Feature Availability

The table below describes which features are available in EFT Express, Enterprise, and Arcus.

For details of which modules are available for each edition, refer to Introduction to EFT™ Managed File Transfer.

Feature

Express

Enterprise

Arcus

Protocols

SSL/TLS - secure FTP communications

Included

Included

Included

SSL key manager - manage, import, export, and create SSL certificates

Included

Included

Included

SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1)

Included

Included

Included

Checkpoint restart - resume interrupted transfers

Included

Included

Included

Compression - inline  compression of ASCII files

Included

Included

Included

Reduce transfer time over poor connections by allowing uploaded files to be split apart and transferred in multiple segments simultaneously (COMB)

Included

Included

Included

Verification - guarantee integrity by comparing checksums

Included

Included

Included

Command blocking - prevent unwanted behavior

Included

Included

Included

S-key OTP - One-time-password scheme for plain-text FTP

Included

Included

Included

PASV port range - facilitate FTP connections behind network firewalls

Included

Included

Included

EBCDIC  - Used for communicating with legacy systems

Included

Included

Included

UTF-8 - Transfer Unicode filenames over FTP

Included

Included

Included

Session tools - Real-time session monitoring

Included

Included

Included

Customizable - Modify various FTP banners to suit your specific needs

Included

Included

Included

FIPS - FIPS 140-2 certified SSH cryptographic module 

ESM

Included

Included

Key manager - manage, import, export, and create SSH key pairs

SFTP

Included

Included

Key types - OpenSSH and SSH.COM (SECSH format) supported

SFTP

Included

Included

Authentication - Any combination of password and/or public key

SFTP

Included

Included

Strong ciphers - 256-bit Twofish, 256-bit AES CBC, and 256-bit AES CTR mode

SFTP

Included

Included

Configurable SSH-protoversion-softwareversion - lower attack footprint

SFTP

Included

Included

FIPS - FIPS 140-2 certified SSH cryptographic module 

SFTP, ESM

Included

Included

Customizable landing portal - Login page can be branded

HTTP/S

Included

Included

Form-based auth - sessions are managed securely by the server

HTTP/S

Included

Included

Basic-auth - standard browser authentication (fallback auth mechanism)

HTTP/S

Included

Included

Session management in accordance with OWASP guidelines

HTTP/S

Included

Included

Password reset in accordance with OWASP guidelines

HTTP/S

Included

Included

Lost username retrieval in accordance with OWASP guideline

HTTP/S

Included

Included

SSO - use the Integrated Windows Authentication (IWA) in Internet Explorer

HTTP/S

Included

Included

Accelerate file transfers using EFT Event Rule Actions

N/A

Accelerate module

N/A

HTTP->HTTPS auto-redirect - increased security through implicit redirection of non-secure connections

HTTP/S, ESM

ASM

N/A

Web client - Optional web client adds a rich set of features compared to script-driven HTTP/S transfers

HTTP/S, WTC

Included

Included

Mobile client - Provides secure, remote access to your EFT files through HTTPS

HTTP/S, MTC

Included

Included

Multi-directional - service inbound and initiate outbound AS2 transactions

N/A

AS2 module

Included

Drummond certified - 3rd-party certified equals superior interoperability.

N/A

AS2 module

Included

Message Level Security (MLS) - certificate-based authentication

N/A

AS2 module

Included

Reliability Profile - AS2 extension that increases interoperability

N/A

AS2 module

Included

Multiple Attachments (MA) Profile - AS2 extension that facilitates multiple concurrent transactions

N/A

AS2 module

Included

 

Authentication (Access Controls)

Native - (proprietary) authentication (EFT-managed authentication)

Included

Included

Included

Active Directory (AD) authentication

Included

Included

N/A

ODBC - leverage any ODBC data source for user authentication

Included

Included

N/A

NTLM - authenticate local system accounts (Choose "Windows AD Authentication" when creating the Site.)

Included

Included

N/A

LDAP - authenticate against LDAP sources, including AD

N/A

Included

Included

SAML (WebSSO) - user interface controls for enabling and configuring SAML for achieving Single Sign On (SSO) for Web-based authentication

N/A

ASM

Included

RADIUS - often used as a two-factor authentication source

N/A

RADIUS,  ASM

Supported

SMS authentication - two-factor authentication using a mobile device to receive a login code (requires SMS software)

N/A

SMS software, ASM

Supported

RSA SecurID® - 3rd-party access manager that provides two-factor authentication

N/A

RSA server, ASM

Included

CAC - Common Access Card authentication

N/A

ASM

Included

 

Authorization (Resource Controls)

AD Impersonation - leverage Active Directory ACLs

Included

Included

Not Supported

Permissions - set folder level permissions or inherit from parent

Included

Included

Included

Permission groups - assign users to permission groups or templates

Included

Included

Included

Virtual folders - map virtual to physical folders including network shares

Included

Included

Included

Home folders - designate a home folder and optionally make it the user's root folder

Included

Included

Included

Set limits - number of logins, connections,  file sizes, transfer speeds, disk quotas

Included

Included

Included

Invalid passwords -  controls to auto-lockout, disable, or ban IP

Included

Included

Included

Invalid account names - controls to auto-ban offender IP

Included

Included

Included

DoS detection - controls to temporarily or permanently ban suspect IPs 

Included

Included

Included

IP access rules - full featured IP access rule manager

Included

Included

Included

Banned file types - prevent upload of unwanted file types

Included

Included

Included

Monitor and kick offending users from the server

Included

Included

Included

Password complexity - configure a large number of complexity options

Included

Included

Included

Password reset - user-initiated or on initial login

Included

Included

Included

Password reuse - disallow historical (previously used) passwords

Included

Included

Included

Expire accounts - disable account on a given date

Included

Included

Included

Expire inactive accounts - disable or remove account after N days of inactivity

ESM

ASM

Included

Expire passwords - expire passwords after N days

ESM

ASM

Included

Expiration reminder - email user reminder to change their password

ESM

ASM

Included

Data sanitization - securely clean deleted data using military grade wiping

ESM

ASM

Included

EFS - encrypt data at rest using Windows' Streaming repository encryption (EFS)

ESM

ASM

Not Supported

OpenPGP - use OpenPGP to encrypt, sign, and decrypt data

OpenPGP

OpenPGP

Included

PCI DSS monitor - actively monitor and alert on violations

ESM, ARM

ASM, ARM

Included

PCI DSS report - generate a compliance with a single mouse click

ESM, ARM

ASM, ARM

Included

PCI DSS compensating controls (CCs) - capture and report admin-provided CCs

ESM, ARM

ASM, ARM

Included

PCI DSS setup wizard - walkthrough configuration with PCI DSS in mind

ESM, ARM

ASM, ARM

Included

DMZ Gateway - securely proxy transfers through the DMZ

DMZ Gateway

DMZ Gateway

N/A

 

Administration

Silent installation - unattended setup

Included

Included

N/A

Administrator GUI - Windows based Graphical User Interface (GUI)

Included

Included

Included

Remote administration - administer from other systems in the network

Included

Included

Included

Secure remote administration - SSL encrypted administration communications

Included

Included

Included

Multiple administrators - allow concurrent administration

Included

Included

Included

Secure administration - same password complexity options available for admins

Included

Included

Included

Flexible authentication - leverage native, NTLM, or AD to authenticate administrators

ESM

ASM

Only LDAP is supported

Forensics - audit and report on all administrator activity and changes

ESM, ARM

ASM, ARM

Included

COM API - programmatic administration

Limited

Included

N/A

Delegated administration - role based administrator accounts with granular permissions

Server and Site admin only

Included

Server admin not applicable

REST endpoint for querying administrative info and server status

Included

Included

Included

Backup and Restore - one-click backup and easy restore of entire configuration

N/A

Included

N/A

Batch account management - perform actions to multiple accounts simultaneously

N/A

Included

N/A

Auditing and Visibility

Logging - flat file log in W3C and other formats

Included

Included

Included

Monitor inbound transfers in real time

ARM

Included

Included

Audit to SQL - audit transactions to a SQL database

ARM

ARM

Included

View reports - choose from pre-built or build your own

ARM

ARM

Included

Audit to Oracle - audit transactions to an Oracle database

N/A

ARM

Included

Monitor outbound transfers in real time

N/A

Included

Included

Business Activity Monitoring (BAM) - real-time visibility, dashboard, and analytics (Requires ARM)

N/A

BAM

N/A

Automation (Integration with Back End Systems)

React to stimuli - trigger workflows based on file uploads and other server events

Included

Included

Included

Send email to users or administrators as part of a workflow

Included

Included

Included

Execute a process, including scripts, as part of a workflow

Included

Included

Included

Context variables - use transaction values inside of workflows

Included

Included

Included

Hot folders - trigger workflows when files arrive in a monitored folder

Folder Monitor

Included

Included

Scheduled events - trigger workflows on a recurring basis

Timer Module

Included

Included

Web Services - trigger workflows using WS calls; Invoke Web Service from URL

N/A

Included

Included

Conditional logic - build fine-grained business logic into workflows

N/A

Included

Included

Clean up - securely clean target folders from within a workflow

N/A

Included

Included

Offload and download - push or pull files to remote servers as part of a workflow

File Transfer Client module

Included

Included

Send pre- and post- commands to mainframe during copy/move actions

N/A

Included

Included

Perform folder and file operations

N/A

Included

Included

Compress/Decompress files

N/A

Included

Included

Advanced workflows - tap into the Advanced Workflow Engine to build sophisticated workflows

N/A

AWE

Included

Integration with antivirus and DLP (Data Loss Prevention) tools to permit or prevent transfers based on policies.

N/A

ASM module

Included

Integration with cloud (AWS and Azure) storage; Copy, move, and download from cloud storage

Included

Included

Included

Ability to monitor and act upon AWS S3 and Azure blob storage activity

Included

Included

Included

Centralized control for automating transactions from distributed systems (Remote Agents), including provisioning, management and Event Rules

N/A

Included

Included

Reusable connection profiles for use in Event Rules

N/A

Included

Included

Logging for AWS S3 and Azure blog storage to EFT.log

N/A

Included

Included

Person-to-person file transfer

Ad hoc file transfer - secure file transfer available either via Outlook Add-in or web interface

HTTP/S, Workspaces

Workspaces

Included

Two-way file sharing - recipients provided with multiple methods to send files back

HTTP/S, Workspaces

Workspaces

Included

Receipt notification - email notification when files are picked up by the recipient

HTTP/S, Workspaces

Workspaces

Included

Pick-up authentication - recipients can be required to verify their identity before downloading files

HTTP/S, Workspaces

Workspaces

Included

Full file tracking - Users and administrators can view complete history of files sent and received

HTTP/S, Workspaces

Workspaces

Included

Centralized policy controls - administrator can enforce varying levels of required usage policies

HTTP/S, Workspaces

Workspaces

Included

Active directory authentication - authentication internal users using AD

HTTP/S, Workspaces

Workspaces

LDAP

Integration with EFT - monitor all ad hoc  file transfer activity from EFT

HTTP/S, Workspaces

Workspaces

Included

Complete customization - easily customize ad hoc  web interface

HTTP/S, Workspaces

Workspaces

Included

Share  folders/files with others; invite others to share (Workspaces via browser and EFT Outlook Add-In)

HTTP/S, Workspaces

Workspaces

Included

Request files via Workspaces

HTTP/S, Workspaces

Workspaces

Included

Send file in email from Workspaces with Secure Message Body

HTTP/S, Workspaces

Workspaces

Included

Architecture

IPv6 - Full dual stack (IPv4/6 mixed) support

Included

Included

Included

Virtual - Run on virtual machines, e.g. VMware and Hyper-V

Included

Included

N/A

Unicode - UTF-8 encoding of filenames and other fields where applicable

Included

Included

Included

IDN - Internationalized domain name support

Included

Included

Included

I/O Completion Ports - Technology that allows for tremendous performance on Windows systems

Included

Included

Included

Active-passive clustering - Failover for high availability

N/A

Included

N/A

Active-active, high availability (HA) clustering with 3 or more EFT Enterprise licenses

N/A

Included

Included

Supported on Windows Server 2012 and 2016

Included

Logo certified

N/A