2. Resolution. Situation. Complication. Info-Tech Insight. Executive summary ... Review Info-Tech's Vendor Landscape of the MFT market to ...... Affordability: The three-year total cost of ownership of the solution; flexibility of the pricing and ... Architecture: The degree of integration with the vendor's other tools, flexibility of ...
1234
Select and Implement a Managed File Transfer Solution Secure file transfers today and avoid worrying about tomorrow.
Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2015 Info-Tech Research Group Inc.
Info-Tech Research Group
1
Executive summary Situation
Info-Tech Insight
• Every business, regardless of industry, is required to exchange information
• FTP is no longer seen as a viable
with internal and external partners. Traditional file transfer techniques such as FTP are no longer viable options for transferring files due to business pressures for fast, efficient, and secure file transfers. Managed File Transfer (MFT) solutions are now recognized as a necessity for organizations.
• Complication
• There are many changes in the industry as big players are continuously •
acquiring small vendors and advanced features become table stakes features. It can be difficult to choose a solution that scales with the needs of the enterprise.
•
option to manage file transfer securely inside and outside of the enterprise. MFT has filled that role and is seeing rapid adoption as compliance standards extend their reach. Vendors recognize demand for deployment flexibility, but buyers are still wary of potential security issues surrounding compliance. Vendors are starting to offer mobile functionality, or at the very least, are putting it on their vendor roadmaps.
Resolution
• Moving away from traditional file transfer techniques and homegrown solutions needs to be done using an effective step•
•
by-step approach. Prior to implementing an MFT solution, organizations need to conduct a thorough analysis of their current state and file transfer requirements. Gather requirements by not only soliciting the needs of the business today, but also collecting the requirements the business may need in the future. Create a shortlist of vendors that meet the organization’s wants and needs. Avoid post-implementation challenges by governing the application with the appropriate metrics, policies, and procedures. Info-Tech Research Group
2
VENDOR LANDSCAPE 4.1 Info-Tech’s Methodology
Info-Tech Research Group
3
Vendor Landscape use-case scenarios are evaluated based on weightings of features and vendor/product considerations 4.1 Scoring Overview Use cases were scored around the features identified in the general scoring as being relevant to the functional considerations and drivers for each scenario. Calculation Overview Advanced Features Score X Vendor Multiplier = Vendor Performance for Each Scenario Please note that both advanced feature scores and vendor multipliers are based on the specific weightings calibrated for each scenario.
Product and Vendor Weightings
Advanced Features Weightings
Info-Tech Research Group
4
Vendor performance for each use-case scenario is documented in a weighted bar graph 4.1 Scoring Overview
Vendor Performance Vendors qualify and rank in each use-case scenario based on their relative placement and scoring for the scenario.
Vendor Ranking Champion: The top vendor scored in the scenario Leaders: The vendors who placed second and third in the scenario Players: Additional vendors who qualified for the scenarios based on their scoring
Value ScoreTM Each use-case scenario also includes a Value Index that identifies the Value Score for a vendor relative to their price point. This additional framework is meant to help price-conscious organizations identify vendors who provide the best “bang for the buck.”
Info-Tech Research Group
5
VENDOR LANDSCAPE 4.2 Review the Managed File Transfer
Vendor Evaluation
Info-Tech Research Group
6
Review Info-Tech’s Vendor Landscape of the MFT market to identify vendors that meet your requirements The following section includes an overview of vendor performance and the analysis of each use-case scenario. Review the accompanying deliverable in order to understand the strengths, weaknesses, and capabilities of each vendor.
Vendors Evaluated
Each vendor in this landscape was evaluated based on its features, product considerations, and vendor considerations. Each vendor was profiled using these evaluations and, based on their performance, qualified and placed in specific use-case scenarios. Info-Tech Research Group
7
MFT market overview
How it got here
Where it’s going
• MFT emerged from limitations with traditional file transfer techniques, such as basic FTP servers. FTP servers lacked the ability to handle growing data volume requirements and provide enough visibility into file transfer activity, and organizations looked to MFT to fill that need.
• Big players in business integration will continue to snap up smaller MFT vendors to round out product portfolios. Integration of MFT into workflow and process management tools will grow in importance as organizations adopt more process-oriented approaches.
• Compliance standards like SOX, HIPAA, and PCI-DSS increased regulatory pressures, particularly on organizations in financial services, government, and healthcare. More organizations face these requirements as they manage their own compliance needs along with those of key business partners.
• IT departments are warming up to cloud solutions for MFT, and vendors are responding by increasing the flexibility of their offerings.
• Selection of the best solution for an organization has been highly dependent on use case: email offloading, ad hoc file transfer, and B2B scheduling needs are covered through combinations of vendor products and modules.
• Mobile access and collaboration features will continue to surface from MFT suites. Today’s “24/7” and “on-the-go” workforce requires constant access to systems. • Cloud file sharing solutions, such as Box and Citrix ShareFile, are starting to meet corporate security requirements and may be able to replace MFT’s ad hoc file transfer component in the future.
As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Audit logs have become a Table Stakes capability and should no longer be used to differentiate solutions. Instead focus on content-based routing and file transfer acceleration to get the best fit for your requirements.
Info-Tech Research Group
8
4.2
Managed file transfer vendor selection / knock-out criteria: market share, mind share, and platform coverage For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platforms and that have a strong market presence and/or reputational presence among mid- and large-sized enterprises.
Included in this Vendor Landscape: Attunity
A data integration and replication expert building on MFT capabilities acquired from RepliWeb in 2011.
Axway
A global software company providing a comprehensive suite of file transfer and business integration solutions.
bTrade
An experienced and recognized leader in the MFT industry that has continued to provide innovative solutions for both global enterprise and SMB customers.
Coviant
With a sole focus on MFT, Coviant delivers automated and scheduled solutions at a low cost.
GlobalSCAPE
GlobalSCAPE is an authority in file transfer, providing solutions that are strong in security and usability.
IBM
A leading global provider of IT products and services that has been providing MFT solutions since 1984.
Ipswitch
An authority in network monitoring, messaging, and file transfer with over two decades of experience.
Linoma Software A longstanding software developer that has been in the MFT market for over a decade. OpenText
A leader in Enterprise Information Management (EIM) solutions, OpenText entered the MFT market in 2012.
Primeur
Specializing in middleware, Primeur is a MFT pioneer having entered the market in 1986.
Safe-T
A newer vendor with a strong emphasis on security and integration into the organization’s entire eco-system.
SEEBURGER
A longstanding global company providing an all-in-one suite of business integration and file transfer solutions.
Thru Inc.
Thru Inc. is a smaller vendor but 100% focused on MFT, reflected through strong product innovation. Info-Tech Research Group
9
Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed Vendor Landscape Overview
The Table Stakes
What does this mean?
Feature:
The products assessed in this Vendor Landscape meet, at the very least, the requirements outlined as Table Stakes.
What it is:
File Transfer Protocols
Encrypts files “at rest” and “in transit,” supporting SSL, SSH, and PGP.
Regulations Compliance
Meets standards dictated by regulations such as SOX, HIPAA, and PCI-DSS.
File Transfer Automation
Has ability to schedule file transfers according to a predefined schedule or rules.
Audit and Visibility
Provides a full audit log of file transfer activity.
LDAP/AD Integration
Supports authentication through LDAP and AD protocols.
Antivirus Integration
Integrates with antivirus software to scan incoming and outgoing files.
Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here.
If Table Stakes are all you need from your managed file transfer solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. Info-Tech Research Group
10
Advanced features are the capabilities that allow for granular differentiation of market players and use-case performance Vendor Landscape Overview Scoring Methodology
Feature
What we looked for:
Info-Tech scored each vendor’s features on a cumulative fourpoint scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-ofbreed native feature.
File Delivery Assurance
Checks file integrity after transmission and automatically resumes interrupted transfers.
Application Integration
Ability to integrate to existing applications through the use of APIs.
File Transfer Acceleration
Capable of accelerating large file transfers over any distance.
Integration with Email Clients
Ability to attach browser-based enterprise email application or add email client plug-in.
Role-Based Security
Users can be assigned roles which limit access or operations.
Ad Hoc File Transfer
Supports ad hoc users in sending files through email.
Content-Based Routing
Assess content and route the file to an alternative location.
Security Certification
Received certification from regulatory bodies, validating the security of the product.
Mobile
Full support and accessibility through a mobile device.
Advanced Security
Ability to support multiple, advanced security protocols.
For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group
11
Vendor scoring focused on overall product attributes and vendor performance in the market Vendor Landscape Overview Scoring Methodology
Product Evaluation Features
Info-Tech Research Group scored each vendor’s overall product attributes, capabilities, and market performance.
Usability
The end-user and administrative interfaces are intuitive and offer streamlined workflow.
Affordability
Implementing and operating the solution is affordable given the technology.
Architecture
Multiple deployment options, platform support, and integration capabilities are available.
Features are scored individually as mentioned in the previous slide. The scores are then modified by the individual scores of the vendor across the product and vendor performance features. Usability, overall affordability of the product, and the technical features of the product are considered and scored on a five-point scale. The score for each vendor will fall between worst and best in class. The vendor’s performance in the market is evaluated across four dimensions on a five-point scale. Where the vendor places on the scale is determined by factual information, industry position, and information provided by customer references and/or available from public sources.
Vendor Evaluation Features Viability
Vendor is profitable, knowledgeable, and will be around for the long term.
Focus
Vendor is committed to the space and has a future product and portfolio roadmap.
Reach
Vendor offers global coverage and is able to sell and provide post-sales support.
Sales
Vendor channel partnering, sales strategies, and process allow for flexible product acquisition.
Info-Tech Research Group
12
4.2
Balance individual strengths to find the best fit for your enterprise Vendor Performance
Vendor
Product Attunity Axway bTrade Coviant GlobalSCAPE IBM Ipswitch
Linoma Software OpenText BizManager OpenText Secure MFT Primeur
Safe-T SEEBURGER Thru Inc. Legend
Overall
Usability
Afford.
Arch.
Overall
Viability
Focus
Reach
Sales
3 3 3 3 3 2 3 3 2 3 3 2 3 3
4 3 4 2 4 4 3 3 3 3 3 3 3 3
3 2 2 4 3 0 3 3 2 2 2 2 2 2
2 4 3 2 3 4 3 3 3 4 3 2 4 4
3 3 3 3 3 3 3 3 3 3 3 3 3 3
3 3 4 3 3 3 4 4 4 4 3 3 4 3
3 3 3 4 3 3 3 4 2 2 3 3 2 4
4 3 3 4 4 4 4 4 4 4 3 4 4 4
3 4 2 2 3 4 3 2 4 4 2 3 3 2
= Exemplary
= Good
= Adequate
= Inadequate
= Poor
For an explanation of how the Info-Tech Harvey Balls are calculated, see Information Presentation – Criteria Scores (Harvey Balls) in the Appendix. Info-Tech Research Group
13
Each vendor offers a different feature set; concentrate on your organization needs Vendor Performance Evaluated Features Application Integration
File Transfer Acceleration
Integration with Email Clients
Role-Based Security
Ad Hoc File Transfer
Content-Based Routing
Security Certification
Mobile
Advanced Security
Attunity
4
4
4
4
4
4
4
4
4
4
Axway
4
4
4
4
4
4
4
4
4
4
bTrade
4
4
4
4
4
4
4
4
4
4
Coviant
4
4
4
4
4
4
4
4
4
4
GlobalSCAPE
4
4
4
4
4
4
4
4
4
4
IBM
4
4
4
4
4
4
4
4
4
4
Ipswitch
4
4
4
4
4
4
4
4
4
4
Linoma Software
4
4
4
4
4
4
4
4
4
4
OpenText BizManager
4
4
4
4
4
4
4
4
4
4
Legend
File Delivery Assurance
= Feature is best in its class
= Feature is fully present in its native solution
= Feature is present at additional cost
= Feature is partially present
= Feature is absent
For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group
14
Each vendor offers a different feature set; concentrate on your organization needs (continued) Vendor Performance Evaluated Features File Delivery Assurance
Application Integration
File Transfer Acceleration
Integration with Email Clients
Role-Based Security
Ad Hoc File Transfer
Content-Based Routing
Security Certification
Mobile
Advanced Security
OpenText Secure MFT
4
4
4
4
4
4
4
4
4
4
Primeur
4
4
4
4
4
4
4
4
4
4
Safe-T
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
4
SEEBURGER
Legend
Thru Inc.
= Feature is best in its class
= Feature is fully present in its native solution
= Feature is present at additional cost
= Feature is partially present
= Feature is absent
For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group
15
Use Info-Tech’s vendor research and use-case scenarios to support your own organization’s vendor analysis This view of vendor and product performance provides multiple opportunities for vendors to place depending on their product and market performance. Use cases selected are based on market research and client demand.
Use Case
Description
Server-to-Server Enterprise
Organizations with more than 500 MFT users. This use case looks at traditional managed file transfer capabilities, including scheduling, directory scanning, file event monitoring, and secure and assured transfer of files from one to many points. Advanced features for file transfer process management will be weighted heavily in this use case.
Server-to-Server Mid-Market
Mid-market organizations have between 50-500 MFT users and small IT departments where IT professionals wear multiple hats. This use case looks for basic managed file transfer capabilities, available at an affordable price point, in a product that is easy to install, configure, and operate. More advanced features will be weighted lightly, given that in many cases, SMB organizations don’t always need them.
Ad Hoc Enterprise
Organizations with more than 500 MFT users that engage in spontaneous, user driven, file transfers. Many organizations find that this type of ad hoc collaboration is on the rise, and therefore file transfers are also increasing. Advanced features that support this use case, such as integration with email clients, web clients, ad hoc person-to-person file transfer, and controlled access to the sent files will be weighted heavily in this use case.
Ad Hoc Mid-Market
Organizations with between 50-500 MFT users that engage in spontaneous, user driven, file transfers. For mid-market organizations, usability and affordability will be weighted more heavily. The advanced features that support this use case include integration with email clients, web clients, ad hoc person-to-person file transfer, and controlled access to the sent files. Info-Tech Research Group
16
4.2
Drill down and understand the differentiators between use cases
• Directory scanning, scheduling, and file event monitoring. • Secured and assured file transfers. • Highly scalable with load balancing and active clustering.
• Set up scheduled, automated file transfers between two servers. • Make use of comprehensive audit trails with drill down capabilities to see which files were received and/or failed.
IDEAL FOR
• Organizations that need an automated exchange of business critical data and information.
FOCUS
• More than 500 unique MFT users.
Enterprise Ad Hoc File Transfer
USAGE
USAGE
FOCUS
IDEAL FOR
Enterprise Server to Server File Transfer
• More than 500 unique MFT users. • Organizations that require employee collaboration and communication through file sharing. • Organizations that need to share large files with multiple external trading partners. • Integration with email clients, web clients, and ad hoc person-to-person file transfer. •
Controlled access to the sent files.
• Employees send large files through their email with web client plug-ins.
Info-Tech Research Group
17
4.2
Understand the differentiators between use cases
• Directory scanning, scheduling, and file event monitoring. • Secured and assured file transfers. • Highly scalable with load balancing and active clustering.
• Set up scheduled, automated file transfers between two servers. • Make use of comprehensive audit trails with drill down capabilities to see which files were received and/or failed.
IDEAL FOR
• A strong interest in low initial investment, scalability, and rapid implementation.
FOCUS
• Firms with less than 500 MFT users; a small IT department with IT staff covering multiple roles.
Mid-Market Ad Hoc File Transfer
USAGE
USAGE
FOCUS
IDEAL FOR
Mid-Market Server to Server File Transfer
• Firms with less than 500 MFT users; a small IT department with IT staff covering multiple roles. • A strong interest in low initial investment, scalability, and rapid implementation. • Integration with email clients, web clients, and ad hoc person-to-person file transfer. •
Controlled access to the sent files.
• Employees send large files through their email, with web client plug-ins, to customers and third parties. • Employees communicate internally by exchanging large files in PowerPoint, videos, and pictures.
Info-Tech Research Group
18
Determine your alignment with Info-Tech’s MFT use-case scenarios
4.2
Identify the use-case scenarios that align with your file transfer needs.
Assessments: Business Needs
>=500 MFT users
Automation is needed
User file sharing Work Style
Enterprise Server-toServer
Enterprise Ad Hoc
MFT user base?
Automation is needed Work Style