Ipswitch File Transfer is going (more) global. We’re thrilled to announce the expansion of our already successful Ipswitch FT Partner Program.  It now boasts a number of new benefits for our global partners, including a new Elite Partner Level and a deal registration program.

The Elite Level expansion was created for those partners looking for even greater association and support from Ipswitch File Transfer.  A new deal registration program has also been introduced, which will incent resellers with additional discount points for registering qualified net new sales opportunities on the FT Partner Portal.

read more “Going Global: Ipswitch File Transfer Expands Partner Program”

It’s been a while since I’ve seen “file transfer” as a headlining productivity problem for end users, but here it is making an appearance in an article about how hard it is to use the iPad in the context of an average end user’s collection of gear.

Prisoner of iTunes – the iPad file transfer horror
“The conflict between consumption and productivity”

One of the interesting debates in the Managed File Transfer industry right now is how much file transformation really takes place between users and systems.

At one end of the spectrum, you have pure ad-hoc solutions (such as the modules for MOVEit DMZ and WS_FTP Server) that people often use to deliver Word documents, PDFs and engineering documents to each other for manual review.  At the other end of the spectrum you have full EDI solutions that dictate and translate specific formats (e.g., ACH, HL7, etc.).

However, there is a great deal of territory in the B2B middle-ground that overlaps both MFT and EDI.  For example:

  • Word docs that need to automatically turn into PDFs.
  • Messages that should be automatically retained for eDiscovery.
  • Bulk sets of transactions that need to be split up and sent to a half-dozen mainframe applications.
  • Text files that need to be PGP-encrypted.
  • All of the above bundled into Zip files.

The truth is that most enterprise file transfer involves intelligent transformation or routing of one kind or another.   If you agree, you might also agree that defining the line between MFT and EDI, EDI and B2B and MFT and B2B is very hard to do in practice.

Fortunately, Ipswitch has solutions that span ALL of these needs, from the pure ad-hoc through pure EDI, and they can be dialed up or down to meet tactical or strategic needs.

SMB’s have always had to respond to external and internal influences at the drop of a hat and rapid advancements in technology only further SMB’s need for agility specifically with technology management. Keeping up with new forms of IT and IT management is indisputably integral to a business’ success.

In the past few years, efficient IT management focused on maintaining network availability. It was important to implement software that allowed for quick and easy identification of outages and false alarms. The problem could usually be rooted out and resolved quickly by replacing downed devices etc. Mean-time-to-repair (MTTR) was typically short.

Today, IT infrastructures have become more complex with the need for multiple applications and optimal performance. Application degradation is common, but the cause of the problem is not always clear. MTTR can be significantly longer, stove-piping the organization as a whole.

A key advantage for SMB’s over other organizations is the ability to rapidly adopt new technology. To avoid widespread panic and discontent over application degradation, outages, network traffic, false alarms, etc. an integrated network management toolkit is needed. If one wants an edge over the competition, seeking the newest and most advanced tools is an obvious route to take.

Enhanced by Zemanta

Here’s an interesting perspective on The Myth of Computer Security.

The myth:  “With proper protection, your computer is immune to cyber attacks, viruses and other malware”.

The reality:  “(We live in a world of) unprepared software.  Microsoft and various security companies are doing their best against the bad guys, who are attacking faster and more creatively than the good guys can keep up”.

Unfortunately, I agree with the premise that computer attacks are becoming more organized, more advanced and more destructive.  This is forcing vendors to come up with more complex solutions.  As a result, we’re now seeing some extremely complex solutions do more damage themselves than good.  The sad truth is that there is no perfect security solution out there and that they are all open to self-inflicted damage.

I think that commenter Red_Flag sums it up best by borrowing a line from author Max Brooks:  “With computer security, as with zombie survival, ‘No place is safe, only safer’”.

Network Managers, as you know, don’t typically have a lot of down time on a day-to-day basis.

It seems there’s always some network or user issue popping up (and in most cases it’s more than one issue at a time) so you find yourself running around trying to keep the network running and the users happy.

Monitoring and maintaining your network traffic and bandwidth utilization used to be an overlooked aspect of your job, deemed less important. But the rapid evolution of technology has changed the makeup of networks everywhere and has forced network managers to include Flow analysis and monitoring in their network management strategies.

Not only will including this in your strategy allow you to maintain control and ensure of the peak performance of your network’s bandwidth, it will also ensure your network is not at risk of viruses, malware attacks or any other malicious behavior.

A proper Flow monitoring tool delivers peace of mind, allowing you to have confidence that your network is secure and your bandwidth is not being consumed with such capabilities as:

  • Support for Popular Flow Formats: The ability to monitor NetFlow, sFlow and JFlow, with support for switches and routers from vendors such as Cisco, Extreme, Juniper, HP and more
  • Visibility into Network Bandwidth Utilization:Complete, real-time visibility into QoS and exactly how your network bandwidth is being used to ensure optimal network performance
  • Comprehensive Reporting:Collection of NetFlow, sFlow and JFlow records and conversion into useful reports which track real-time usage as well as historical trends
  • Threshold Based Alerting: Receiving alerts in real-time when configured thresholds are exceeded allow you to proactively troubleshoot and resolve performance bottlenecks and eliminate malicious behavior

WhatsUp Gold Flow Monitor is a network traffic analysis solution that offers all of these benefits, allowing you to focus on other business-critical projects while giving you the peace of mind that your network is constantly performing at its peak. Don’t just take my word for it, though. Here is Claudio Robles, one of our WhatsUp Gold experts, offering more insight into the benefits of Flow Monitor.

Enhanced by Zemanta