 150w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>For larger organizations, the task can be more complicated. A large data center may have various protocols for sending information both internally and externally: FTP, SFTP, home-grown solutions just to name a few. Many large organizations might not even be aware of all the protocols used to transfer data. This causes silos of information and a general lack of secure file transfer. Solutions do exist to <a href="http://www.stonebranch.com/infitran/index.html" target="_blank">securely transfer data</a> and files enterprise-wide, while setting up user authentication, controls and policies.</p>
<p><em><strong>Do you have internal policies or controls set up to ensure the security of your data?</strong></em></p>
]]></content:encoded>
					
					<wfw:commentRss>https://managedfiletransfer.wordpress.com/2010/05/03/internal-forces-the-cause-of-lost-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">520</post-id>
		<media:content url="https://0.gravatar.com/avatar/99d2db234127da37f49df181fbe104d50121bc0e8b19d1c7a954ec4d7f9af909?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">AShley</media:title>
		</media:content>

		<media:content url="https://managedfiletransfer.wordpress.com/wp-content/uploads/2010/05/security-desktop.jpeg?w=300" medium="image">
			<media:title type="html">Security Desktop</media:title>
		</media:content>
	</item>
	</channel>
</rss>
