Published by Mike on March 24, 2015 @ 11:24 in Managed File Transfer
For many industries, fast file transfer is a requirement. The fallback for day-to-day file transfer in many IT infrastructures is file transfer protocol (FTP). FTP is a very convenient solution; however, because FTP lacks central visibility, it is difficult to implement efficiently. This lack of visibility is a barrier to business stakeholders who need to be able to access, observe and record file transfer activity quickly and easily. Depending on a remote third party for file transfer needs creates inefficiencies that waste time and money.
By using FTP and relying on the tools and services provided by the data center, the company introduces additional tasks as well as an additional layer of bureaucracy and protocol. Not only is FTP a hindrance to efficient day-to-day operations, it also falls short of the technical requirements of various compliance mandates such as HIPAA, GLBA and SOX. However, many businesses are unaware of solutions to these technical shortcomings because the mandates are not specific about the best ways to meet their standards. Finding a secure business communications solution provides, at a minimum, security that meets the requirements of many compliance mandate guidelines is a viable solution.
Facing audits shouldn't be seen as a necessary evil. By implementing a system that supports central visibility and has a record of dependable security, audits can become the quick and easy processes they should be. Relying on convenience is a poor way to make business decisions. Ultimately, FTP, and even secure file transfer protocol (SFTP), is less efficient and less secure than a secure business communications solution.
Published by Mike on February 27, 2015 @ 10:57 in Managed File Transfer
In a recent study conducted by the Ponemom Institute, "Business Case for Data Protection: Study of CEOs and other C-level Executives," they learned that C-level executives believe good data protection practices can support important organizational goals such as compliance, reputation management and customer trust. Conversely, the study found that the majority of respondents are not confident in their ability to safeguard sensitive and confidential information. The statistics continue to be staggering:
- 82 percent of C-level executives surveyed report that their organization has experienced a data breach and many are not confident that they can prevent future breaches.
- 94 percent of respondents report that they have had their data attacked in the last six months.
- 79 percent of respondents report that ONE person is considered to be in charge of data protection and is most likely the CIO.
Your Company's and Clients' Information
When asked whether a coherent or comprehensive enterprise data protection program increases the organization's value, 83 percent of CEOs and 64 percent of other C-level executives say it reduces or mitigates risk of data loss or theft. However, the study goes on to illustrate that more than 90 percent of respondents only spend 5 percent of their data protection budget for "enabling technology." So where is the disconnect? While there are many data protection tools out there, how can these breaches still be occurring at an increasing rate?
Without the proper data protection tools, companies will continue to face internal or external data breaches. Whether you are a small firm or large, global organization, can your reputation take that kind of hit?
Published by Mike on February 25, 2015 @ 10:21 in Education
Of all the assets a company owns, perhaps the most valuable is the data, and data volumes are growing rapidly at a rate of over 23% annually . Most CIOs have developed clear, stringent policies to protect the data while it is safely held on storage devices within a data center, but much of the data only has meaning and value when it is processed in conjunction with other relevant data residing within applications. This often means the data must be transported.
As robust as your data management processes may be while the data is stored, how well managed is your data in transit? While your managed file transfer (MFT) solution may provide some of the essential elements you need to ensure the success of the process, it may not offer enough to truly give you holistic data management. The supply chain management model provides a lens through which you can analyze your solution and plan for better management of your in-flight data, ensuring security, compliance and data lifecycle management throughout your enterprise.
Published by Mike on February 18, 2015 @ 13:55 in Stonebranch News
We at Stonebranch are pleased to welcome Dr. Gregor Heinrich as our new CTO. The news release about this appointment is here.
Dr. Gregor Heinrich has over 15 years of experience in innovative positions, including seven years as a CTO for vsonix GmbH and semafora systems GmbH, two software companies with complex software products and solutions. He holds a PhD degree in computer science (machine learning, natural language processing) and a Master's-level degree in electrical engineering (signal processing, pattern recognition).
This appointment took effect on February 1, 2015. We're in very good hands.
Published by Mike on February 17, 2015 @ 11:44 in Job Scheduling Software
Let's take an in-depth look at some of leading causes of a disparate job scheduling environment:
- Acquisitions - For many companies that integrate acquisitions, consolidating IT tools such as scheduling is not their highest priority. Although, it will save money in the long run, it is a big project that poses risks. Consequently, scheduling staff members are burdened with managing multiple schedulers.
- Departmental Purchasing - The lack of centralized purchasing or company-wide standards often results in the independent departmental acquisition of different job scheduling solutions that are unable to interoperate with each other and existing tools.
- Access to Tools - Application departments circumvent standard tools and use easier scheduling tools such as Cron. It is simple and easy to set up a Cron tab or schedule a process in Windows, but it is only a quick fix. Moreover, these one-off fixes decrease overall business visibility.
- Built-in application capabilities: This is one of the biggest culprits. Companies deploy applications and tools, such as backup products, due to the perceived benefits of a self-contained system that can be managed by its own tools. This thinking ignores the fact that most applications are not self-contained. In fact, they "touch" other applications by exchanging data and have dependencies based on the overall business workflow. Implementing these "point" solutions prevents the ability to control business workflows from end-to-end.
- Lack of management mandate - Without clear mandates from senior management, there is no ability to enforce centralized control. Thus, departments and application developers will take the path of least resistance.
In many cases, sooner or later, IT operations inherit these different applications and tools and are stuck with managing them. With vendor-independent technology, IT organizations can avoid these pitfalls, while saving money, time and resources.
Published by Mike on January 30, 2015 @ 09:15 in Events
We were honoured to be a part of CIOsynergy Dallas, a gathering of carefully selected IT leaders to represent the who's who of enterprise IT in Dallas.
Detlef, Gwyn and Steve were on hand to talk about Stonebranch's Best-in-Class Return on Automation.
Congratulations to Tanweer Surve from Essilor, the big winner of a new GoPro!
Published by Mike on January 20, 2015 @ 17:08 in Events
Published by Mike on December 23, 2014 @ 13:30 in Stonebranch News