Cornerstone MFT
Enterprise MFT Server Solution with high availability and failover to eliminate downtime. Advanced automation for improved productivity, SFTP Server for file transfers, and security that exceeds industry standards.
SECURITY
Take advantage of advanced encryption methods, secure protocols, and perimeter security.
SRT supports the latest NSA-approved security standards, so you never have to wait for your MFT vendor to catch up.
Cornerstone offers the most complete security and data protection of any managed file transfer solution. Multi-layer security features keep your data safe at every point in your workflows and compliant with strict regulatory measures.
Security from the Outside
The DMZedge module offers an additional level of security from the outside, detecting and denying server access to any unauthorized users. DMZedge enables you to close inbound ports in your firewall, reducing the risk of network intrusion and enabling the highest level of security for both data storage and transfers.
Your Files are ALWAYS Encrypted
Other MFT solutions allow stored data to be exposed for thousands of processor cycles before it’s encrypted. Cornerstone’s streaming disk encryption module assures that unencrypted versions of your files are never written to disk. Your data is secure at ALL times.
Streaming disk encryption encrypts and writes files as one action. Unencrypted copies are never written to the server, so your data is never exposed — even for a microsecond. When files are requested by users or sent through automated transfers, the decryption process happens automatically. Users don’t go through the cumbersome process of managing encryption keys and decrypting data. The real-time processing makes securing data-at-rest effortless for your end users.
Ransomware Protection
Add WebDrive as the file transfer client in your Cornerstone solution and protect users from ransomware with WebDrive’s Advanced Endpoint Protection feature. This allows you to choose which programs are allowed to open files and ban those that are not, greatly reducing the risk of malware insertion.
WebDrive maps a drive letter to Cornerstone, so users can get to their files easily and without learning a new interface. Users can access Cornerstone files the same way they access files on their desktop. WebDrive reduces the burden of user training and simplifies tech support.
WebDrive also offers two-factor authentication using SafeNet keys.
HIGH AVAILABILITY
Eliminate downtime with failover and load-balancing capabilities.
Load balancing and failover with strong security.
Architecture Built for Protection
Architecture Built for Performance
Skillful Professional Services
Most Cost-Effective HA Solution
International banks, hospitals, and financial institutions rely on Cornerstone for 24/7 operations. Cornerstone’s architecture provides robust fail-over capability, load-balancing for peak processing times, and fast disaster recovery capability.
SECURE COLLABORATION
Bi-directional file sharing and collaboration from every application improves productivity.
Collaborate with customers, partners, and colleagues – without creating security risks
The pace of business requires employees to constantly interact and exchange information. While this fosters unprecedented productivity, it can also come at the expense of security. As users around the country or world interface with your data, there are more opportunities for security risks.
Consumer-focused collaboration services often require syncing data to the local machine. This presents a security risk and wastes local disk resources. Security issues are further complicated by weak access controls and holes in encryption processes. Cornerstone enables sharing and collaboration without locally syncing files. Secure protocols protect transmission of shared files, and controls assure that unauthorized users are never able to gain access to files. Streaming encryption protects data at rest without leaving gaps in security.
Cornerstone’s strong security doesn’t inhibit your users’ ability to be productive. Cumbersome additional steps can drive users to work around security measures by using commercial services for file sharing. Enabling users to work efficiently and in a familiar environment keeps processes under the control and management of your collaboration solution.
COMPLIANCE
Adhere to strict compliance regulations such as HIPAA, GDPR, FIPS 140-2, and PCI compliance.
Scheduled and on-demand compliance reporting and advanced configuration that makes meeting regulatory requirements worry-free
PCI Compliance
Our financial services customers use Cornerstone’s PCI report to assure that all capabilities of the server environment are compliant. Each configuration setting required to meet regulations is evaluated and status is reported. Administrators can schedule this report or run on-demand to validate PCI compliance or to provide audit information.
HIPAA Compliance
For our healthcare customers, Cornerstone offers a variety of ways to protect patient information:
Regulatory Compliance
Cornerstone complies with a variety of security standards:
AUTOMATION
Automate processes, notifications, and security scans with a library of events and conditions.
Cornerstone MFT improves visibility into processes, and eliminates unwieldy scripts and outdated batch files.
Integration Capabilities
Security
Security is enhanced with Cornerstone’s automation capabilities:
Server Management
Workflow
Administrators gain significant benefit from the events processing in Cornerstone. Reports and compliance scans can be scheduled and server configurations can be backed up regularly. The health of the server environment can be automatically monitored and thresholds can be set for administrator review.
REPORTING
Curate and view the analytics that are most important to your organization.
Cornerstone makes it easy to create, modify, and share reports. With multiple report customization options, you can create the analytical views most relevant to your organization. Then, access and monitor them easily by configuring them on intuitively designed dashboards. Modifications and refinements can be made as needed, giving you flexibility on how you access and evaluate your information.
Award-Winning Security
SRT’s Cornerstone MFT solution was named a Cybersecurity Excellence award winner for secure file transfer solution in 2018, 2019, and 2020.
Implementation Options
We offer you a range of implementation options that can securely facilitate migration to the cloud, stand up reliable on-premise options, or customize a hybrid of both to best suit your organization’s objectives and budget. Our professional services team is available to assist you with any configuration that you choose.
On Premise
Implementing Cornerstone on premise gives you complete control of your environment, without recurring monthly costs. Purchase a perpetual license with just annual maintenance and support as an ongoing cost. There are no additional costs for number of users, connection, storage or bandwidth.
Cloud – SaaS
A SaaS implementation of Cornerstone provides security and performance, with the flexibility and lower upfront costs of a cloud solution. Easily spin up or turn off additional servers to accommodate peak processing requirements while controlling costs. Available as an Amazon AMI and in Azure, monthly costs are based upon usage.
Hybrid
You can also choose a hybrid option, combining the benefits of on-premise and cloud MFT Servers. This offers scalability to suit your needs and facilitates integration with your existing technologies. Hybrid configurations are an easy step toward moving your business to the cloud.
Cornerstone MFT System Requirements
Operating System
Cornerstone MFT is supported on both the 32- and 64-bit editions of Windows.
Processor
Disk Space
Memory
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved