Automated end-to-end encryption
Efficient, cost-saving security for data sharing
Secure automation for file and folder transfer. Encrypt and transfer large volumes of structured and unstructured data.
Encrypt files at rest and in transit. Including key management for fully auditable end-to-end encryption in line with compliance requirements.
Go paperless securely and easily. Transfer scanned documentation to a network drive or folder location, securely and easily.
Restrict file types for upload. Control the kinds of data that can be uploaded, for additional security and control.
Streamlined and secure file transfer
with choice over integration, deployment and hosting
Secure file transfer within existing workflows. Switch Secure Managed File Transfer is designed for flexibility, with easy integration into existing systems and processes.
Choose hosting that suits your needs. On-premise and cloud hosting helps you realize infinite scalability combined with the flexibility of sharing on-premise content.
Customize data transfer with APIs. Tailor the way you securely transfer large volumes of data with APIs that give you total control.
Flexible data transfer scheduling and auditing
Manage the data sharing lifecycle
Schedule bulk transfer outside of working hours. Reduce load on company networks when transferring terabytes of secure content.
Keep up to date with notifications. A real-time alerts system for both senders and recipients so everyone involved can keep track.
Automate folder synchronization. Set up new file transfers at any time, with automated syncing of initial and destination folders to make sure files are up to date.
View full audit logs and transfer reports. Monitor file transfers and system status in real-time with comprehensive auditing and reporting.
Want to get more technical? Here are some good things to know about Switch Managed File Transfer.
1. Two ways to send securely:
One-way directory sync. Set up a local or network folder and use Switch Secure Managed File Transfer to monitor for changes. When changes are detected, automatically encrypt and send the files to a storage location, whether it’s a local, network or S3 folder. Set the recipient machine to monitor this storage location for changes, automatically downloading and decrypting anything new.
XML-based automated file transfer. Create an XML file containing details of files to send, and intended recipients. Putting the file into a local folder that acts as a queue directory causes Switch Secure Managed File Transfer to encrypt the files. The files are sent directly to specified users, or stored in a specific location.
2. Encryption at-rest and in transit
Switch Secure Managed File Transfer secures data at-rest and in-transit using AES-256 bit encryption. With Switch key management, you also get fully auditable end-to-end encryption.
3. Flexible management and control
As well as choice over hosting, authentication and integration, Switch Managed File Transfer features APIs that enable organizations to customise how they securely share their data, while continuing to benefit from the underlying Switch encryption technology.
4. Bandwidth throttling and transfer scheduling
Automate the secure file transfer process and schedule bulk transfers outside of working hours to reduce network load, while the notification system provides reports once the process is complete. New file transfers can be set up on an ad hoc basis, with automated syncing of initial and destination folders ensuring that the files are up to date. The notifications and real-time alerts can be customized both sender-side and for recipients.
Not what you’re looking for? We love talking technical, so contact our team today!
Trial The Software
We believe that using Switch for yourself is the best way to demonstrate how effective it can be. So why not contact us to set up a free software trial today?
Boston – September 2017 – In recognition of their commitment to global standards for security excellence, Egress Software Technologies, a leading data security provider, today announces th...Read More
Featured Blog Post
The healthcare sector is now dominated by technology, which plays an ever-increasing role in the delivery of healthcare services. In particular, the use of mobile devices and cloud-hosted service...Read More
Thursday 19th January 2017, 13:00 EST – The Enemy Within: Overcoming a Company’s Greatest Security Vulnerability – Its People
It has been reported that approximately a quarter of breaches are caused by human error or employee negligence. With the increasing costs and risks associated with data breaches, we will be discussing...Read More