Security and compliance are primary concerns for every business. But months of implementation and consulting services may not fit your timeline or your budget. Cornerstone is an enterprise-class Managed File Transfer solution that can provide High Availability, integrate with existing authentication systems, and achieve security and compliance standards.
Cornerstone’s pricing is competitive enough that it is often purchased without an RFP. And the implementation process is easily done by your existing staff, or with minimal consulting services.
Cornerstone handles your company’s volume and grows with your business.
Cornerstone helps meet compliance requirements without adding complexity.
Cornerstone’s rapid onboarding speeds you back to business, employing a software-only solution within your existing architecture.
Secure file transfer only solves a piece of your data security and compliance requirements. There are other considerations that, if overlooked, can result in costly compliance violations or data security breaches.
When files are stored on your server, there is still a need to assure that they are protected from unauthorized access. Cornerstone’s Real-time PGP encrypts the files on your servers with the highest industry-standard encryption. This process avoids interim steps that the unencrypted data to the disk. Cornerstone encrypts that data on the fly so that it is never exposed, and does not require additional steps to sanitize deleted data.
Preventing unauthorized access to your network, without increasing complexity for you users and IT department, is easily accomplished with Cornerstone. Using a combination of perimeter security and two-factor authentication, risks of network breach are greatly reduced.
Perimeter Security with DMZedge. To keep unauthorized users out of your network, the optional DMZedge server, used in with CornerstoneMFT, enables you to close inbound ports on your firewall, opening a dynamic outbound connection to service user requests.
Two-factor Authentication e-tokens. Text passwords can be easily broken, and users frequently write them down or share them. CornerstoneMFT, used in conjunction with WebDrive, adds a second layer of authentication security – one that is not easily compromised.
When files are uploaded or downloaded from your server, you need the assurance that they are safe from unauthorized access. This is especially important if you store financial or healthcare data. Cornerstone secures your files transfers using your choice of secure protocols. You can use SFTP or run FTP or WebDAV through an SSL encrypted connection.
Cornerstone can require all connections to the server to be secure, refusing any unsecure connections.
As a healthcare provider, privacy and security are always a high priority. In addition, the legacy FTP server that Children’s National had been running needed more management functions and increased flexibility. A more powerful, flexible and secure solution was identified as the strategic direction for the hospital. The solution needed to provide scheduled transfers, advanced logging and compliance with FIPS and HIPAA.
Datalogix receives thousands of gigabytes of data each month from member companies. Member companies transmit sales transaction data through file transfers that can range from several hundred megabytes to several thousand gigabytes.
The need for a secure file transfer platform was identified as one of the key requirements for Datalogix, but the solution also had to be easy to manage and configure. In addition to security, automation capabilities and the mechanisms to manipulate in-bound files were required. The solution also had to integrate well with the internal workforce, allowing an easy integration with existing user authentication systems.
Learn more about how this leading marketing information firm uses Cornerstone for high throughput and automation.
Cornerstone secures banking data and provides high availability for this South American Bank
The DMZedge Server enables you to close inbound ports on your firewall, reducing the risk of network intrusion and enabling the highest level of security for both data storage and transfers. When combined with the Cornerstone MFT Server, the DMZedge Server uses a two-way connection originating from the Secure MFT that is inside of the firewall on your corporate LAN. The DMZedge works as a communication proxy, replacing unsecure inbound connections from the Internet to your internal network.
The DMZedge Server works as a proxy between users on the Internet and your secure corporate LAN. DMZedge Server resides in the Demilitarized Zone (DMZ) – outside of your corporate firewall. The Cornerstone MFT Server that resides on your network initiates a session with the DMZedge through a secure outbound connection. All incoming client requests and data are forwarded to the back-end server through a connection that has already been established between the MFT Server and the DMZedge Server. The MFT servers reside securely behind your corporate firewall, although ease of access for your end users is as simple as if the servers were in your DMZ. Data storage and authentication take place on the back-end server, and no inbound ports are opened through your firewall.
Cornerstone integrated well with our internal workforce.Dave McCabe
Dir. Of Data Center Operations
Cornerstone MFT is supported on both the 32- and 64-bit editions of Windows.