Feature Availability
The table below describes which features are available in EFT Express, Enterprise, and Arcus.
For details of which modules are available for each edition, refer to Introduction to EFT™ Managed File Transfer.
Feature |
Express |
Enterprise |
Arcus |
|
Protocols |
||||
SSL/TLS - secure FTP communications |
Included |
Included |
Included |
|
SSL key manager - manage, import, export, and create SSL certificates |
Included |
Included |
Included |
|
SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1) |
Included |
Included |
Included |
|
Checkpoint restart - resume interrupted transfers |
Included |
Included |
Included |
|
Compression - inline compression of ASCII files |
Included |
Included |
Included |
|
Reduce transfer time over poor connections by allowing uploaded files to be split apart and transferred in multiple segments simultaneously (COMB) |
Included |
Included |
Included |
|
Verification - guarantee integrity by comparing checksums |
Included |
Included |
Included |
|
Command blocking - prevent unwanted behavior |
Included |
Included |
Included |
|
S-key OTP - One-time-password scheme for plain-text FTP |
Included |
Included |
Included |
|
PASV port range - facilitate FTP connections behind network firewalls |
Included |
Included |
Included |
|
EBCDIC - Used for communicating with legacy systems |
Included |
Included |
Included |
|
UTF-8 - Transfer Unicode filenames over FTP |
Included |
Included |
Included |
|
Session tools - Real-time session monitoring |
Included |
Included |
Included |
|
Customizable - Modify various FTP banners to suit your specific needs |
Included |
Included |
Included |
|
FIPS - FIPS 140-2 certified SSH cryptographic module |
ESM |
Included |
Included |
|
Key manager - manage, import, export, and create SSH key pairs |
SFTP |
Included |
Included |
|
Key types - OpenSSH and SSH.COM (SECSH format) supported |
SFTP |
Included |
Included |
|
Authentication - Any combination of password and/or public key |
SFTP |
Included |
Included |
|
Strong ciphers - 256-bit Twofish, 256-bit AES CBC, and 256-bit AES CTR mode |
SFTP |
Included |
Included |
|
Configurable SSH-protoversion-softwareversion - lower attack footprint |
SFTP |
Included |
Included |
|
FIPS - FIPS 140-2 certified SSH cryptographic module |
SFTP, ESM |
Included |
Included |
|
Customizable landing portal - Login page can be branded |
HTTP/S |
Included |
Included |
|
Form-based auth - sessions are managed securely by the server |
HTTP/S |
Included |
Included |
|
Basic-auth - standard browser authentication (fallback auth mechanism) |
HTTP/S |
Included |
Included |
|
Session management in accordance with OWASP guidelines |
HTTP/S |
Included |
Included |
|
Password reset in accordance with OWASP guidelines |
HTTP/S |
Included |
Included |
|
Lost username retrieval in accordance with OWASP guideline |
HTTP/S |
Included |
Included |
|
SSO - use the Integrated Windows Authentication (IWA) in Internet Explorer |
HTTP/S |
Included |
Included |
|
Accelerate file transfers using EFT Event Rule Actions |
N/A |
Accelerate module |
N/A |
|
HTTP->HTTPS auto-redirect - increased security through implicit redirection of non-secure connections |
HTTP/S, ESM |
ASM |
N/A |
|
Web client - Optional web client adds a rich set of features compared to script-driven HTTP/S transfers |
HTTP/S, WTC |
Included |
Included |
|
Mobile client - Provides secure, remote access to your EFT files through HTTPS |
HTTP/S, MTC |
Included |
Included |
|
Multi-directional - service inbound and initiate outbound AS2 transactions |
N/A |
AS2 module |
Included |
|
Drummond certified - 3rd-party certified equals superior interoperability. |
N/A |
AS2 module |
Included |
|
Message Level Security (MLS) - certificate-based authentication |
N/A |
AS2 module |
Included |
|
Reliability Profile - AS2 extension that increases interoperability |
N/A |
AS2 module |
Included |
|
Multiple Attachments (MA) Profile - AS2 extension that facilitates multiple concurrent transactions |
N/A |
AS2 module |
Included |
|
|
Authentication (Access Controls) |
|||
Native - (proprietary) authentication (EFT-managed authentication) |
Included |
Included |
Included |
|
Active Directory (AD) authentication |
Included |
Included |
N/A |
|
ODBC - leverage any ODBC data source for user authentication |
Included |
Included |
N/A |
|
NTLM - authenticate local system accounts (Choose "Windows AD Authentication" when creating the Site.) |
Included |
Included |
N/A |
|
LDAP - authenticate against LDAP sources, including AD |
N/A |
Included |
Included |
|
SAML (WebSSO) - user interface controls for enabling and configuring SAML for achieving Single Sign On (SSO) for Web-based authentication |
N/A |
ASM |
Included |
|
RADIUS - often used as a two-factor authentication source |
N/A |
RADIUS, ASM |
Supported |
|
SMS authentication - two-factor authentication using a mobile device to receive a login code (requires SMS software) |
N/A |
SMS software, ASM |
Supported |
|
RSA SecurID® - 3rd-party access manager that provides two-factor authentication |
N/A |
RSA server, ASM |
Included |
|
CAC - Common Access Card authentication |
N/A |
ASM |
Included |
|
|
Authorization (Resource Controls) |
|||
AD Impersonation - leverage Active Directory ACLs |
Included |
Included |
Not Supported |
|
Permissions - set folder level permissions or inherit from parent |
Included |
Included |
Included |
|
Permission groups - assign users to permission groups or templates |
Included |
Included |
Included |
|
Virtual folders - map virtual to physical folders including network shares |
Included |
Included |
Included |
|
Home folders - designate a home folder and optionally make it the user's root folder |
Included |
Included |
Included |
|
Set limits - number of logins, connections, file sizes, transfer speeds, disk quotas |
Included |
Included |
Included |
|
Invalid passwords - controls to auto-lockout, disable, or ban IP |
Included |
Included |
Included |
|
Invalid account names - controls to auto-ban offender IP |
Included |
Included |
Included |
|
DoS detection - controls to temporarily or permanently ban suspect IPs |
Included |
Included |
Included |
|
IP access rules - full featured IP access rule manager |
Included |
Included |
Included |
|
Banned file types - prevent upload of unwanted file types |
Included |
Included |
Included |
|
Monitor and kick offending users from the server |
Included |
Included |
Included |
|
Password complexity - configure a large number of complexity options |
Included |
Included |
Included |
|
Password reset - user-initiated or on initial login |
Included |
Included |
Included |
|
Password reuse - disallow historical (previously used) passwords |
Included |
Included |
Included |
|
Expire accounts - disable account on a given date |
Included |
Included |
Included |
|
Expire inactive accounts - disable or remove account after N days of inactivity |
ESM |
ASM |
Included |
|
Expire passwords - expire passwords after N days |
ESM |
ASM |
Included |
|
Expiration reminder - email user reminder to change their password |
ESM |
ASM |
Included |
|
Data sanitization - securely clean deleted data using military grade wiping |
ESM |
ASM |
Included |
|
EFS - encrypt data at rest using Windows' Streaming repository encryption (EFS) |
ESM |
ASM |
Not Supported |
|
OpenPGP - use OpenPGP to encrypt, sign, and decrypt data |
OpenPGP |
OpenPGP |
Included |
|
PCI DSS monitor - actively monitor and alert on violations |
ESM, ARM |
ASM, ARM |
Included |
|
PCI DSS report - generate a compliance with a single mouse click |
ESM, ARM |
ASM, ARM |
Included |
|
PCI DSS compensating controls (CCs) - capture and report admin-provided CCs |
ESM, ARM |
ASM, ARM |
Included |
|
PCI DSS setup wizard - walkthrough configuration with PCI DSS in mind |
ESM, ARM |
ASM, ARM |
Included |
|
DMZ Gateway - securely proxy transfers through the DMZ |
DMZ Gateway |
DMZ Gateway |
N/A |
|
|
Administration |
|||
Silent installation - unattended setup |
Included |
Included |
N/A |
|
Administrator GUI - Windows based Graphical User Interface (GUI) |
Included |
Included |
Included |
|
Remote administration - administer from other systems in the network |
Included |
Included |
Included |
|
Secure remote administration - SSL encrypted administration communications |
Included |
Included |
Included |
|
Multiple administrators - allow concurrent administration |
Included |
Included |
Included |
|
Secure administration - same password complexity options available for admins |
Included |
Included |
Included |
|
Flexible authentication - leverage native, NTLM, or AD to authenticate administrators |
ESM |
ASM |
Only LDAP is supported |
|
Forensics - audit and report on all administrator activity and changes |
ESM, ARM |
ASM, ARM |
Included |
|
COM API - programmatic administration |
Limited |
Included |
N/A |
|
Delegated administration - role based administrator accounts with granular permissions |
Server and Site admin only |
Included |
Server admin not applicable |
|
REST endpoint for querying administrative info and server status |
Included |
Included |
Included |
|
Backup and Restore - one-click backup and easy restore of entire configuration |
N/A |
Included |
N/A |
|
Batch account management - perform actions to multiple accounts simultaneously |
N/A |
Included |
N/A |
|
Auditing and Visibility |
||||
Logging - flat file log in W3C and other formats |
Included |
Included |
Included |
|
Monitor inbound transfers in real time |
ARM |
Included |
Included |
|
Audit to SQL - audit transactions to a SQL database |
ARM |
ARM |
Included |
|
View reports - choose from pre-built or build your own |
ARM |
ARM |
Included |
|
Audit to Oracle - audit transactions to an Oracle database |
N/A |
ARM |
Included |
|
Monitor outbound transfers in real time |
N/A |
Included |
Included |
|
Business Activity Monitoring (BAM) - real-time visibility, dashboard, and analytics (Requires ARM) |
N/A |
BAM |
N/A |
|
Automation (Integration with Back End Systems) |
||||
React to stimuli - trigger workflows based on file uploads and other server events |
Included |
Included |
Included |
|
Send email to users or administrators as part of a workflow |
Included |
Included |
Included |
|
Execute a process, including scripts, as part of a workflow |
Included |
Included |
Included |
|
Context variables - use transaction values inside of workflows |
Included |
Included |
Included |
|
Hot folders - trigger workflows when files arrive in a monitored folder |
Folder Monitor |
Included |
Included |
|
Scheduled events - trigger workflows on a recurring basis |
Timer Module |
Included |
Included |
|
Web Services - trigger workflows using WS calls; Invoke Web Service from URL |
N/A |
Included |
Included |
|
Conditional logic - build fine-grained business logic into workflows |
N/A |
Included |
Included |
|
Clean up - securely clean target folders from within a workflow |
N/A |
Included |
Included |
|
Offload and download - push or pull files to remote servers as part of a workflow |
File Transfer Client module |
Included |
Included |
|
Send pre- and post- commands to mainframe during copy/move actions |
N/A |
Included |
Included |
|
Perform folder and file operations |
N/A |
Included |
Included |
|
Compress/Decompress files |
N/A |
Included |
Included |
|
Advanced workflows - tap into the Advanced Workflow Engine to build sophisticated workflows |
N/A |
AWE |
Included |
|
Integration with antivirus and DLP (Data Loss Prevention) tools to permit or prevent transfers based on policies. |
N/A |
ASM module |
Included |
|
Integration with cloud (AWS and Azure) storage; Copy, move, and download from cloud storage |
Included |
Included |
Included |
|
Ability to monitor and act upon AWS S3 and Azure blob storage activity |
Included |
Included |
Included |
|
Centralized control for automating transactions from distributed systems (Remote Agents), including provisioning, management and Event Rules |
N/A |
Included |
Included |
|
Reusable connection profiles for use in Event Rules |
N/A |
Included |
Included |
|
Logging for AWS S3 and Azure blog storage to EFT.log |
N/A |
Included |
Included |
|
Person-to-person file transfer |
||||
Ad hoc file transfer - secure file transfer available either via Outlook Add-in or web interface |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Two-way file sharing - recipients provided with multiple methods to send files back |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Receipt notification - email notification when files are picked up by the recipient |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Pick-up authentication - recipients can be required to verify their identity before downloading files |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Full file tracking - Users and administrators can view complete history of files sent and received |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Centralized policy controls - administrator can enforce varying levels of required usage policies |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Active directory authentication - authentication internal users using AD |
HTTP/S, Workspaces |
Workspaces |
LDAP |
|
Integration with EFT - monitor all ad hoc file transfer activity from EFT |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Complete customization - easily customize ad hoc web interface |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Share folders/files with others; invite others to share (Workspaces via browser and EFT Outlook Add-In) |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Request files via Workspaces |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Send file in email from Workspaces with Secure Message Body |
HTTP/S, Workspaces |
Workspaces |
Included |
|
Architecture |
||||
IPv6 - Full dual stack (IPv4/6 mixed) support |
Included |
Included |
Included |
|
Virtual - Run on virtual machines, e.g. VMware and Hyper-V |
Included |
Included |
N/A |
|
Unicode - UTF-8 encoding of filenames and other fields where applicable |
Included |
Included |
Included |
|
IDN - Internationalized domain name support |
Included |
Included |
Included |
|
I/O Completion Ports - Technology that allows for tremendous performance on Windows systems |
Included |
Included |
Included |
|
Active-passive clustering - Failover for high availability |
N/A |
Included |
N/A |
|
Active-active, high availability (HA) clustering with 3 or more EFT Enterprise licenses |
N/A |
Included |
Included |
|
Supported on Windows Server 2012 and 2016 |
Included |
Logo certified |
N/A |