Select and Implement a Managed File Transfer Solution - Axway

2 downloads 97 Views 2MB Size Report
Info-Tech Research Group. 1. Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. ...
1234

Select and Implement a Managed File Transfer Solution Secure file transfers today and avoid worrying about tomorrow.

Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns. © 1997-2015 Info-Tech Research Group Inc.

Info-Tech Research Group

1

Executive summary Situation

Info-Tech Insight

• Every business, regardless of industry, is required to exchange information

• FTP is no longer seen as a viable

with internal and external partners. Traditional file transfer techniques such as FTP are no longer viable options for transferring files due to business pressures for fast, efficient, and secure file transfers. Managed File Transfer (MFT) solutions are now recognized as a necessity for organizations.

• Complication

• There are many changes in the industry as big players are continuously •

acquiring small vendors and advanced features become table stakes features. It can be difficult to choose a solution that scales with the needs of the enterprise.



option to manage file transfer securely inside and outside of the enterprise. MFT has filled that role and is seeing rapid adoption as compliance standards extend their reach. Vendors recognize demand for deployment flexibility, but buyers are still wary of potential security issues surrounding compliance. Vendors are starting to offer mobile functionality, or at the very least, are putting it on their vendor roadmaps.

Resolution

• Moving away from traditional file transfer techniques and homegrown solutions needs to be done using an effective step•



by-step approach. Prior to implementing an MFT solution, organizations need to conduct a thorough analysis of their current state and file transfer requirements. Gather requirements by not only soliciting the needs of the business today, but also collecting the requirements the business may need in the future. Create a shortlist of vendors that meet the organization’s wants and needs. Avoid post-implementation challenges by governing the application with the appropriate metrics, policies, and procedures. Info-Tech Research Group

2

VENDOR LANDSCAPE 4.1 Info-Tech’s Methodology

Info-Tech Research Group

3

Vendor Landscape use-case scenarios are evaluated based on weightings of features and vendor/product considerations 4.1 Scoring Overview Use cases were scored around the features identified in the general scoring as being relevant to the functional considerations and drivers for each scenario. Calculation Overview Advanced Features Score X Vendor Multiplier = Vendor Performance for Each Scenario Please note that both advanced feature scores and vendor multipliers are based on the specific weightings calibrated for each scenario.

Product and Vendor Weightings

Advanced Features Weightings

Info-Tech Research Group

4

Vendor performance for each use-case scenario is documented in a weighted bar graph 4.1 Scoring Overview

Vendor Performance Vendors qualify and rank in each use-case scenario based on their relative placement and scoring for the scenario.

Vendor Ranking Champion: The top vendor scored in the scenario Leaders: The vendors who placed second and third in the scenario Players: Additional vendors who qualified for the scenarios based on their scoring

Value ScoreTM Each use-case scenario also includes a Value Index that identifies the Value Score for a vendor relative to their price point. This additional framework is meant to help price-conscious organizations identify vendors who provide the best “bang for the buck.”

Info-Tech Research Group

5

VENDOR LANDSCAPE 4.2 Review the Managed File Transfer

Vendor Evaluation

Info-Tech Research Group

6

Review Info-Tech’s Vendor Landscape of the MFT market to identify vendors that meet your requirements The following section includes an overview of vendor performance and the analysis of each use-case scenario. Review the accompanying deliverable in order to understand the strengths, weaknesses, and capabilities of each vendor.

Vendors Evaluated

Each vendor in this landscape was evaluated based on its features, product considerations, and vendor considerations. Each vendor was profiled using these evaluations and, based on their performance, qualified and placed in specific use-case scenarios. Info-Tech Research Group

7

MFT market overview

How it got here

Where it’s going

• MFT emerged from limitations with traditional file transfer techniques, such as basic FTP servers. FTP servers lacked the ability to handle growing data volume requirements and provide enough visibility into file transfer activity, and organizations looked to MFT to fill that need.

• Big players in business integration will continue to snap up smaller MFT vendors to round out product portfolios. Integration of MFT into workflow and process management tools will grow in importance as organizations adopt more process-oriented approaches.

• Compliance standards like SOX, HIPAA, and PCI-DSS increased regulatory pressures, particularly on organizations in financial services, government, and healthcare. More organizations face these requirements as they manage their own compliance needs along with those of key business partners.

• IT departments are warming up to cloud solutions for MFT, and vendors are responding by increasing the flexibility of their offerings.

• Selection of the best solution for an organization has been highly dependent on use case: email offloading, ad hoc file transfer, and B2B scheduling needs are covered through combinations of vendor products and modules.

• Mobile access and collaboration features will continue to surface from MFT suites. Today’s “24/7” and “on-the-go” workforce requires constant access to systems. • Cloud file sharing solutions, such as Box and Citrix ShareFile, are starting to meet corporate security requirements and may be able to replace MFT’s ad hoc file transfer component in the future.

As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Audit logs have become a Table Stakes capability and should no longer be used to differentiate solutions. Instead focus on content-based routing and file transfer acceleration to get the best fit for your requirements.

Info-Tech Research Group

8

4.2

Managed file transfer vendor selection / knock-out criteria: market share, mind share, and platform coverage For this Vendor Landscape, Info-Tech focused on those vendors that offer broad capabilities across multiple platforms and that have a strong market presence and/or reputational presence among mid- and large-sized enterprises.

Included in this Vendor Landscape: Attunity

A data integration and replication expert building on MFT capabilities acquired from RepliWeb in 2011.

Axway

A global software company providing a comprehensive suite of file transfer and business integration solutions.

bTrade

An experienced and recognized leader in the MFT industry that has continued to provide innovative solutions for both global enterprise and SMB customers.

Coviant

With a sole focus on MFT, Coviant delivers automated and scheduled solutions at a low cost.

GlobalSCAPE

GlobalSCAPE is an authority in file transfer, providing solutions that are strong in security and usability.

IBM

A leading global provider of IT products and services that has been providing MFT solutions since 1984.

Ipswitch

An authority in network monitoring, messaging, and file transfer with over two decades of experience.

Linoma Software A longstanding software developer that has been in the MFT market for over a decade. OpenText

A leader in Enterprise Information Management (EIM) solutions, OpenText entered the MFT market in 2012.

Primeur

Specializing in middleware, Primeur is a MFT pioneer having entered the market in 1986.

Safe-T

A newer vendor with a strong emphasis on security and integration into the organization’s entire eco-system.

SEEBURGER

A longstanding global company providing an all-in-one suite of business integration and file transfer solutions.

Thru Inc.

Thru Inc. is a smaller vendor but 100% focused on MFT, reflected through strong product innovation. Info-Tech Research Group

9

Table Stakes represent the minimum standard; without these, a product doesn’t even get reviewed Vendor Landscape Overview

The Table Stakes

What does this mean?

Feature:

The products assessed in this Vendor Landscape meet, at the very least, the requirements outlined as Table Stakes.

What it is:

File Transfer Protocols

Encrypts files “at rest” and “in transit,” supporting SSL, SSH, and PGP.

Regulations Compliance

Meets standards dictated by regulations such as SOX, HIPAA, and PCI-DSS.

File Transfer Automation

Has ability to schedule file transfers according to a predefined schedule or rules.

Audit and Visibility

Provides a full audit log of file transfer activity.

LDAP/AD Integration

Supports authentication through LDAP and AD protocols.

Antivirus Integration

Integrates with antivirus software to scan incoming and outgoing files.

Many of the vendors go above and beyond the outlined Table Stakes, some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here.

If Table Stakes are all you need from your managed file transfer solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs. Info-Tech Research Group

10

Advanced features are the capabilities that allow for granular differentiation of market players and use-case performance Vendor Landscape Overview Scoring Methodology

Feature

What we looked for:

Info-Tech scored each vendor’s features on a cumulative fourpoint scale. Zero points are awarded to features that are deemed absent or unsatisfactory, one point is assigned to features that are partially present, two points are assigned to features that require an extra purchase in the vendor’s product portfolio or through a third party, three points are assigned to features that are fully present and native to the solution, and four points are assigned to the best-ofbreed native feature.

File Delivery Assurance

Checks file integrity after transmission and automatically resumes interrupted transfers.

Application Integration

Ability to integrate to existing applications through the use of APIs.

File Transfer Acceleration

Capable of accelerating large file transfers over any distance.

Integration with Email Clients

Ability to attach browser-based enterprise email application or add email client plug-in.

Role-Based Security

Users can be assigned roles which limit access or operations.

Ad Hoc File Transfer

Supports ad hoc users in sending files through email.

Content-Based Routing

Assess content and route the file to an alternative location.

Security Certification

Received certification from regulatory bodies, validating the security of the product.

Mobile

Full support and accessibility through a mobile device.

Advanced Security

Ability to support multiple, advanced security protocols.

For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group

11

Vendor scoring focused on overall product attributes and vendor performance in the market Vendor Landscape Overview Scoring Methodology

Product Evaluation Features

Info-Tech Research Group scored each vendor’s overall product attributes, capabilities, and market performance.

Usability

The end-user and administrative interfaces are intuitive and offer streamlined workflow.

Affordability

Implementing and operating the solution is affordable given the technology.

Architecture

Multiple deployment options, platform support, and integration capabilities are available.

Features are scored individually as mentioned in the previous slide. The scores are then modified by the individual scores of the vendor across the product and vendor performance features. Usability, overall affordability of the product, and the technical features of the product are considered and scored on a five-point scale. The score for each vendor will fall between worst and best in class. The vendor’s performance in the market is evaluated across four dimensions on a five-point scale. Where the vendor places on the scale is determined by factual information, industry position, and information provided by customer references and/or available from public sources.

Vendor Evaluation Features Viability

Vendor is profitable, knowledgeable, and will be around for the long term.

Focus

Vendor is committed to the space and has a future product and portfolio roadmap.

Reach

Vendor offers global coverage and is able to sell and provide post-sales support.

Sales

Vendor channel partnering, sales strategies, and process allow for flexible product acquisition.

Info-Tech Research Group

12

4.2

Balance individual strengths to find the best fit for your enterprise Vendor Performance

Vendor

Product Attunity Axway bTrade Coviant GlobalSCAPE IBM Ipswitch

Linoma Software OpenText BizManager OpenText Secure MFT Primeur

Safe-T SEEBURGER Thru Inc. Legend

Overall

Usability

Afford.

Arch.

Overall

Viability

Focus

Reach

Sales

3 3 3 3 3 2 3 3 2 3 3 2 3 3

4 3 4 2 4 4 3 3 3 3 3 3 3 3

3 2 2 4 3 0 3 3 2 2 2 2 2 2

2 4 3 2 3 4 3 3 3 4 3 2 4 4

3 3 3 3 3 3 3 3 3 3 3 3 3 3

3 3 4 3 3 3 4 4 4 4 3 3 4 3

3 3 3 4 3 3 3 4 2 2 3 3 2 4

4 3 3 4 4 4 4 4 4 4 3 4 4 4

3 4 2 2 3 4 3 2 4 4 2 3 3 2

= Exemplary

= Good

= Adequate

= Inadequate

= Poor

For an explanation of how the Info-Tech Harvey Balls are calculated, see Information Presentation – Criteria Scores (Harvey Balls) in the Appendix. Info-Tech Research Group

13

Each vendor offers a different feature set; concentrate on your organization needs Vendor Performance Evaluated Features Application Integration

File Transfer Acceleration

Integration with Email Clients

Role-Based Security

Ad Hoc File Transfer

Content-Based Routing

Security Certification

Mobile

Advanced Security

Attunity

4

4

4

4

4

4

4

4

4

4

Axway

4

4

4

4

4

4

4

4

4

4

bTrade

4

4

4

4

4

4

4

4

4

4

Coviant

4

4

4

4

4

4

4

4

4

4

GlobalSCAPE

4

4

4

4

4

4

4

4

4

4

IBM

4

4

4

4

4

4

4

4

4

4

Ipswitch

4

4

4

4

4

4

4

4

4

4

Linoma Software

4

4

4

4

4

4

4

4

4

4

OpenText BizManager

4

4

4

4

4

4

4

4

4

4

Legend

File Delivery Assurance

= Feature is best in its class

= Feature is fully present in its native solution

= Feature is present at additional cost

= Feature is partially present

= Feature is absent

For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group

14

Each vendor offers a different feature set; concentrate on your organization needs (continued) Vendor Performance Evaluated Features File Delivery Assurance

Application Integration

File Transfer Acceleration

Integration with Email Clients

Role-Based Security

Ad Hoc File Transfer

Content-Based Routing

Security Certification

Mobile

Advanced Security

OpenText Secure MFT

4

4

4

4

4

4

4

4

4

4

Primeur

4

4

4

4

4

4

4

4

4

4

Safe-T

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

4

SEEBURGER

Legend

Thru Inc.

= Feature is best in its class

= Feature is fully present in its native solution

= Feature is present at additional cost

= Feature is partially present

= Feature is absent

For an explanation of how Advanced Features are determined, see Information Presentation – Feature Ranks (Stoplights) in the Appendix. Info-Tech Research Group

15

Use Info-Tech’s vendor research and use-case scenarios to support your own organization’s vendor analysis This view of vendor and product performance provides multiple opportunities for vendors to place depending on their product and market performance. Use cases selected are based on market research and client demand.

Use Case

Description

Server-to-Server Enterprise

Organizations with more than 500 MFT users. This use case looks at traditional managed file transfer capabilities, including scheduling, directory scanning, file event monitoring, and secure and assured transfer of files from one to many points. Advanced features for file transfer process management will be weighted heavily in this use case.

Server-to-Server Mid-Market

Mid-market organizations have between 50-500 MFT users and small IT departments where IT professionals wear multiple hats. This use case looks for basic managed file transfer capabilities, available at an affordable price point, in a product that is easy to install, configure, and operate. More advanced features will be weighted lightly, given that in many cases, SMB organizations don’t always need them.

Ad Hoc Enterprise

Organizations with more than 500 MFT users that engage in spontaneous, user driven, file transfers. Many organizations find that this type of ad hoc collaboration is on the rise, and therefore file transfers are also increasing. Advanced features that support this use case, such as integration with email clients, web clients, ad hoc person-to-person file transfer, and controlled access to the sent files will be weighted heavily in this use case.

Ad Hoc Mid-Market

Organizations with between 50-500 MFT users that engage in spontaneous, user driven, file transfers. For mid-market organizations, usability and affordability will be weighted more heavily. The advanced features that support this use case include integration with email clients, web clients, ad hoc person-to-person file transfer, and controlled access to the sent files. Info-Tech Research Group

16

4.2

Drill down and understand the differentiators between use cases

• Directory scanning, scheduling, and file event monitoring. • Secured and assured file transfers. • Highly scalable with load balancing and active clustering.

• Set up scheduled, automated file transfers between two servers. • Make use of comprehensive audit trails with drill down capabilities to see which files were received and/or failed.

IDEAL FOR

• Organizations that need an automated exchange of business critical data and information.

FOCUS

• More than 500 unique MFT users.

Enterprise Ad Hoc File Transfer

USAGE

USAGE

FOCUS

IDEAL FOR

Enterprise Server to Server File Transfer

• More than 500 unique MFT users. • Organizations that require employee collaboration and communication through file sharing. • Organizations that need to share large files with multiple external trading partners. • Integration with email clients, web clients, and ad hoc person-to-person file transfer. •

Controlled access to the sent files.

• Employees send large files through their email with web client plug-ins.

Info-Tech Research Group

17

4.2

Understand the differentiators between use cases

• Directory scanning, scheduling, and file event monitoring. • Secured and assured file transfers. • Highly scalable with load balancing and active clustering.

• Set up scheduled, automated file transfers between two servers. • Make use of comprehensive audit trails with drill down capabilities to see which files were received and/or failed.

IDEAL FOR

• A strong interest in low initial investment, scalability, and rapid implementation.

FOCUS

• Firms with less than 500 MFT users; a small IT department with IT staff covering multiple roles.

Mid-Market Ad Hoc File Transfer

USAGE

USAGE

FOCUS

IDEAL FOR

Mid-Market Server to Server File Transfer

• Firms with less than 500 MFT users; a small IT department with IT staff covering multiple roles. • A strong interest in low initial investment, scalability, and rapid implementation. • Integration with email clients, web clients, and ad hoc person-to-person file transfer. •

Controlled access to the sent files.

• Employees send large files through their email, with web client plug-ins, to customers and third parties. • Employees communicate internally by exchanging large files in PowerPoint, videos, and pictures.

Info-Tech Research Group

18

Determine your alignment with Info-Tech’s MFT use-case scenarios

4.2

Identify the use-case scenarios that align with your file transfer needs.

Assessments: Business Needs

>=500 MFT users

Automation is needed

User file sharing Work Style

Enterprise Server-toServer

Enterprise Ad Hoc

MFT user base?

Automation is needed Work Style

Suggest Documents