FileCatalyst Is Managed
A “managed” system requires mechanisms for controlling file transfers, managing users, and consolidating various data related to the transfers. The ideal system allows such management options remotely. FileCatalyst offers a number of management tools at different levels throughout the application. Let's have a brief look at the most prominent of the FileCatalyst management tools.
Managed File Transfers
For a file transfer to be “managed” you need complete visibility and control over each stage.
Transfer configuration and automation
FileCatalyst HotFolder provides a deep system for automating tasks, ensuring that files are sent according to your specific needs. Filesystem event monitoring allows directories to synchronize as soon as files are added, removed, or modified. The scheduler allows for interval-based tasks. A variety of transfer options such as file type and size filters, compression options, and file delta transfers (in which only the changes in a file are sent) allow complete control over every single task.
FileCatalyst provides assurance of delivery. With robust retry and resume facilities, MD5 checksums, protocol fallbacks and HTTP tunneling, as well as ongoing congestion control, files are stubbornly delivered through the most challenging conditions. You will never need to “babysit” a file transfer again.
Organizations invested in management that relies on custom scripts will find the transition to FileCatalyst a simple one. With its own command-line interface and a number of commands based on FTP, existing scripts are easily migrated to use FileCatalyst in place of FTP or other transfer mechanisms.
FileCatalyst transfers may be set with pre- and post-transfer tasks (executed as system commands) for easy integration with existing workflows. Drop FileCatalyst in place and allow it to manage the file transfer portion of your system.
You want to unify your file transfer process. You want everyone using the same tools, tracked and managed through one central system. But you dread deploying new tools and having to co-ordinate training for employees, partners, and other end-users. You want everybody “on board” with no problems.
Intuitive, configuration-free transfer applets
Using FileCatalyst web applets, there is no additional software to install or configure. Not even a specialized transfer plug-in such as that required by other systems. The applets are so intuitive that training is not typically required. Provide a link and login credentials, and almost any user can instantly use FileCatalyst for file transfer.
Desktop “drop” folders
Use FileCatalyst HotFolder to provide a seamless desktop experience. The end-user drags files in and out of one or more specified folders. New and changed files are automatically exchanged with the FileCatalyst Server.
Any authorized user can create temporary accounts on the system. The system immediately sends an invitation to the new user, giving them instant access. Temp accounts may be automatically expired after a configurable period of time. This feature allows third-party users such as partners, clients, and suppliers to quickly connect and send files, without any administrator interaction.
LDAP and Active Directory support
Already using OpenLDAP or Active Directory? Your transition is even easier. Accounts on your FileCatalyst system are automatically provisioned the first time a user logs in.
Real-time Monitoring and Management
You need access to every aspect of your deployment, from anywhere and at any time. You want to know where your files are, and you want to manage their transfer.
Centralized web-based management
FileCatalyst Central is a web application that provides centralized monitoring and management of your FileCatalyst deployment. In real time, administrators inspect ongoing transfers, stay apprised of alarms and notifications, and browse history reports and activity logs. Launch remote control applets to directly configure and control any connected node, using the same user interface as the full desktop application.
Remote administration applications
Individual users and administrators may also connect to particular nodes from anywhere in the world using FileCatalyst's remote administration tools. Update settings on specific FileCatalyst Server or HotFolder instances, schedule or manage file transfers, and monitor activity.
Monitor file transfers in real time and make on-the-fly changes. Drill into specific transfers to ensure that they complete by a specified time, “As Soon As Possible”, or according to target transfer speeds.
Security and Compliance
Each FileCatalyst product provides tools for a transparent overview of which files were sent, by which user, and to whom. The combination of security features and a transparent audit trail are required for meeting mandates such as SOX, GLBA, and HIPAA.
All transactions may be secured by SSL on the control channel and 256-bit AES on the data channel.
Authentication via OpenLDAP or Active Directory go a step beyond, ensuring that only users under central management are given access. Directory-based authentication may be secured with SSL (LDAPS and ADS). Using the built-in authentication database, credentials may still be passed over HTTPS.
Auditing and Tracking
FileCatalyst provides the ability to track a file transfer through its entire history. Each transfer generates a full set of transactional data, and FileCatalyst web applications store additional metadata.
The administrator may set a policy requiring passwords to be a certain length and contain a specified number of special characters, capital letters, and numeric values. Policies set by LDAP and Active Directory are inherently supported.
Brute-force attack prevention
Such attacks are prevented at the session and user levels. Administrators may configure a specified number of login attempts that are attempted before the session is temporarily invalidated. A user account may also be temporarily locked after a number of failed passwords are sent along with a particular username.
Filter allowed connections by regular expressions (regex) or subnet. Create whitelists (“safe&rdquo) and blacklists (“denied”) for IPs to be filtered, and populate them on the fly as potential threats are identified.