Introduction to EFT Managed File Transfer

More than just a managed file transfer (MFT) solution, Globalscape's Enhanced File Transfer (EFT) extends beyond standard MFT to allow you to connect with any industry-standard file-transfer client. With powerful security for meeting business and regulatory requirements, EFT ensures that encrypted transactions occur only with the appropriate entities, and that data confidentiality and integrity are preserved during transport and storage. EFT modular form makes it affordable by allowing you to purchase just the functionality you need, and add advanced features as your business needs change. That is, all module features are available during the trial.

EFT managed file transfer is available for the large enterprise, EFT Enterprise, and for small-to-medium businesses, EFT Express. EFT Arcus is our cloud implementation. You can also deploy EFT in a hybrid environment (both on premises and in the cloud), and deploy EFT Enterprise on an Amazon EC2 instance (virtual server in the cloud).

Refer to the Feature Availability table to compare features available in EFT Express, EFT Enterprise, and EFT Arcus.

Available Modules

  • The Advanced Security Module (ASM) achieves or exceeds security practices mandated by government and industry standards such as PCI DSS, HIPAA, and Sarbanes-Oxley for data transfer, access, and storage. The ASM protects data in transit by enforcing the use of secure protocols, strong ciphers and encryption keys, and maintaining strict password policies, and enables organizations to centralize their user access controls, improve productivity, and increase adherence to security policies, and provides administrators with the ability to easily maintain password security in one location to quickly commission and decommission user provisions in one central location. The ASM also provides SAML (WebSSO), RSA SecurID, RADIUS, and CAC support, which allows EFT Enterprise to fit in seamlessly with existing authentication measures, and the Content Integrity Control Action, which uses profiles that contain the antivirus or DLP server connection information. (ASM only available in EFT Enterprise, requires additional license)

  • Advanced Workflow Engine adds additional automation capabilities, allowing you to add scripting and variables to Workflow Tasks, then add these reusable Workflows to Event Rules. A Workflow is a series of steps that can perform file transfers, batch data processing, application testing, and so on, and are defined to run automatically when started by some event. (AWE only available in EFT Enterprise, requires additional license)

  • AS2 module supports the exchange of structured business data securely on top of the HTTP or HTTP/S protocol. (only available in EFT Enterprise, requires additional license)

  • Auditing and Reporting Module (ARM) captures all of the transactions passing through EFT. You can query the data and create/view reports from within EFT's administration interface. (requires additional license)

  • DMZ Gateway® is used in combination with EFT to create a multi-tier security solution for data storage and retrieval. The DMZ Gateway resides at the edge of the network, brokering data between EFT residing behind your corporate firewall and your clients in the outside world. (requires additional license)

  • Express Security Module (ESM) achieves or exceeds security practices mandated by government and industry standards such as PCI DSS, HIPAA, and Sarbanes-Oxley for data transfer, access, and storage. The ESM protects data in transit by enforcing the use of secure protocols, strong ciphers and encryption keys, and maintaining strict password policies. (Only available in EFT Express, requires additional license)

  • Cloud Connector Module enables you to transfer files to/from cloud services such as AWS and Azure. (Cloud Connector is included in EFT Enterprise; requires additional license in EFT Express.)

  • File Transfer Client enables you to define copy, move, and download actions in Event Rules. For example, you could define a rule to trigger when a file is downloaded, so that EFT moves it to another folder. (FTC is included in EFT Enterprise; requires additional license in EFT Express.)

  • Folder Monitor module creates an Event Rule trigger used to detect the creation, deletion, and renaming of files in a monitored folder and to perform Actions based on these triggers. For example, perhaps a weekly report is uploaded to a specific folder. You can define an Event Rule so that when EFT detects that a file has been added to the folder, an email is sent to notify one or more users that the report is available for download. (Folder Monitor is included in EFT Enterprise; requires additional license in EFT Express.)

  • HTTPS module allows you to set up a secure connection to anyone in minutes using any Web browser. The HTTPS module adds the HTTP and HTTPS protocols to EFT, enabling you to support browser-based transfers without having to install a Web server. HTTPS encrypts the session data using the SSL (Secure Socket Layer) protocol, which provides protection from eavesdroppers and man-in-the-middle attacks. The Web Transfer Client (WTC) can deploy automatically upon client connection to EFT and can be used by any trading partner using virtually any Web browser. (HTTPS is included in EFT Enterprise; requires additional license in EFT Express.)

  • Mobile Transfer Client (MTC) mobile application (app) provides a way for your iOS and Android phone and tablet users to connect securely to EFT to upload and download files while providing a number of centrally managed security controls for safeguarding your corporate data. (Included in EFT Enterprise; requires additional licenses in EFT Express.)

  • OpenPGP safeguards data at rest. The OpenPGP data encryption or decryption process is directed by Event Rules that specify how data files are treated in a particular context. EFT uses OpenPGP to encrypt uploaded data and the off-load capabilities of EFT to move the file to another location. (industry-standard, RFC 4880 compliant)  (requires additional license)

  • Remote Agent module (RAM) provides centralized control for automating transactions from distributed systems. RAM enables automatic interactions between branch offices, point-of-sale terminals, business partners, field agent laptops, or other remote systems and your EFT server residing in a central location. (available in EFT Enterprise, requires additional license)

  • SFTP is a subset of the popular SSH protocol and is a platform independent, secure transfer protocol. SFTP provides a single connection port for easy firewall navigation, password and public key authentication, and strong data encryption, to prevent login, data, and session information from being intercepted and/or modified in transit. The SFTP module enables EFT to authenticate and transfer data securely with SFTP-ready FTP clients, such as CuteFTP®. (SFTP is included in EFT Enterprise; requires additional license in EFT Express.)
  • Timer module allows you to execute a specified Action only one time or repeatedly at specified intervals. For example, you could schedule an Action (for example, generate and send a report) to occur on July 8 at midnight, or every Monday morning, or on the last Friday of every month at 2 a.m. (Included in EFT Enterprise; requires additional license in EFT Express.)

  • Workspaces allows you to share folders and their files with internal and external users. (requires additional license)

  • Web Transfer Client (WTC) can deploy automatically upon client connection to EFT. The WTC can be used by any trading partner using virtually any Web browser. (Included; requires HTTP/S module in EFT Express)

Additional tools:

  • Accelerate module uses a patented implementation of UDP to accelerate file transfers using EFT Event Rule Actions (Copy/Move and Download). (Requires additional license; not offered in v8.0.6 and later.)

  • Insight is a web-based dashboard tool that takes data from the Auditing and Reporting module to provide full visibility into the flow of data through your EFT system. Insight facilitates better governance, with the knowledge and depth of information gleaned from business and operational intelligence. Evaluate data trends over time and gain instantaneous knowledge about the current state of your system.

  • Business Activity Monitoring (BAM) is a web-based monitoring tool that gives you real-time visibility into EFT transactions.

  • COM API allows you to interact directly with EFT from your own custom applications using any COM-enabled programming language such as Visual Basic (VB), Java, or C++. You can create a script with the development IDE of your choice.