010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Cornerstone MFT

Cornerstone MFT

 

Enterprise MFT Server Solution with high availability and failover to eliminate downtime. Advanced automation for improved productivity, SFTP Server for file transfers, and security that exceeds industry standards.

 

SECURITY

Take advantage of advanced encryption methods, secure protocols, and perimeter security.

 

SRT supports the latest NSA-approved security standards, so you never have to wait for your MFT vendor to catch up.

 

Cornerstone offers the most complete security and data protection of any managed file transfer solution. Multi-layer security features keep your data safe at every point in your workflows and compliant with strict regulatory measures.

 

Security from the Outside 

The DMZedge module offers an additional level of security from the outside, detecting and denying server access to any unauthorized users. DMZedge enables you to close inbound ports in your firewall, reducing the risk of network intrusion and enabling the highest level of security for both data storage and transfers.

 

Your Files are ALWAYS Encrypted

Other MFT solutions allow stored data to be exposed for thousands of processor cycles before it’s encrypted. Cornerstone’s streaming disk encryption module assures that unencrypted versions of your files are never written to disk. Your data is secure at ALL times.

 

Streaming disk encryption encrypts and writes files as one action. Unencrypted copies are never written to the server, so your data is never exposed — even for a microsecond. When files are requested by users or sent through automated transfers, the decryption process happens automatically. Users don’t go through the cumbersome process of managing encryption keys and decrypting data. The real-time processing makes securing data-at-rest effortless for your end users.

 

Ransomware Protection

Add WebDrive as the file transfer client in your Cornerstone solution and protect users from ransomware with WebDrive’s Advanced Endpoint Protection feature. This allows you to choose which programs are allowed to open files and ban those that are not, greatly reducing the risk of malware insertion.

 

WebDrive maps a drive letter to Cornerstone, so users can get to their files easily and without learning a new interface. Users can access Cornerstone files the same way they access files on their desktop. WebDrive reduces the burden of user training and simplifies tech support.

WebDrive also offers two-factor authentication using SafeNet keys.

 

HIGH AVAILABILITY

Eliminate downtime with failover and load-balancing capabilities.

 

Load balancing and failover with strong security.

 

Architecture Built for Protection

  • Fail-over capabilities so data is always available, even in the event of a hardware failure
  • Disaster recovery to ensure minimal to no interruption to your business operations
  • Active/Active or Active/Passive configurations
  • High Availability across different geographic locations
  • Clustered SFTP and SSL for secure file exchange

 

Architecture Built for Performance

  • Clustered servers so a server can be taken offline without impacting performance
  • Load balancing to evenly distribute workload between servers and to accommodate high throughput
  • Databases, file storage, and authentication platforms can be located anywhere on your network
  • Cornerstone accesses resources directly, without the vast overhead of data replication

 

Skillful Professional Services

  • Experienced professional services available to assist in your high availability implementation
  • Significantly reduce implementation time
  • Best practices advice from professional services engineers with an average of 18.5 years of IT experience

 

Most Cost-Effective HA Solution

  • Start with an HA solution for under $10K
  • Add low-cost modules as your needs grow
  • On-premise or Cloud/On-prem hybrid

 

International banks, hospitals, and financial institutions rely on Cornerstone for 24/7 operations. Cornerstone’s architecture provides robust fail-over capability, load-balancing for peak processing times, and fast disaster recovery capability.

 

SECURE COLLABORATION

Bi-directional file sharing and collaboration from every application improves productivity.

 

Collaborate with customers, partners, and colleagues – without creating security risks

 

The pace of business requires employees to constantly interact and exchange information. While this fosters unprecedented productivity, it can also come at the expense of security. As users around the country or world interface with your data, there are more opportunities for security risks.

 

Consumer-focused collaboration services often require syncing data to the local machine. This presents a security risk and wastes local disk resources. Security issues are further complicated by weak access controls and holes in encryption processes. Cornerstone enables sharing and collaboration without locally syncing files. Secure protocols protect transmission of shared files, and controls assure that unauthorized users are never able to gain access to files. Streaming encryption protects data at rest without leaving gaps in security.

 

Cornerstone’s strong security doesn’t inhibit your users’ ability to be productive. Cumbersome additional steps can drive users to work around security measures by using commercial services for file sharing. Enabling users to work efficiently and in a familiar environment keeps processes under the control and management of your collaboration solution.

 

COMPLIANCE

Adhere to strict compliance regulations such as HIPAA, GDPR, FIPS 140-2, and PCI compliance.

 

Scheduled and on-demand compliance reporting and advanced configuration that makes meeting regulatory requirements worry-free

 

PCI Compliance

Our financial services customers use Cornerstone’s PCI report to assure that all capabilities of the server environment are compliant. Each configuration setting required to meet regulations is evaluated and status is reported. Administrators can schedule this report or run on-demand to validate PCI compliance or to provide audit information.

 

HIPAA Compliance

For our healthcare customers, Cornerstone offers a variety of ways to protect patient information:

  • Perimeter security to reduce the risk of network intrusion
  • Complex passwords and auto shutdown of guessing attempts
  • Secure transfers to keep data from being intercepted
  • Encrypted data storage prevents internal and external unauthorized viewing
  • Idle connection timeout closes connections that are inactive for a specified time

 

Regulatory Compliance

Cornerstone complies with a variety of security standards:

  • HIPAA
  • PCI
  • FIPS 140-2
  • GDPR
  • ITAR

 

AUTOMATION

Automate processes, notifications, and security scans with a library of events and conditions.

 

Cornerstone MFT improves visibility into processes, and eliminates unwieldy scripts and outdated batch files.

 

Integration Capabilities

  • Zip and unzip attachments
  • Push or pull data – integrate with cloud storage or vendors
  • Send notifications to internal or external users
  • Mount cloud services as server volumes and access them instantly

 

Security

Security is enhanced with Cornerstone’s automation capabilities:

  • Detect and shut down DoS attacks, with notifications sent to administrators
  • Stop password guessing automatically
  • Scan any received files for malware in a quarantine area before sending to the destination folder or process
  • Run AV scans

 


Server Management

  • Compute disk usage statistics to ensure storage space is being used efficiently
  • Backup server configuration
  • Run PCI-DSS v3.1 compliance scans

 

Workflow

  • Generate reports to keep the appropriate personnel notified
  • Flag files or folders for admin review
  • Run files/scripts or custom programs

 

Administrators gain significant benefit from the events processing in Cornerstone. Reports and compliance scans can be scheduled and server configurations can be backed up regularly. The health of the server environment can be automatically monitored and thresholds can be set for administrator review.

 

REPORTING

Curate and view the analytics that are most important to your organization.

 

Cornerstone makes it easy to create, modify, and share reports. With multiple report customization options, you can create the analytical views most relevant to your organization. Then, access and monitor them easily by configuring them on intuitively designed dashboards. Modifications and refinements can be made as needed, giving you flexibility on how you access and evaluate your information.

 

Award-Winning Security

SRT’s Cornerstone MFT solution was named a Cybersecurity Excellence award winner for secure file transfer solution in 2018, 2019, and 2020.

 

Implementation Options

We offer you a range of implementation options that can securely facilitate migration to the cloud, stand up reliable on-premise options, or customize a hybrid of both to best suit your organization’s objectives and budget. Our professional services team is available to assist you with any configuration that you choose.

 

On Premise

Implementing Cornerstone on premise gives you complete control of your environment, without recurring monthly costs. Purchase a perpetual license with just annual maintenance and support as an ongoing cost. There are no additional costs for number of users, connection, storage or bandwidth.

 

Cloud – SaaS

A SaaS implementation of Cornerstone provides security and performance, with the flexibility and lower upfront costs of a cloud solution. Easily spin up or turn off additional servers to accommodate peak processing requirements while controlling costs. Available as an Amazon AMI and in Azure, monthly costs are based upon usage.

 

Hybrid

You can also choose a hybrid option, combining the benefits of on-premise and cloud MFT Servers. This offers scalability to suit your needs and facilitates integration with your existing technologies. Hybrid configurations are an easy step toward moving your business to the cloud.

 

Cornerstone MFT System Requirements

 

Operating System

Cornerstone MFT is supported on both the 32- and 64-bit editions of Windows.

  • Windows Server 2016
  • Windows Server 2012 (including R2)

 

Processor

  • 2GHz Pentium class or better

 

Disk Space

  • Minimum 100MB free disk space for product and caching space
  • Minimum 100MB free disk space for each server configuration

 

Memory

  • Recommended 8GB RAM
  • Minimum 4GB RAM
Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved