010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova StyleVision Server Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus Nevron Vision for .NET OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Altova StyleVision Sencha Test Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SPC Control Chart Tools for .Net SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Cornerstone Managed File Transfer

Cornerstone Managed File Transfer

Balancing Security and Productivity

 

Your business relies on fast, efficient file transfer. Your business survives by keeping your data secure – while it’s being transferred or when it’s stored on your servers. Cornerstone MFT closes the security gaps in your current file transfer processes while improving efficiency and visibility.

 

Incorporate existing user authentication

Cornerstone simplifies user authentication and permissions management. Integration with existing Active Directory, LDAP or NTSAM enables you to centrally manage user and group permissions, assuring consistent access controls.

 

Scalability and Failover for 24X7 Operations

Global businesses operate in all time zones and work doesn’t stop when your business day ends. Cornerstone offers high-availability, keeping your essential business processes running, even during server upgrades or hardware outages.

 

Never Leave Your Files Exposed

Secure file transfer is critical, but encrypting data while it’s stored on your servers is equally important. Cornerstone is the only MFT solution with real-time PGP encryption of files, encrypting and writing data in a single step, rather than writing an unsecure version of the file and encrypting it in a separate step.

 

Meet Compliance Mandates

Whether it’s internal security policies to protect your business, or government privacy regulations such as HIPAA, SOX or PCI, Cornerstone helps you to execute on your security initiatives. Cornerstone is used by international banks, healthcare services and government agencies where compliance is critical.

 

Native 64-bit implementation

As applications move to a virtual environment, scalability and access to machine resources is key to performance and efficiency. Cornerstone MFT is architected as a native 64-bit application to fully utilize all machine resources.

 

Share Files Securely

Users need to share files without added steps to assure security. Cornerstone offers effortless file sharing that’s secure, compliant and fully managed by IT. Cornerstone provides a simple, secure alternative to unsecure, personal file sharing services that violate security policies and limit IT visibility into file-sharing activities.

 

Security on all fronts

File security is not one-dimensional. Cornerstone offers events for thwarting hackers, instantly banning rogue ip addresses and users or DoS attacks. Complex password policies reduce the risk of password guessing, and FIPS 140-2 grade encryption protects files in transit and at rest.

 

File Transfers

Cornerstone supports a wide variety of file transfer protocols. Regardless of the preferred method of your trading partners, Cornerstone can accommodate without costly add-ons. Included in the solution are SFTP, FTP/S, HTTP/S, WebDAV/S, and AS2. File transfers use FIPS 140-2 certified encryption, guaranteed delivery and industry standard data compression. Cornerstone’s secure file transfers do not rely on operating system security, but incorporate security standards such as TLS and AES.

 

Visibility

Maintaining visibility into your organization’s file transfer activities is critical. Cornerstone logs all system activities, including automated transfers, user and group access to files, and server events. Using the integrated SYSLOG, all log details can be sent to any corporate reporting/management system. Cornerstone also includes a report builder and over 25 pre-defined reports.

 

Rapid User Adoption

User adoption is as important for security as it is for productivity. Cornerstone includes an intuitive user inter- face that allows users to easily upload, download and share files. Enabling effortless file transfers means users stay productive and adoption time is minimal.

 

Users can also access their Cornerstone files through the convenience of a network drive letter using the optional WebDrive client. With WebDrive, users can access, edit and save Cornerstone files as easily as they can edit files on their desktop. Cornerstone is the only MFT solution that offers this productivity-enhancing virtual drive technology.

 

Multiple Deployment Options

Cornerstone is available on-premise, in the cloud or as a hybrid solution. Cornerstone is a complete solution that includes all protocols, events automation, and reporting and PGP encryption. For added protection, Cornerstone can be paired with the optional DMZedge server for perimeter security that doesn’t require copying files into an unsecure DMZ.

 

South River Technologies is an innovator in secure file management software. More than 90,000 customers in 140 countries use SRT’s software to make remote file access and collaboration more efficient for their customers, partners, and workforce.

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved