Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

Shift away from a reactive fire-fighting approach and instead take proactive steps to tackle issues while confidently meeting your SLA commitments. The IBM® Sterling Control Center Monitor efficiently oversees critical events in your B2B and managed file transfer (MFT) environment, enhancing operations, customer satisfaction, and B2B governance. It implements specific rules to notify relevant stakeholders whenever a server, process, or transfer encounters a problem. Dashboards designed for various user types provide actionable insights. You can monitor file transfers and B2B procedures while ensuring server views are aligned with operational logic. This system allows for the identification of schedules, processes, file names, user roles, and security features, all of which contribute to comprehensive oversight. It also enables continuous control monitoring and detailed audit reporting, ensuring everything is within compliance. Furthermore, it consolidates event data from all B2B and MFT systems into a unified view, streamlining management and enhancing decision-making capabilities.

Description

Transferring files to and from various environments can lead to potential security breaches and infections. Often, portable media is utilized for such transfers, circumventing established security measures. MetaDefender Vault offers a robust solution for secure file storage and retrieval, safeguarding vital data and mitigating potential threats. It restricts access within the organization while also providing essential tracking and auditing capabilities. This helps in preventing zero-day attacks, ensuring that your organization is prepared to address any false negatives through a range of protective measures. You can place any new files in a time-sensitive quarantine, conduct ongoing scans using multiple antimalware engines, and apply role-based access controls to minimize risk. Additionally, establishing workflow processes that mandate authentication and regulate file access and sharing based on job roles and file types adds a further layer of security. It is also crucial to control the roster of supervisors authorized to execute specific actions, such as locking access to files that lack prior approval, thereby enhancing overall data protection. By implementing these measures, organizations can significantly bolster their defenses against potential cyber threats.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

Admin By Request Endpoint Privilege Management
Chronicle SOAR
Cyberstanc Scrutiny
IBM B2B Integrator
IBM Sterling Connect:Direct
IBM Sterling File Gateway
IBM Sterling Global Mailbox
OPSWAT MetaDefender
Polarity

Integrations

Admin By Request Endpoint Privilege Management
Chronicle SOAR
Cyberstanc Scrutiny
IBM B2B Integrator
IBM Sterling Connect:Direct
IBM Sterling File Gateway
IBM Sterling Global Mailbox
OPSWAT MetaDefender
Polarity

Pricing Details

No price information available.
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

IBM

Founded

1911

Country

United States

Website

www.ibm.com/products/control-center

Vendor Details

Company Name

OPSWAT

Founded

2002

Country

United States

Website

www.opswat.com/products/metadefender/vault

Product Features

Managed File Transfer (MFT)

API Integration
Authentication / Auditing
Compression
Data Sharing
Data Transmission Protocol Integration
Database Management
Encryption Support
Fail-Over / Load Balancing

Product Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Alternatives

MOVEit Reviews

MOVEit

Progress Software