Feature Availability

NOTE: Please refer to the topic "EFT Arcus Features" in the Globalscape Knowledgebase if you are comparing EFT on-premises to EFT Arcus.

The tables below describe which features are included in EFT on premises, and which are available with the licensing of the modules.

Core Features of EFT

These features are part of EFT, but you still need to activate an EFT license after the trial has ended. Use of certain core features will require an additional module (such as HTTP/S, SFTP, or FTPS) or external tools (such as connection to an LDAP or ICAP server). Refer to the feature tables under Features by Category for details.

Active-Active clustering (HA)

Active-passive clustering (Failover for high availability)

Administrative console

Admin roles and permissions

Audit performance counters to Windows Perfmon

Auditing to text file

Auditing internal metrics to local database

Backup and restore wizard

Ban file types by extension

Batch management of users

Built-in, NTLM, AD, and LDAP auth (including AD admin auth)

COM API

Connection Profiles (requires HTTP/S, SFTP, or FTPS to connect as the server)

Content Integrity Control (CIC)

Delegated administration

Denial of server and flood protection

Else conditional logic in rules

Encrypted folders (secure data at rest)

Expire inactive accounts (including admin accounts)

Expire passwords after N days (including admin accounts)

Expiration reminder

FIPS 140-2-certified crypto (requires SSL/TLS or SFTP)

FTP plain (FTPS requires FTPS module)

IP white/black listing

Mobile file transfer

Override VFS credentials

Password complexity

Performance counters

REST-based administration

Reusable connection profiles

Run command-line scripts

SSL client cert auth (full functionality available only when HTTP/S or FTPs module is registered)

Triggers based on incoming (uploaded) files

Virtual folders mapped to shares

Windows EFS encryption

Event Rule Actions:

  • File scan for DLP/AV, ICAP/CIC

  • Flow: Stop Processing

  • Flow: Variable

  • Protocol: Email

  • System: Backup

  • System: Cleanup

  • User: Action

  • Windows: Event Log

Event Rules:

  • "IF" conditional for triggers

  • Create a change log for rules

  • "Else" conditional for triggers

  • Event Rule import/export

  • Group triggers into folders (Event Rule Folders)

  • Securable objects (Event Rule Permissions)

  • Connection Events (all)

  • File Server Events (all)

  • Server Events (all)

  • Site Events (all)

  • User Events (all)

Features by Category

These acronyms for the modules are used in the tables below:

AAMM = Advanced Authentication Modes Module

ARM = Auditing and Reporting Module

AS2 = AS2 protocol module

AWM = Automate Workflow Module

BAM = Business Activity Monitoring

CCM = Cloud Connector Module

DMZ = DMZ Gateway

EAM = Enterprise Actions Module

FMM = Folder Monitor Module

FTC = File Transfer Client

FTPS = FTPS module

HTTP/S = HTTP/S module

PGP = PGP Module

RAM = Remote Agent Module

RCM = Regulatory Compliance Module

SFM = Secure Forms Module

SFTP = SFTP module

TEM = Timer Event Module

WSM = Workspaces

Protocols

Feature Core or module

FTP protocol (RFC 959)

Core

FTP extensions (multi-part, resume, parallel threads, file integrity checking, custom commands, S-Key, PASV port range, UTF-8, customizable banner, command blocking, EBCDIC mode, PASV port range controls)

Core

SSL/TLS 1.2 – for secure communications

Core

SSL certificate management

Core

SSL client certificate authentication Core

SSL control over ciphers, algorithms, and protocols

Core

Real-time session monitoring

Core

SFTP protocol

SFTP

SFTP advanced options (multiple auth methods)

SFTP

SFTP key management

SFTP

SFTP control over ciphers, algorithms, and protocols

SFTP

FIPS 140-2 certified cryptographic module (Requires SFTP or HTTP/S to function properly)

Core

HTTP/S protocol

HTTP/S

HTTP/S extensions (various auths including IWA/SSO, configurable headers, compliance with OWASP security guidelines, HSTS support, many other headers,)

HTTP/S

Web client – Built-in web client adds a rich set of features compared to script-driven HTTP/S transfers

HTTP/S

HTTP to HTTP/S auto-redirect

HTTP/S

Customizable HTTP error messages HTTP/S

Mobile access via native mobile transfer client ) – For iOS and Android

HTTP/S

AS2 protocol

HTTP/S & AS2 module

AS2 extensions (Message Level Security (MLS), Reliability Profile, Multiple Attachments (MA) profile.

HTTP/S & AS2 module

Authentication (Access Controls)

Feature Core or module

EFT-managed accounts (i.e., "built-in authentication, or Globalscape authentication)

Core

Active Directory (AD) – native Windows integration, including admin accounts)

(In EFT Arcus, "AD impersonation" is available, but not authentication.)

Core

ODBC - leverage any ODBC data source

Core

LDAP - authenticate against LDAP sources, including AD

Core

SAML (WebSSO) - including Just In Time (JIT) provisioning

AAMM

RADIUS - often used as a two-factor authentication source

AAMM

RSA SecurID® (native and Steel-Belted Radius (SBR))

AAMM

CAC - Common Access Card authentication

AAMM
Secrets module CCM

SMS authentication - two-factor authentication (2FA) for WTC and Workspaces

HTTP/S, WSM

Authorization (Resource Controls)

Feature Core or module

AD Impersonation - Active Directory manages permissions

Core

AD-based administration accounts Core

EFT managed folder permissions

Core

Role-based administrator accounts with granular permissions (Delegated administration)

Core

Permission groups – templatize sets of permissions

Core

Virtual folders - map virtual to physical folders including network shares

Core

Home folders - designate a home folder and optionally make it the user's root folder

Core

Set limits - number of logins, connections,  file sizes, transfer speeds, disk quotas

Core

DoS/flood detection algorithms and auto-IP ban logic

Core

IP access rules - full featured IP access rule manager (whitelisting/blacklisting)

Core

Ban file types by extension - prevent upload of unwanted file types

Core

Monitor and kick offending users from the server

Core

Invalid account names - controls to auto-ban offender IP

Core

Invalid passwords -  controls to auto-lockout, disable, or ban IP

Core

Password complexity - configure a number of password complexity options

Core

Password reset - user-initiated or on initial login

Core

Password reuse - disallow historical (previously used) passwords

Core

Expire accounts - disable account on a given date

Core
Expire inactive accounts - disable or remove account after N days of inactivity Core
Expire passwords - expire passwords after N days Core
Expiration reminder - email user reminder to change their password Core
Data sanitization - securely clean deleted data using military grade wiping RCM

Encrypted folders - EFT built-in, secure-data-at-rest Solution

Core

EFS - encrypt data at rest using Windows' Streaming repository encryption (EFS)

Core
Override VFS credentials Core

OpenPGP - use OpenPGP to encrypt, sign, and decrypt data

OpenPGP

PCI DSS - Site settings to facilitate PCI DSS and other compliance mandates

RCM

DMZ Gateway®- securely proxy transfers through the DMZ

DMZ Gateway®

Administration

Feature Core or module

Silent installation - unattended setup

Core

Administrator GUI - Windows based Graphical User Interface (GUI)

Core

Remote administration - administrate from other systems in the network

Core

Secure remote administration - SSL encrypted administration communications

Core

Multiple administrators - allow concurrent administration

Core

Secure administration - same password complexity options available for administrators as for users

Core

Flexible authentication - leverage native, NTLM, or AD to authenticate administrators

Core

Forensics - audit and report on all administrator activity and changes

ARM

COM API - programmatic administration

Core

REST endpoint for querying administrative info and server status

Core

Backup and Restore - one-click backup and easy restore of entire configuration
(Scheduled backups requires the TEM)

Core

Batch account management - perform actions to multiple accounts simultaneously (such as multi-select users to reset their passwords)

Core

Specify personal data and privacy settings on a Site and per user

RCM

Generate GDPR DPIA report

ARM, RCM

Auditing and Visibility

Feature Core or module

Logging - flat (text) file log in W3C and other formats

Core

Monitor transfers in real time

ARM

View historical transfers in the administration interface

ARM
Audit Performance counters to Windows Perfmon Core
Audit internal metrics to local database Core

Audit to SQL - audit transactions to a SQL database

ARM

View reports (predefined)

ARM

Create custom reports

ARM

Audit to Oracle - audit transactions to an Oracle database

ARM

Business Activity Monitoring (BAM) - real-time visibility, dashboard, and analytics (Requires ARM)

BAM, ARM

Automation (Integration with Other Systems)

Feature Core or module
Event Rules change log Core
Group Event Rules into folders Core

React to stimuli - trigger workflows based on file uploads and other server events

Core

Send email to users or administrators as part of a workflow

Core
"Stop processing if failed" action Core
"If" and "Else" Conditions in Event Rules Core
Connection Events Core
Import/Export Event Rules Core

Context variables - use transaction values inside of workflows

Core

Conditional logic - build fine-grained business logic into workflows

Core
Backup Action - Back up files (Scheduled backups requires the TEM) Core

Cleanup Action - securely remove old files based on your organization’s data retention policies
(Scheduled cleanup requires the TEM)

Core

Upload and download - push or pull files to remote servers as part of a workflow

FTC

User Account Action - for tasks like re-enabling user accounts and compliance requests (for example, HIPAA, GDPR) in which users might ask that an organization remove all traces of their account.

Core
Windows Event Log Action Core

Create reusable connection profiles for use in Event Rules

Core

Integration with antivirus and DLP (Data Loss Prevention) tools to permit or prevent transfers based on policies.

NOTE:

  • Content Integrity Control is used in event rules to send a file to an external antivirus scanner or data loss prevention solution for processing.
  • Customer must install an antivirus/ data loss prevention solution. Any third-party content inspection product that supports ICAP can communicate with the Content Integrity Control in EFT.
  • EFT Arcus has built-in Windows Defender antivirus protection at the OS level.
Core
File Server Events Core
Server Events Core
Site Events Core
User Events Core
Operating System Events FMM, TEM
Cloud-Based Events CCM
Workspace Events WSM, HTTP/S
Secure File Send Events WSM, HTTP/S
AS2 Events AS2
Subroutine Event EAM

Send pre- and post- commands to mainframe during copy/move actions

FTC

Perform folder and file operations

EAM

Event Rule invoke over WS/SOAP (uses HTTP/S port) EAM, HTTP/S

Web Services - trigger workflows using Web Service calls; Invoke Web Service from URL

CCM

Execute a process, including scripts, as part of a workflow

EAM

Folder monitor - trigger workflows immediately after files arrive in a monitored folder

FMM

Schedule events - trigger workflows on a recurring basis

TEM

Compress/Decompress files

EAM

Advanced workflows - tap into the Advanced Workflow module to build sophisticated workflows

AWM

Integration with cloud (AWS and Azure) storage; Copy, move, and download from cloud storage

CCM

Ability to monitor and act upon AWS S3 and Azure blob storage activity

CCM

Centralized control for automating transactions originating from distributed systems (Remote Agents), including provisioning, management and Event Rules

RAM

Run PowerShell scripts in Event Rules

EAM

Move tabular data between programs using the Protocol: listing to Dataset Action, Get/Loop from Host, and Import/Export to/from Dataset.

EAM

Person-to-Person (P2P) File Transfer

Feature Core or module

Ad hoc file transfer – Allow authorized users to share files or folders with guest users via Outlook or using the EFT web interface, for secure P2P file exchange

HTTP/S, WSM

Two-way file sharing - recipients provided with multiple methods to securely send files to each other

HTTP/S, WSM

Receipt notification - email notification when files are picked up by the recipient

HTTP/S, WSM

Pick-up authentication - recipients can be required to verify their identity before downloading files

HTTP/S, WSM

Full file tracking - Users and administrators can view complete history of files sent and received

HTTP/S, WSM

Centralized policy controls - administrator can set defaults and mandate policies or let authorized users decide

HTTP/S, WSM

Mixed mode authentication - optionally authenticate internal employees against AD, while maintaining guest isolation

HTTP/S, WSM

Integration with EFT - monitor all ad hoc file transfer activity from EFT

HTTP/S, WSM

Request files – Authorized users can generate a request link that guests follow to securely upload files.

HTTP/S, WSM

Drop-off files to internal users with no attachment limits

HTTP/S, WSM

Manage personal data and privacy settings for GDPR and other privacy rules in the Workspaces client

HTTP/S, WSM, RCM

Multifactor authentication via email or SMS for client logins

HTTP/S, WSM

Gather metadata for uploads in the client via upload forms

HTTP/S, WSM, SFM

View sent and received messages history in client

HTTP/S, WSM

Architecture

Feature Core or module

IPv6 - Full dual stack (IPv4/6 mixed) support

Core

Virtual - Install on virtual machines, e.g. VMware and Hyper-V

Core

Unicode - UTF-8 encoding of filenames and other fields where applicable

Core

IDN - Internationalized domain name support

Core

I/O Completion Ports - Technology that allows for fast performance on Windows systems

Core

Active-passive clustering - Failover for high availability

Core

Active-active, high availability (HA) clustering with two or more EFT servers

Core