We specialize in providing Analytics, Security and Controls for responsible file transfer usage to large and medium-sized enterprises. Our products help customers worldwide become more secure, more compliant and more efficient.
Despite its flaws, corporations use FTP due to the fact that FTP is available (and typically free) on every platform. FTP is used for server to server file transfer in the data center, as an information sharing tool in end user departments and, most importantly, FTP is the most common B2B data exchange protocol, used for transferring files to and from vendors, customers and business partners around the globe.
Due to its origins in the academic world, FTP requires third party management tools to provide the security, controls and management capabilities required in a corporate environment handling sensitive or confidential data.
Many corporations would not even notice a breach because they do not have the tools or the processes to detect a breach. In addition, even if they should become aware of a breach they would not be able to reliably determine exactly what information had been accessed.
Sentry Analytics™ provides the controls to monitor and audit File Transfer activity as well as detect and investigate suspicious activity. Sentry Analytics™ ensures Audits and Breach investigations can be performed instantly and are accurate, comprehensive, timely and cost effective.
Sentry Analytics™ monitors File Transfer activity across the enterprise and records the activity in a secure location for audit purposes. It can tell you who accessed what information when and from where — all at the click of a mouse.
Sentry Analytics™ also helps reduce exposure and prevent data breaches by providing an automation framework capable of detecting uploads of sensitive files and removing files automatically after successful transfer.
Sentry Armor™ protects your servers effectively against both Dictionary-based and Brute Force FTP Attacks in a manner that is cost-effective, easy to implement and requires no effort to operate and maintain.
Sentry Armor™ monitors your servers in real time and detects when an FTP attack is taking place. It will not only alert you but also stop the attack and prevent future attacks by killing the connection and blocking the attacker from accessing the server again.
Sentry Discovery™ detects security risks caused by servers you didn’t know were running file transfer software by scanning your corporate network and identifying every server that is running file transfer software.
As this is a recurring problem, Sentry Discovery™ can be set up to run at regular intervals and email the scan results to you. New servers running file transfer software will be brought to your attention with no effort on your part. This allows you to evaluate them in seconds and decide whether to disable them or secure them appropriately, depending upon the needs of the business.
z/OS FTP provides access to all files, datasets and batch output resident on a z/OS system. However, it runs with a very simplistic security model that is not adequate for protecting remote access to critical corporate data. Sentry Guardian™ enables a company to control exactly who can access z/OS FTP, from where and what they are authorized do with it, by writing SAF security rules (RACF, Top Secret or ACF2). These rules can block unwanted FTP activity (e.g. the transmission of sensitive data across the firewall). They can also block access to the FTP server from unauthorized locations, thereby defeating hackers using bots attempting to gain access.