Growing Traffic Makes Control of File Transfer Essential

The transfer of unstructured data (files) between business partners is growing at a brisk pace. This opens the door for potential error, compliance issues, and confusion.

According to a recent study by the Aberdeen Group, the number of end users requiring file transfer capability is growing rapidly, between 6% and 9% annually, as of 2013. The volume of file transfers per user is growing faster still, from 8% to 11% annually. Finally, the size of the average file to be transferred is also growing, from 6% to 7%.

The flip side is that IT staff to accommodate the increased traffic is not growing correspondingly.

A sensible solution for B2B partner companies needing to accommodate these increases is Managed File Transfer. MTF augments existing B2B data exchange mechanisms by off-loading the transfer of larger files to an independent mechanism, lessening resource consumption. It automates file transfers between B2B partners, incorporating detection and handling of transfer failures, which conventional file transfer does not; and it can authenticate users against AD/LDAP.

Industry uptake of MTF has been rapid, and it has taken up a permanent place in the B2B toolkit.

Read More 0
Read More 0

How Supply Chain Disruption Affects the Financial World

A common concern of global insurance firms is, unsurprisingly, the financial impact of supply chain disruptions. An industry risk assessment published earlier this year stated that 43 percent of corporate insurance experts consider the business interruption of supply chain disruption to be their most significant concern.

Always a concern for supply chain participants themselves, supply chain disruption has downline impacts that have financial consequences on other business entities.

The financial losses that can result in a local economy due to supply chain disruption are so concerning to global insurance analysts that they actually top natural disasters and fires in importance. Business interruption, the report stated, accounts for 50-70 percent of insured property losses.

“As supply chains are becoming increasingly complex in a global sourcing world, any disruption – for example due to natural catastrophes, IT/telecom outages, transportation issues, a supplier’s bankruptcy or civil unrest – can lead to a snowball effect,” said Paul Carter, global head of risk consulting at Allianz Global Corporate & Specialty (AGCS), said recently.

“Business continuity planning is key and should be part of any company’s procurement and supplier selection process. Yet, to ensure appropriate mitigation measures can be implemented, it is no longer sufficient to know your ‘critical’ suppliers; you also need to have a grasp of how they manage their own supply chain exposures,” Carter concluded.

Read More 0

The Most Concerning Security Threats to B2B Partners

What are the threats to B2B security that should concern integrated partners today? The B2B international consultancy conducted a global IT risks survey to determine the answers.

Security should always be on the B2B partnership radar, in this era of high-profile, Big Data breaches. Knowing where to concentrate attention and effort in shoring up security is a critical undertaking.

The IT risks survey, which incorporated almost 2,900 interviews of IT professionals in 24 countries, indicated that preventing breaches and protecting data are their top two concerns, and that both of these concerns have increased in importance since 2012.

One of the leading security challenges is the introduction of mobile, a business necessity for many supply chain participants, and BYOD in particular.

An alarming 35% of participants in the study indicated loss of business data as a result of external attack, and characterized the attacks overall as harder to detect. Another trend is threat to smaller businesses, which are less equipped to respond to security breaches in real time.

The study concluded that major issues have included underestimation of the increasing sophistication of malware, failure to implement adequate mobile device management, and management failure to properly assess the real risks and costs of breaches.

Read More 0