Managed file transfer (MFT) is a technology that provides the secure transfer of data in an efficient and reliable manner. [1] MFT software is marketed to companies as a more secure alternative to using insecure protocols like FTP (file transfer protocol) and HTTP to transfer files. By using an MFT solution, companies can avoid custom scripting and meet compliance requirements.
From its inception, FTP has made moving large volumes of bulk data between any two entities — including file servers, applications, and trading partners — possible. However, FTP (and other communication protocols such as HTTP and SMTP) do not, on their own, provide a way to secure or manage file transfers. Regardless of the lack of security and management capabilities, many companies have continued to transport large batches of structured and unstructured data using these protocols.
This practice is changing, however. According to Gartner Research, "Organizations of all sizes continue to invest in MFT platforms that enable secure and private transportation of files — across size and volume levels — internally and externally." [2] MFT has also found a foothold among file transfer protocols and solutions because of its focus on facilitating the "transfer of large file sizes and volume." [3]
MFT is often used by companies in the retail, banking, healthcare, manufacturing, telecommunication and insurance industries. [4]
The global MFT market was estimated at US$1.3 billion in 2020 and is projected to reach US$2.4 billion by 2027. [5]
While Managed File Transfer always covers the same features—reporting (e.g., notification of successful and unsuccessful file transfers), non-repudiation, audit trails, global visibility, automation of file transfer-related activities and processes, end-to-end security, and performance metrics/monitoring—the way it is used has a major impact on the nature of the appropriate solution. Gartner analysts agree on 4 different use cases for MFT:
Core functionality also includes the ability to encrypt files in transit and at rest. [3]
MFT centers on the secure and efficient transfer of data, but most MFT software solutions offer additional features. Typically, MFT software offers reporting (e.g., notification of successful file transfers), non-repudiation, audit trails, global visibility, the ability to automate file transfer-related activities and processes, end-to-end security, and performance metrics. MFT applications are available as both on-premises licensed software packages and software-as-a-service ("SaaS") solutions, and can often be used in hybrid cloud setups.
MFT applications are characterized by having all or most of the following features: [6]
One vendor in the description of their product identifies six issues with commercial use of FTP and even SFTP that Managed File Transfer seeks to address. The issues revolve around security weaknesses of traditional FTP in an increasing cyber threat environment and meeting increasing stringent regulatory compliance for data. While bespoke solutions may resolve some of these issues, MFT can address them with a standardized approach, along with the ability to be customized. [7]
The Secure Shell (SSH) Protocol is a cryptographic network protocol for operating network services securely over an unsecured network. Its most notable applications are remote login and command-line execution.
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
In computing, the SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management over any reliable data stream. It was designed by the Internet Engineering Task Force (IETF) as an extension of the Secure Shell protocol (SSH) version 2.0 to provide secure file transfer capabilities, and is seen as a replacement of File Transfer Protocol (FTP) due to superior security. The IETF Internet Draft states that, even though this protocol is described in the context of the SSH-2 protocol, it could be used in a number of different applications, such as secure file transfer over Transport Layer Security (TLS) and transfer of management information in VPN applications.
Network-attached storage (NAS) is a file-level computer data storage server connected to a computer network providing data access to a heterogeneous group of clients. The term "NAS" can refer to both the technology and systems involved, or a specialized device built for such functionality.
Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. It is based on the Secure Shell (SSH) protocol. "SCP" commonly refers to both the Secure Copy Protocol and the program itself.
File eXchange Protocol is a method of data transfer which uses FTP to transfer data from one remote server to another (inter-server) without routing this data through the client's connection. Conventional FTP involves a single server and a single client; all data transmission is done between these two. In the FXP session, a client maintains a standard FTP connection to two servers, and can direct either server to connect to the other to initiate a data transfer. The advantage of using FXP over FTP is evident when a high-bandwidth server demands resources from another high-bandwidth server, but only a low-bandwidth client, such as a network administrator working away from location, has the authority to access the resources on both servers.
FileZilla is a free and open-source, cross-platform FTP application, consisting of FileZilla Client and FileZilla Server. Clients are available for Windows, Linux, and macOS. Both server and client support FTP and FTPS, while the client can in addition connect to SFTP servers. FileZilla's source code is hosted on SourceForge.
Filesystem in Userspace (FUSE) is a software interface for Unix and Unix-like computer operating systems that lets non-privileged users create their own file systems without editing kernel code. This is achieved by running file system code in user space while the FUSE module provides only a bridge to the actual kernel interfaces.
FTPS is an extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and, formerly, the Secure Sockets Layer cryptographic protocols.
Workspace is a term used in various branches of engineering and economic development.
This article lists communication protocols that are designed for file transfer over a telecommunications network.
WinSCP is a file manager, SSH File Transfer Protocol (SFTP), File Transfer Protocol (FTP), WebDAV, Amazon S3, and secure copy protocol (SCP) client for Microsoft Windows. The WinSCP project has released its source code on GitHub under an open source license, while the program itself is distributed as proprietary freeware.
CrushFTP is a proprietary multi-protocol, multi-platform file transfer server originally developed in 1999. CrushFTP is shareware with a tiered pricing model. It is targeted at home users on up to enterprise users.
Linoma Software was a developer of secure managed file transfer and IBM i software solutions. The company was acquired by HelpSystems in June 2016. Mid-sized companies, large enterprises and government entities use Linoma's software products to protect sensitive data and comply with data security regulations such as PCI DSS, HIPAA/HITECH, SOX, GLBA and state privacy laws. Linoma's software runs on a variety of platforms including Windows, Linux, UNIX, IBM i, AIX, Solaris, HP-UX and Mac OS X.
GlobalScape, Inc. (AMEX:GSB) is a software developer headquartered in San Antonio, Texas, US.
PeSIT is a file transfer protocol developed in 1986 by the French Interbank Teleclearing System Economic Interest Grouping. Designed by working groups of file transfer experts from large computing centers, it offers basic file transfer functionalities and advanced features for managing mass file transfers and organizing industrial-scale file transfer services. PeSIT connections occur between two named and identifiable partners. The initiator of a connection, acting as the PeSIT requester, negotiates with the PeSIT responder for sending or receiving a file, sending a message, or acknowledging a transfer. The negotiation for file transfer does not involve mentioning the file name or its location in the partners' file systems (FS) but rather a virtual file identified by an identifier, "filename," which corresponds to local sets of definitions for accessing and reading a file on the sender's side and creating and writing it on the receiver's side. Each transfer has a unique identification known by both exchange partners. The protocol allows assigning a priority to each transfer, which should be respected by both parties.
Commander One is a dual-pane file manager designed for macOS. Developed by Electronic Team, Inc., the software is created entirely in Swift and aims to provide users with a tool to navigate, manage, and manipulate files and folders on their Mac computers. The application offers a wide range of features for both casual and professional users.
A Software-Defined Wide Area Network (SD-WAN) is a wide area network that uses software-defined networking technology, such as communicating over the Internet using overlay tunnels which are encrypted when destined for internal organization locations.
Enterprise file synchronization and sharing refers to software services that enable organizations to securely synchronize and share documents, photos, videos and files from multiple devices with employees, and external customers and partners. Organizations often adopt these technologies to prevent employees from using consumer-based file sharing apps to store, access and manage corporate data that is outside of the IT department’s control and visibility.
Sniffing attack in context of network security, corresponds to theft or interception of data by capturing the network traffic using a packet sniffer. When data is transmitted across networks, if the data packets are not encrypted, the data within the network packet can be read using a sniffer. Using a sniffer application, an attacker can analyze the network and gain information to eventually cause the network to crash or to become corrupted, or read the communications happening across the network.