Feature Availability
The tables below describe which features are included in EFT on premises, and which are available with the licensing of the modules.
Core Features of EFT
These features are part of EFT, but you still need to activate an EFT license after the trial has ended. Use of certain core features will require an additional module (such as HTTP/S, SFTP, or FTPS) or external tools (such as connection to an LDAP or ICAP server). Refer to the feature tables under Features by Category for details.
Active-Active clustering (HA) |
Active-passive clustering (Failover for high availability) |
Administrative console |
Admin roles and permissions |
Audit performance counters to Windows Perfmon |
Auditing to text file |
Auditing internal metrics to local database |
Backup and restore wizard |
Ban file types by extension |
Batch management of users |
Built-in, NTLM, AD, and LDAP auth (including AD admin auth) |
COM API |
Connection Profiles (requires HTTP/S, SFTP, or FTPS to connect as the server) |
Content Integrity Control (CIC) |
Delegated administration |
Denial of server and flood protection |
Else conditional logic in rules |
Encrypted folders (secure data at rest) |
Expire inactive accounts (including admin accounts) |
Expire passwords after N days (including admin accounts) |
Expiration reminder |
FIPS 140-2-certified crypto (requires SSL/TLS or SFTP) |
FTP plain (FTPS requires FTPS module) |
IP white/black listing |
Mobile file transfer |
Override VFS credentials |
Password complexity |
Performance counters |
REST-based administration |
Reusable connection profiles |
Run command-line scripts |
SSL client cert auth (full functionality available only when HTTP/S or FTPs module is registered) |
Triggers based on incoming (uploaded) files |
Virtual folders mapped to shares |
Windows EFS encryption |
Event Rule Actions:
|
Event Rules:
|
Features by Category
These acronyms for the modules are used in the tables below:
AAMM = Advanced Authentication Modes Module ARM = Auditing and Reporting Module AS2 = AS2 protocol module AWM = Automate Workflow Module BAM = Business Activity Monitoring CCM = Cloud Connector Module DMZ = DMZ Gateway EAM = Enterprise Actions Module FMM = Folder Monitor Module FTC = File Transfer Client |
FTPS = FTPS module HTTP/S = HTTP/S module PGP = PGP Module RAM = Remote Agent Module RCM = Regulatory Compliance Module SFM = Secure Forms Module SFTP = SFTP module TEM = Timer Event Module WSM = Workspaces |
Protocols
Feature | Core or module |
---|---|
FTP protocol (RFC 959) |
Core |
FTP extensions (multi-part, resume, parallel threads, file integrity checking, custom commands, S-Key, PASV port range, UTF-8, customizable banner, command blocking, EBCDIC mode, PASV port range controls) |
Core |
SSL/TLS 1.2 – for secure communications |
Core |
SSL certificate management |
Core |
SSL client certificate authentication | Core |
SSL control over ciphers, algorithms, and protocols |
Core |
Real-time session monitoring |
Core |
SFTP protocol |
SFTP |
SFTP advanced options (multiple auth methods) |
SFTP |
SFTP key management |
SFTP |
SFTP control over ciphers, algorithms, and protocols |
SFTP |
FIPS 140-2 certified cryptographic module (Requires SFTP or HTTP/S to function properly) |
Core |
HTTP/S protocol |
HTTP/S |
HTTP/S extensions (various auths including IWA/SSO, configurable headers, compliance with OWASP security guidelines, HSTS support, many other headers,) |
HTTP/S |
Web client – Built-in web client adds a rich set of features compared to script-driven HTTP/S transfers |
HTTP/S |
HTTP to HTTP/S auto-redirect |
HTTP/S |
Customizable HTTP error messages | HTTP/S |
Mobile access via native mobile transfer client ) – For iOS and Android |
HTTP/S |
AS2 protocol |
HTTP/S & AS2 module |
AS2 extensions (Message Level Security (MLS), Reliability Profile, Multiple Attachments (MA) profile. |
HTTP/S & AS2 module |
Authentication (Access Controls)
Feature | Core or module |
---|---|
EFT-managed accounts (i.e., "built-in authentication, or Globalscape authentication) |
Core |
Active Directory (AD) – native Windows integration, including admin accounts) (In EFT Arcus, "AD impersonation" is available, but not authentication.) |
Core |
ODBC - leverage any ODBC data source |
Core |
LDAP - authenticate against LDAP sources, including AD |
Core |
SAML (WebSSO) - including Just In Time (JIT) provisioning |
AAMM |
RADIUS - often used as a two-factor authentication source |
AAMM |
RSA SecurID® (native and Steel-Belted Radius (SBR)) |
AAMM |
CAC - Common Access Card authentication |
AAMM |
Secrets module | CCM |
SMS authentication - two-factor authentication (2FA) for WTC and Workspaces |
HTTP/S, WSM |
Authorization (Resource Controls)
Feature | Core or module |
---|---|
AD Impersonation - Active Directory manages permissions |
Core |
AD-based administration accounts | Core |
EFT managed folder permissions |
Core |
Role-based administrator accounts with granular permissions (Delegated administration) |
Core |
Permission groups – templatize sets of permissions |
Core |
Virtual folders - map virtual to physical folders including network shares |
Core |
Home folders - designate a home folder and optionally make it the user's root folder |
Core |
Set limits - number of logins, connections, file sizes, transfer speeds, disk quotas |
Core |
DoS/flood detection algorithms and auto-IP ban logic |
Core |
IP access rules - full featured IP access rule manager (whitelisting/blacklisting) |
Core |
Ban file types by extension - prevent upload of unwanted file types |
Core |
Monitor and kick offending users from the server |
Core |
Invalid account names - controls to auto-ban offender IP |
Core |
Invalid passwords - controls to auto-lockout, disable, or ban IP |
Core |
Password complexity - configure a number of password complexity options |
Core |
Password reset - user-initiated or on initial login |
Core |
Password reuse - disallow historical (previously used) passwords |
Core |
Expire accounts - disable account on a given date |
Core |
Expire inactive accounts - disable or remove account after N days of inactivity | Core |
Expire passwords - expire passwords after N days | Core |
Expiration reminder - email user reminder to change their password | Core |
Data sanitization - securely clean deleted data using military grade wiping | RCM |
Encrypted folders - EFT built-in, secure-data-at-rest Solution |
Core |
EFS - encrypt data at rest using Windows' Streaming repository encryption (EFS) |
Core |
Override VFS credentials | Core |
OpenPGP - use OpenPGP to encrypt, sign, and decrypt data |
OpenPGP |
PCI DSS - Site settings to facilitate PCI DSS and other compliance mandates |
RCM |
DMZ Gateway®- securely proxy transfers through the DMZ |
DMZ Gateway® |
Administration
Feature | Core or module |
---|---|
Core | |
Administrator GUI - Windows based Graphical User Interface (GUI) |
Core |
Remote administration - administrate from other systems in the network |
Core |
Secure remote administration - SSL encrypted administration communications |
Core |
Multiple administrators - allow concurrent administration |
Core |
Secure administration - same password complexity options available for administrators as for users |
Core |
Flexible authentication - leverage native, NTLM, or AD to authenticate administrators |
Core |
Forensics - audit and report on all administrator activity and changes |
ARM |
COM API - programmatic administration |
Core |
REST endpoint for querying administrative info and server status |
Core |
Backup
and Restore - one-click backup and easy restore of entire
configuration |
Core |
Batch account management - perform actions to multiple accounts simultaneously (such as multi-select users to reset their passwords) |
Core |
Specify personal data and privacy settings on a Site and per user |
RCM |
Generate GDPR DPIA report |
ARM, RCM |
Auditing and Visibility
Feature | Core or module |
---|---|
Logging - flat (text) file log in W3C and other formats |
Core |
Monitor transfers in real time |
ARM |
View historical transfers in the administration interface |
ARM |
Audit Performance counters to Windows Perfmon | Core |
Audit internal metrics to local database | Core |
Audit to SQL - audit transactions to a SQL database |
ARM |
View reports (predefined) |
ARM |
Create custom reports |
ARM |
Audit to Oracle - audit transactions to an Oracle database |
ARM |
Business Activity Monitoring (BAM) - real-time visibility, dashboard, and analytics (Requires ARM) |
BAM, ARM |
Automation (Integration with Other Systems)
Feature | Core or module |
---|---|
Event Rules change log | Core |
Group Event Rules into folders | Core |
React to stimuli - trigger workflows based on file uploads and other server events |
Core |
Send email to users or administrators as part of a workflow |
Core |
"Stop processing if failed" action | Core |
"If" and "Else" Conditions in Event Rules | Core |
Connection Events | Core |
Import/Export Event Rules | Core |
Context variables - use transaction values inside of workflows |
Core |
Conditional logic - build fine-grained business logic into workflows |
Core |
Backup Action - Back up files (Scheduled backups requires the TEM) | Core |
Cleanup
Action - securely remove old files based on your organization’s
data retention policies |
Core |
Upload and download - push or pull files to remote servers as part of a workflow |
FTC |
User Account Action - for tasks like re-enabling user accounts and compliance requests (for example, HIPAA, GDPR) in which users might ask that an organization remove all traces of their account. |
Core |
Windows Event Log Action | Core |
Create reusable connection profiles for use in Event Rules |
Core |
Integration with antivirus and DLP (Data Loss Prevention) tools to permit or prevent transfers based on policies. NOTE:
|
Core |
File Server Events | Core |
Server Events | Core |
Site Events | Core |
User Events | Core |
Operating System Events | FMM, TEM |
Cloud-Based Events | CCM |
Workspace Events | WSM, HTTP/S |
Secure File Send Events | WSM, HTTP/S |
AS2 Events | AS2 |
Subroutine Event | EAM |
Send pre- and post- commands to mainframe during copy/move actions |
FTC |
EAM |
|
Event Rule invoke over WS/SOAP (uses HTTP/S port) | EAM, HTTP/S |
Web Services - trigger workflows using Web Service calls; Invoke Web Service from URL |
CCM |
Execute a process, including scripts, as part of a workflow |
EAM |
Folder monitor - trigger workflows immediately after files arrive in a monitored folder |
FMM |
Schedule events - trigger workflows on a recurring basis |
TEM |
Compress/Decompress files |
EAM |
Advanced workflows - tap into the Advanced Workflow module to build sophisticated workflows |
AWM |
Integration with cloud (AWS and Azure) storage; Copy, move, and download from cloud storage |
CCM |
Ability to monitor and act upon AWS S3 and Azure blob storage activity |
CCM |
Centralized control for automating transactions originating from distributed systems (Remote Agents), including provisioning, management and Event Rules |
RAM |
Run PowerShell scripts in Event Rules |
EAM |
Move tabular data between programs using the Protocol: listing to Dataset Action, Get/Loop from Host, and Import/Export to/from Dataset. |
EAM |
Person-to-Person (P2P) File Transfer
Feature | Core or module |
---|---|
Ad hoc file transfer – Allow authorized users to share files or folders with guest users via Outlook or using the EFT web interface, for secure P2P file exchange |
HTTP/S, WSM |
Two-way file sharing - recipients provided with multiple methods to securely send files to each other |
HTTP/S, WSM |
Receipt notification - email notification when files are picked up by the recipient |
HTTP/S, WSM |
Pick-up authentication - recipients can be required to verify their identity before downloading files |
HTTP/S, WSM |
Full file tracking - Users and administrators can view complete history of files sent and received |
HTTP/S, WSM |
Centralized policy controls - administrator can set defaults and mandate policies or let authorized users decide |
HTTP/S, WSM |
Mixed mode authentication - optionally authenticate internal employees against AD, while maintaining guest isolation |
HTTP/S, WSM |
Integration with EFT - monitor all ad hoc file transfer activity from EFT |
HTTP/S, WSM |
Request files – Authorized users can generate a request link that guests follow to securely upload files. |
HTTP/S, WSM |
Drop-off files to internal users with no attachment limits |
HTTP/S, WSM |
Manage personal data and privacy settings for GDPR and other privacy rules in the Workspaces client |
HTTP/S, WSM, RCM |
Multifactor authentication via email or SMS for client logins |
HTTP/S, WSM |
Gather metadata for uploads in the client via upload forms |
HTTP/S, WSM, SFM |
HTTP/S, WSM |
Architecture
Feature | Core or module |
---|---|
IPv6 - Full dual stack (IPv4/6 mixed) support |
Core |
Virtual - Install on virtual machines, e.g. VMware and Hyper-V |
Core |
Unicode - UTF-8 encoding of filenames and other fields where applicable |
Core |
IDN - Internationalized domain name support |
Core |
I/O Completion Ports - Technology that allows for fast performance on Windows systems |
Core |
Active-passive clustering - Failover for high availability |
Core |
Active-active, high availability (HA) clustering with two or more EFT servers |
Core |