Introduction to EFT Managed File Transfer

More than just a managed file transfer (MFT) solution, Globalscape Enhanced File Transfer (EFT) extends beyond standard MFT to allow you to connect with any industry-standard file-transfer client. With powerful security for meeting business and regulatory requirements, EFT ensures that encrypted transactions occur only with the appropriate entities, and that data confidentiality and integrity are preserved during transport and storage. EFT modular form makes it affordable by allowing you to purchase just the functionality you need, and add advanced features as your business needs change. That is, all module features are available during the trial.

EFT managed file transfer is available for the large enterprise, EFT Enterprise, and for small-to-medium businesses, EFT Express. EFT Arcus is our cloud implementation. You can also deploy EFT in a hybrid environment (both on premises and in the cloud), and deploy EFT Enterprise on an Amazon EC2 instance (virtual server in the cloud).

In EFT v7.4.7- v8.0.6:

  • EFT SMB is now EFT Express

  • The High Security Module is now the Advanced Security Module in EFT Enterprise and the Express Security Module in EFT Express.

  • The Advanced Authentication module features are now part of the Advanced Security Module.

  • The Cloud Connector module (Requires license in Express) and Content Integrity Control features are now part of EFT Enterprise (in Event Rules), rather than separate modules.

Available Modules (Refer to table below to see which features are available in EFT Express, EFT Enterprise, and EFT Arcus)

  • Accelerate module uses a patented implementation of UDP to accelerate file transfers using EFT Event Rule Actions (Copy/Move and Download). (only available in EFT Enterprise, requires additional license)

  • The Advanced Security Module (ASM) achieves or exceeds security practices mandated by government and industry standards such as PCI DSS, HIPAA, and Sarbanes-Oxley for data transfer, access, and storage. The ASM protects data in transit by enforcing the use of secure protocols, strong ciphers and encryption keys, and maintaining strict password policies, and enables organizations to centralize their user access controls, improve productivity, and increase adherence to security policies, and provides administrators with the ability to easily maintain password security in one location to quickly commission and decommission user provisions in one central location. The ASM also provides SAML (WebSSO), RSA SecurID, RADIUS, and CAC support, which allows EFT Enterprise to fit in seamlessly with existing authentication measures, and the Content Integrity Control Action, which uses profiles that contain the antivirus or DLP server connection information. (only available in EFT Enterprise, requires additional license)

  • Advanced Workflow Engine adds additional automation capabilities, allowing you to add scripting and variables to Workflow Tasks, then add these reusable Workflows to Event Rules. A Workflow is a series of steps that can perform file transfers, batch data processing, application testing, and so on, and are defined to run automatically when started by some event. (only available in EFT Enterprise, requires additional license)

  • AS2 module supports the exchange of structured business data securely on top of the HTTP or HTTP/S protocol. (only available in EFT Enterprise, requires additional license)

  • Auditing and Reporting Module (ARM) captures all of the transactions passing through EFT. You can query the data and create/view reports from within EFT's administration interface. (requires additional license)

  • DMZ Gateway® is used in combination with EFT to create a multi-tier security solution for data storage and retrieval. The DMZ Gateway resides at the edge of the network, brokering data between EFT residing behind your corporate firewall and your clients in the outside world. (requires additional license)

  • Express Security Module (ESM) achieves or exceeds security practices mandated by government and industry standards such as PCI DSS, HIPAA, and Sarbanes-Oxley for data transfer, access, and storage. The ESM protects data in transit by enforcing the use of secure protocols, strong ciphers and encryption keys, and maintaining strict password policies. For a list of features in the ESM, refer to Features of the Express Security Module. (Only available in EFT Express, requires additional license)

  • Cloud Connector Module enables you to transfer files to/from cloud services such as AWS and Azure. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • File Transfer Clientmodule enables you to define Copy/Move and Download actions in Event Rules. For example, you could define a rule to trigger when a file is downloaded, so that EFT moves it to another folder. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • Folder Monitor module creates an Event Rule trigger used to detect the creation, deletion, and renaming of files in a monitored folder and to perform Actions based on these triggers. For example, perhaps a weekly report is uploaded to a specific folder. You can define an Event Rule so that when EFT detects that a file has been added to the folder, an email is sent to notify one or more users that the report is available for download. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • HTTPS module allows you to set up a secure connection to anyone in minutes using any Web browser. The HTTPS module adds the HTTP and HTTPS protocols to EFT, enabling you to support browser-based transfers without having to install a Web server. HTTPS encrypts the session data using the SSL (Secure Socket Layer) protocol, which provides protection from eavesdroppers and man-in-the-middle attacks. The Web Transfer Client (WTC) can deploy automatically upon client connection to EFT and can be used by any trading partner using virtually any Web browser. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • Mobile Transfer Client (MTC) mobile application (app) provides a way for your iOS and Android phone and tablet users to connect securely to EFT to upload and download files while providing a number of centrally managed security controls for safeguarding your corporate data. (Included in EFT Enterprise; requires additional licenses in EFT Express.)

  • OpenPGP safeguards data at rest. The OpenPGP data encryption or decryption process is directed by Event Rules that specify how data files are treated in a particular context. EFT uses OpenPGP to encrypt uploaded data and the off-load capabilities of EFT to move the file to another location. (industry-standard, RFC 4880 compliant)  (requires additional license)

  • Remote Agent module (RAM) provides centralized control for automating transactions from distributed systems. RAM enables automatic interactions between branch offices, point-of-sale terminals, business partners, field agent laptops, or other remote systems and your EFT server residing in a central location. (available in EFT Enterprise, requires additional license)

  • SFTP is a subset of the popular SSH protocol and is a platform independent, secure transfer protocol. SFTP provides a single connection port for easy firewall navigation, password and public key authentication, and strong data encryption, to prevent login, data, and session information from being intercepted and/or modified in transit. The SFTP module enables EFT to authenticate and transfer data securely with SFTP-ready FTP clients, such as CuteFTP®. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • Timer module allows you to execute a specified Action only one time or repeatedly at specified intervals. For example, you could schedule an Action (e.g., generate and send a report) to occur on July 8 at midnight, or every Monday morning, or on the last Friday of every month at 2 a.m. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • Workspaces allows you to share folders and their files with internal and external users. (requires additional license)

  • Web Transfer Client (WTC) can deploy automatically upon client connection to EFT. The WTC can be used by any trading partner using virtually any Web browser. (Included; requires HTTP/S module in EFT Express)

Additional modules/tools:

  • Insight is a web-based dashboard tool that takes data from the Auditing and Reporting module to provide full visibility into the flow of data through your EFT system. Insight facilitates better governance, with the knowledge and depth of information gleaned from business and operational intelligence. Evaluate data trends over time and gain instantaneous knowledge about the current state of your system.

  • Business Activity Monitoring (BAM) is a web-based monitoring tool that gives you real-time visibility into EFT Enterprise transactions.

  • COM API allows you to interact directly with EFT from your own custom applications using any COM-enabled programming language such as Visual Basic (VB), Java, or C++. You can create a script with the development IDE of your choice.

Feature Availability

The table below describes which features are available in EFT Express, Enterprise, and Arcus.

Click here for a PDF of this table.

Feature Express Enterprise Arcus

Protocols

SSL/TLS - secure FTP communications

Included

Included

Included

SSL key manager - manage, import, export, and create SSL certificates

Included

Included

Included

SSL Config - specify ciphers and versions allowed (SSL v2, v3, and TLS v1)

Included

Included

Included

Checkpoint restart - resume interrupted transfers

Included

Included

Included

Compression - inline  compression of ASCII files

Included

Included

Included

Reduce transfer time over poor connections by allowing uploaded files to be split apart and transferred in multiple segments simultaneously (COMB)

Included

Included

Included

Verification - guarantee integrity by comparing checksums

Included

Included

Included

Command blocking - prevent unwanted behavior

Included

Included

Included

S-key OTP - One-time-password scheme for plain-text FTP

Included

Included

Included

PASV port range - facilitate FTP connections behind network firewalls

Included

Included

Included

EBCDIC - Used for communicating with legacy systems

Included

Included

Included

UTF-8 - Transfer Unicode filenames over FTP

Included

Included

Included

Session tools - Real-time session monitoring

Included

Included

Included

Customizable - Modify various FTP banners to suit your specific needs

Included

Included

Included

FIPS - FIPS 140-2 certified SSH cryptographic module

ESM

ASM

Included

Key manager - manage, import, export, and create SSH key pairs

SFTP

Included

Included

Key types - OpenSSH and SSH.COM (SECSH format) supported

SFTP

Included

Included

Authentication - Any combination of password and/or public key

SFTP

Included

Included

Strong ciphers - 256-bit Twofish, 256-bit AES CBC, and 256-bit AES CTR mode

SFTP

Included

Included

Configurable SSH-protoversion-softwareversion - lower attack footprint

SFTP

Included

Included

FIPS - FIPS 140-2 certified SSH cryptographic module

SFTP, ESM

ASM

Included

Customizable landing portal - Login page can be branded

HTTP/S

Included

Included

Form-based auth - sessions are managed securely by the server

HTTP/S

Included

Included

Basic-auth - standard browser authentication (fallback auth mechanism)

HTTP/S

Included

Included

Session management in accordance with OWASP guidelines

HTTP/S

Included

Included

Password reset in accordance with OWASP guidelines

HTTP/S

Included

Included

Lost username retrieval in accordance with OWASP guideline

HTTP/S

Included

Included

SSO - use the Integrated Windows Authentication (IWA) in Internet Explorer

HTTP/S

Included

Included

Accelerate file transfers using EFT Event Rule Actions

N/A

Accelerate module

N/A

HTTP->HTTPS auto-redirect - increased security through implicit redirection of non-secure connections

HTTP/S, ESM

ASM

N/A

HTTP Strict Transport Security (HSTS) - web security policy to protect websites against protocol downgrade attacks and cookie highjacking

HTTP/S

Included

Included

Web client - Optional web client adds a rich set of features compared to script-driven HTTP/S transfers

HTTP/S, WTC

Included

Included

Mobile client - Provides secure, remote access to your EFT files through HTTPS

HTTP/S, MTC

Included

Included

Multi-directional - service inbound and initiate outbound AS2 transactions

N/A

AS2 module

Included

Drummond certified - 3rd-party certified equals superior interoperability.

N/A

AS2 module

Included

Message Level Security (MLS) - certificate-based authentication

N/A

AS2 module

Included

Reliability Profile - AS2 extension that increases interoperability

N/A

AS2 module

Included

Multiple Attachments (MA) Profile - AS2 extension that facilitates multiple concurrent transactions

N/A

AS2 module

Included

Authentication (Access Controls)

Native - (proprietary) authentication (EFT-managed authentication)

Included

Included

Included

Active Directory (AD) authentication

Included

Included

N/A

ODBC - leverage any ODBC data source for user authentication

Included

Included

N/A

NTLM - authenticate local system accounts (Choose "Windows AD Authentication" when creating the Site.)

Included

Included

N/A

LDAP - authenticate against LDAP sources, including AD

N/A

Included

Included

SAML (WebSSO) - user interface controls for enabling and configuring SAML for achieving Single Sign On (SSO) for Web-based authentication; associate the IdP-authenticated users with pre-provisioned accounts; Just In Time (JIT) provisioning to create an account for authenticated users, if they do not already exist in EFT

N/A

ASM

Included

RADIUS - often used as a two-factor authentication source

N/A

RADIUS, ASM

Supported

SMS authentication - two-factor authentication using a mobile device to receive a login code (requires SMS software)

N/A

SMS software, ASM

Supported

RSA SecurID® - 3rd-party access manager that provides two-factor authentication

N/A

RSA server, ASM

Included

CAC - Common Access Card authentication

N/A

ASM

Included

Authorization (Resource Controls)

AD Impersonation - leverage Active Directory ACLs

Included

Included

Not Supported

Permissions - set folder level permissions or inherit from parent

Included

Included

Included

Permission groups - assign users to permission groups or templates

Included

Included

Included

Virtual folders - map virtual to physical folders including network shares

Included

Included

Included

Home folders - designate a home folder and optionally make it the user's root folder

Included

Included

Included

Set limits - number of logins, connections,  file sizes, transfer speeds, disk quotas

Included

Included

Included

Invalid passwords -  controls to auto-lockout, disable, or ban IP

Included

Included

Included

Invalid account names - controls to auto-ban offender IP

Included

Included

Included

DoS detection - controls to temporarily or permanently ban suspect IPs 

Included

Included

Included

IP access rules - full featured IP access rule manager

Included

Included

Included

Banned file types - prevent upload of unwanted file types

Included

Included

Included

Monitor and kick offending users from the server

Included

Included

Included

Password complexity - configure a large number of complexity options

Included

Included

Included

Password reset - user-initiated or on initial login

Included

Included

Included

Password reuse - disallow historical (previously used) passwords

Included

Included

Included

Expire accounts - disable account on a given date

Included

Included

Included

Expire inactive accounts - disable or remove account after N days of inactivity

ESM

ASM

Included

Expire passwords - expire passwords after N days

ESM

ASM

Included

Expiration reminder - email user reminder to change their password

ESM

ASM

Included

Data sanitization - securely clean deleted data using military grade wiping

ESM

ASM

Included

Encrypted folders - EFT built-in, secure-data-at-rest Solution

N/A

Included

Included

EFS - encrypt data at rest using Windows' Streaming repository encryption (EFS)

ESM

ASM

Not Supported

OpenPGP - use OpenPGP to encrypt, sign, and decrypt data

OpenPGP

OpenPGP

Included

PCI DSS monitor - actively monitor and alert on violations

ESM, ARM

ASM, ARM

Included

PCI DSS report - generate a compliance with a single mouse click

ESM, ARM

ASM, ARM

Included

PCI DSS compensating controls (CCs) - capture and report admin-provided CCs

ESM, ARM

ASM, ARM

Included

PCI DSS setup wizard - walkthrough configuration with PCI DSS in mind

ESM, ARM

ASM, ARM

Included

DMZ Gateway - securely proxy transfers through the DMZ

DMZ Gateway®

DMZ Gateway®

N/A

Administration

Silent installation - unattended setup

Included

Included

N/A

Administrator GUI - Windows based Graphical User Interface (GUI)

Included

Included

Included

Remote administration - administer from other systems in the network

Included

Included

Included

Secure remote administration - SSL encrypted administration communications

Included

Included

Included

Multiple administrators - allow concurrent administration

Included

Included

Included

Secure administration - same password complexity options available for admins

Included

Included

Included

Flexible authentication - leverage native, NTLM, or AD to authenticate administrators

ESM

ASM

Only LDAP is supported

Forensics - audit and report on all administrator activity and changes

ESM, ARM

ASM, ARM

Included

COM API - programmatic administration

Limited

Included

N/A

Delegated administration - role based administrator accounts with granular permissions

Server and Site admin only

Included

Server admin not applicable

REST endpoint for querying administrative info and server status

Included

Included

Included

Backup and Restore - one-click backup and easy restore of entire configuration

N/A

Included

N/A

Batch account management - perform actions to multiple accounts simultaneously

N/A

Included

N/A

Auditing and Visibility

Logging - flat file log in W3C and other formats

Included

Included

Included

Monitor inbound transfers in real time

ARM

Included

Included

Audit to SQL - audit transactions to a SQL database

ARM

ARM

Included

View reports - choose from pre-built or build your own

ARM

ARM

Included

Audit to Oracle - audit transactions to an Oracle database

N/A

ARM

Included

Monitor outbound transfers in real time

N/A

Included

Included

Business Activity Monitoring (BAM) - real-time visibility, dashboard, and analytics (Requires ARM)

N/A

BAM

N/A

Automation (Integration with other systems)

React to stimuli - trigger workflows based on file uploads and other server events

Included

Included

Included

Send email to users or administrators as part of a workflow

Included

Included

Included

Execute a process, including scripts, as part of a workflow

Included

Included

Included

Context variables - use transaction values inside of workflows

Included

Included

Included

Hot folders - trigger workflows when files arrive in a monitored folder

Folder Monitor

Included

Included

Schedule events - trigger workflows on a recurring basis

Timer Module

Included

Included

Web Services - trigger workflows using WS calls; Invoke Web Service from URL

N/A

Included

Included

Conditional logic - build fine-grained business logic into workflows

N/A

Included

Included

Clean up - securely clean target folders from within a workflow

N/A

Included

Included

Offload and download - push or pull files to remote servers as part of a workflow

File Transfer Client module

Included

Included

Send pre- and post- commands to mainframe during copy/move actions

N/A

Included

Included

Perform folder and file operations

N/A

Included

Included

Compress/Decompress files

N/A

Included

Included

User Account Action - for things like compliance (e.g., HIPAA, GDPR) requests in which users might ask that an organization remove all traces of their account.

Included

Included

Included

Advanced workflows - tap into the Advanced Workflow Engine to build sophisticated workflows

N/A

AWE

Included

Integration with antivirus and DLP (Data Loss Prevention) tools to permit or prevent transfers based on policies.

N/A

ASM

Included

Integration with cloud (AWS and Azure) storage; Copy, move, and download from cloud storage

Cloud Control Module

Included

Included

Ability to monitor and act upon AWS S3 and Azure blob storage activity

Cloud Control Module

Included

Included

Centralized control for automating transactions from distributed systems (Remote Agents), including provisioning, management and Event Rules

N/A

RAM

Included

Reusable connection profiles for use in Event Rules

N/A

Included

Included

Automatic interactions between branch offices, point-of-sale terminals, business partners, field agent laptops, or other remote systems and your EFT server residing in a central location.

N/A

RAM

Included

Logging for AWS S3 and Azure blog storage to EFT.log

N/A

Included

Included

Person-to-person file transfer

Ad hoc file transfer - secure file transfer available either via Outlook Add-in or web interface

HTTP/S, Workspaces

Workspaces

Included

Two-way file sharing - recipients provided with multiple methods to send files back

HTTP/S, Workspaces

Workspaces

Included

Receipt notification - email notification when files are picked up by the recipient

HTTP/S, Workspaces

Workspaces

Included

Pick-up authentication - recipients can be required to verify their identity before downloading files

HTTP/S, Workspaces

Workspaces

Included

Full file tracking - Users and administrators can view complete history of files sent and received

HTTP/S, Workspaces

Workspaces

Included

Centralized policy controls - administrator can enforce varying levels of required usage policies

HTTP/S, Workspaces

Workspaces

Included

Active directory authentication - authentication internal users using AD

HTTP/S, Workspaces

Workspaces

LDAP

Integration with EFT - monitor all ad hoc  file transfer activity from EFT

HTTP/S, Workspaces

Workspaces

Included

Complete customization - easily customize ad hoc  web interface

HTTP/S, Workspaces

Workspaces

Included

Share  folders/files with others; invite others to share (Workspaces via browser and EFT Outlook Add-In)

HTTP/S, Workspaces

Workspaces

Included

Request files via Workspaces

HTTP/S, Workspaces

Workspaces

Included

Send file in email from Workspaces with Secure Message Body

HTTP/S, Workspaces

Workspaces

Included

Architecture

IPv6 - Full dual stack (IPv4/6 mixed) support

Included

Included

Included

Virtual - Run on virtual machines, e.g. VMware and Hyper-V

Included

Included

N/A

Unicode - UTF-8 encoding of filenames and other fields where applicable

Included

Included

Included

IDN - Internationalized domain name support

Included

Included

Included

I/O Completion Ports - Technology that allows for tremendous performance on Windows systems

Included

Included

Included

Active-passive clustering - Failover for high availability

N/A

Included

N/A

Active-active, high availability (HA) clustering with 3 or more EFT Enterprise licenses

N/A

Included

Included

Supported on Windows Server 2012, 2016, 2019

Included

Logo certified

N/A