Is Your MFT Ready for Digital?
Every meeting;
35%
Most meetings:
46%
Only after internal or industry incident:
10%
Only after the recent string
of high-profile
breaches or breaches in
our industry:
8% Never: 1%
Cybersecurity in the Boardroom, a 2015 survey NYSE Governance Services
4
By 2020, 30%Of enterprises believe that security is a major concern while adopting digital technologies
70%
42%of them have not sufficiently invested in the requisite level of security in their IT infrastructure ecosystem
Infrastructure Services – Annual Report 2015: “Digital Businesses: Mind Your Security” - Everest Group Research
of global enterprises will have been directly compromised by an independent group of cyberactivists or cybercriminals.Gartner : "Security and Risk Management Scenario Planning, 2020"
Protecting against Cyberthreats
Managing insider threats
Compliance monitoring
Security incident and event management
Data Loss prevention (+personal file sync & share services elimination)
84%
80%
82%
83%
85%
What are the 5 /7 key (Most Important or Important) priorities for your:- Chief Information Officer (CIO)- Chief Information security Officer (CISO)- Chief Risk Officer (CRO)450 World Wide large IT organization managers - © Ovum 2014
89%Defining & Enforcing security policies86%
78%Virus/Spyware/Malware77%
77%Data loss /leakage76%
74% 450 WorldWide large IT organization managers © Ovum 2014
With regards to enterprise IT security governance, risk management and compliance strategy, what are your main data security and privacy-related concerns about file transfers?
7
8
Ponemon: 2016 Cost of Data Breach Study - Global Analysis
average total cost of data
breach
average cost per lost or
stolen record$158
$4 million
Attack everything
9
Attack everything
between
10
Attack everything
between
11
Attack everything
between the hacker
and the data 12
Data
Is moving
13
Files & more Files
Of Moving Data60+%
Is Your MFT Ready for Cyber Threats?
Is your MFT enforcingthe security sieve?
External Threats Defense
Confidentiality Integrity
Authenticity Authorization
Audit
Data leakageEspionage• DLP solution?
Unauthorized users• MFT connected to
LDAP? • Are the access
rights to the file reset after the transfer?
Unauthorized applications• Are applications
authorized or not to deal with a file?
Reverse proxyService exposition• Any data stored in
DMZ?• Is there isolation
/mediation between the request and the delivery.
Content Users Applications Network
Contentsecure envelope• Meta data
around files?
Strong identity• How identity is
proven?
Encryption at rest• encryption files
mechanisms?• Encrypted
repository?
Encryption in motion • Still on SHA-1,
on MD5?• TLS even
internally?
Content Users Applications Network
Contentsecure envelope
Signature• How do you
manage certificates lifecycle?
Signature• How do you
manage certificates lifecycle?
Hashing• SHA-256?• TLS?
Content Users Applications Network
Contentsecure envelope
Authentication• Mutual
authentication mechanism?
• Certificates?
Identity• connection to
IAM
Logon Identity• SSO
Content Users Applications Network
Contentsecure envelope
AccessRight• Interface to
IAM• Administration
delegation
AccessControl• Interface to
IAM
Encryption
Content Users Applications Network
Data Access log
Access log Transaction log
Logs
Complete traceability from design to execution
with log and events collection
Content Users Applications Network
Central GovernanceSecurity DevOps Tools
Axway: MFT as a Shared Service
24
appl.appl. CFT
API gw
API SERVER
BUSINESS LEGACYAPPLICATIONS
FIREWALL
DIRECTORY
IAM
PARTNERCOMMUNITIES
ENGINE LAPTOP
WEB SERVICES
CERTIFICATE
ENCRYPTEDFILE
MOBILE PHONE
PARTNER
API SERVER
BUSINESS LEGACYAPPLICATIONS
FIREWALL
DIRECTORY
IAM
PARTNERCOMMUNITIES
ENGINE LAPTOP
WEB SERVICES
CERTIFICATE
ENCRYPTEDFILE
MOBILE PHONE
PARTNER
API SERVER
BUSINESS LEGACYAPPLICATIONS
FIREWALL
DIRECTORY
IAM
PARTNERCOMMUNITIES
ENGINE LAPTOP
WEB SERVICES
CERTIFICATE
ENCRYPTEDFILE
MOBILE PHONE
PARTNER
BPM /ESB
ST
CFT
WS WS
mobileemail web SC
AMQPAMQP
Secure Communications
Rules and Policies management
Identity and Access Management
Secured Data
8
Scalability
SecurityReliability
Acceleration
Priority
Lifecycle
Leverage existing MFT
Is your mft:ready for cyber Security?
Digital Business Enablement
Being Ready for Digital, Explained How to become a customer-focused, omnipresent digital force in the marketplace
Think ‘Consumer Experience’
The road is laid out ahead of you. There’s no denying that the roaring engine of commerce you hear — the one powering the global economy irreversibly into the future — runs on data flow. It’s all over the headlines. It’s on social media. It’s in that TV ad that keeps interrupting your favorite sports broadcast.
How many digital devices or data streams have you availed yourself to today? Chances are you’re reading this white paper on a screen attached to a computer or tablet or smartphone, with an app or program that allowed you to download it at your convenience. Maybe you’re in a plane over Singapore or Canada at the
More information? Download Axway white paperhttps://www.axway.com/en/gate/2454