Developers: | Keynectis OpenTrust |
Date of the premiere of the system: | October, 2010 |
Last Release Date: | 2015 |
Technology: | Cybersecurity - Information loss preventions |
Now internal and external electronic document management grows in corporate environment in high gear, and traditional methods of file transfer, such as e-mail/smpt, file services, etc. do not meet the modern requirements any more. Services for exchange of electronic messages are not adapted for transfer of files of large volume, FTP servers take away a lot of time from system administrators and require considerable costs in the presence of several million users who often experience difficulties in their use. Besides, application of similar solutions often does not meet requirements of the organizations in the field of security of confidential information and process automation.
Modern electronic document management even more often is exposed to the attacks of the cybercriminals trying to get access to confidential information of the companies. Aiming to prevent damage, destruction, distortion of data and unauthorized access to them, many companies pay special attention to a problem of creation of the secure system of electronic document management meaning complex approach to security at each its level.
The OpenTrust company developed the new product OpenTrust MFT, the corporate solution for file sharing which is conforming to security requirements of information and having the following functions for the solution of similar problems:
- confidentiality of information by transfer from one point to another;
- possibility of exchange of documents and files of any types/sizes;
- functions of full-fledged management and tracking of loadings, access to which can be provided directly via the user interface;
- simplicity of implementation and use;
- the minimum impact on workstations – access to service of exchange via the Internet-browser;
- the customized user interface, possibility of use of logos and graphic standards of the organization;
- flexibility and adaptation to requirements of the organization (user groups, the centralized and delegated administration, detailed management of the rights);
- authentication of the registered users and simultaneous support of the No administration mode permitting temporary authorization of the non-authorized users for sending and downloading of files;
- configuration of each user according to one or several preferable security policies (means of authentication, passwords, rules of filtering, certain users and modules of administration, etc.)