One of the most persistent issues facing the modern IT team is the problem of Shadow IT. And that's the genesis of one of the most exciting new features of MOVEit 2018: the new Secure Folder Sharing capability. This new tool puts the power of creating and using secure folders in the hands of the end-user. This video demonstrates that capability.
Any IT pro knows that Shadow IT, the unsanctioned use of cloud-based apps like Dropbox, Google Drive and Evernote, is surging, and it can be a threat to the data-security of any organization.
Nothing frustrates and cripples IT more than users going rogue.
Joe from marketing thinks the company-approved internet is slow, so he sets up his own WiFi, away from the IT-approved network. Sara from finance decides to use non-approved cloud storage for personal info of employees, exposing private data. Larry uses his own home laptop because the work computer “has too many restrictions,” causing compliance issues.
All these are cases of Shadow IT, and these issues cause headache after headache for IT teams around the globe.
Beat Shadow IT with Secure Folder Sharing
To address this risk of a data breach through the unauthorized use of email, consumer-grade file sharing solutions to transmit sensitive data, MOVEit 2018 introduces a new feature that aims to simplify file transfer by allowing end-users to take things into their own hands, saving time and money, while maintaining security.
MOVEit's new Secure Folder Sharing capability lets IT groups extend the adoption of secure managed file transfer to a broad base of end users through a convenient, easy-to-use file sharing and collaboration capability that assures data security, visibility and audit trails.
Administrators have the flexibility to enable both individual users and entire groups of users, and end-users can create their own shared (and secure) folders, which can be made available for both internal and external collaboration.
Once enabled, end-users have the capability to control the permissions of their collaboration, with granular permissions controls on visibility, downloading, and uploading.
Deployment options are also flexible—Secure Folder Sharing is available on-premises, in the cloud, or as a cloud-based managed service.
In the video below, Ipswitch Principal Product Manager John Picinich goes through an example use case of the new secure folder sharing capabilities.
In this example, a user (John) who works in tax preparation, will use Secure Folder Sharing as a simple and secure method for getting tax documentation from his clients.
Hi, this is John Picinich. I'm a principal product manager at Ipswitch. I'd like to go through an example use case of the new secure folder sharing capabilities. In this example, John offers tax preparation services. His clients aren't always prepared when tax season arrives, and John needs a simple and secure method for getting tax documentation from his clients. So in this example I've logged in as John, and I'm going to create a new folder for Arthur Frazier, one of my clients.
After adding the folder I'm gonna go ahead and invite Arthur to be able to access this folder so that he can upload the files that I need to be able to prepare his tax documents. Simply entering Arthur's email address and assigning the appropriate permissions, I can add him and he will receive a notification via email to access this shared folder. Arthur receives an email invitation from John with a temporary password so that he can access the shared folder. When Arthur first logs in, he enters the password and he's prompted to provide a new password.
After logging in, Arthur will be able to access the shared folder that John has shared with him. So Arthur has obtained his required tax documents, so he's gonna go ahead and select them and upload them into the shared folder. John will receive a notification that Arthur has uploaded these files so that he can complete the tax documents. So some key points to remember about secure folder sharing are that regular users can be granted folder sharing permissions, folders can be shared with internal and external users, and users can see who the folder has been shared with.
The invitation process is quick and easy. Simple drag and drop work flows are supported with granular permissions that support multiple use cases. With tamper evident logging, all of your transactions are secure, simple, and based on proven technology.