File Transfer:’s Plans For Your Data. (Also: The Security Challenge of File Transfer)

File transfer is a great thing. You can send files from one computer to another, in seconds – just like Jack Bauer does in 24.
arun-prakesh.jpgI was speaking with Arun Prakash, Vice President, Marketing & Product Management at who explained to me that the world of Web 2.0 is about the creation of rich content, not just simple documents that can be emailed back and forth.
The challenge for professionals and companies is that this rich content is often too large for email but still needs to flow back and forth from one person to another – through the Internet.
This is, as most of you know,’s suite spot.
Going forward, Arun expects more company to use as a tool for work flow and a sales tool. Enabling sales to see when (or if) a document was opened, or using it internally to confirm delivery and opening of a document, which could trigger a further action.

I wondered, with so many documents being created in the cloud, and in fact never landing on a user’s desktop, what role could or would play?
You’ll see integrated into online authoring tools and’s API (the code used to make it publicly shareable) used by select partners. Eventually a platform will be developed, which all developers can use to seamlessly send large files from one system to another, all through the cloud – via
As Google has deep insight on user searches, has a lot of insight on file formats and other details related to files and habits of business professionals.
There are a lot of companies enabling file transfer – SugarSync is a one and there are others.
The “bad” of file transfer is that many companies have no clue what data is leaving their company. They have no clue, how to manage and control the data.
“With hundreds of data breaches over the past five years resulting in multi-million-dollar consequences, it’s hard to believe that organizations still don’t have the right solutions in the right places to protect sensitive information,” said L. Frank Kenney, VP of Global Strategy at Ipswitch File Transfer. “You may be investing heavily on business applications and their inherent security requirements but if you’re not monitoring and enforcing policies with respect to the information moving both internally (between business applications and people) and externally (between you and your business partners and collaborators), the consequences are dire.”
What does this meant to you?

  • Inventory your data and at least know what data is important – prioritize it.
  • You also need to create policies to govern how data is used in your company. What data can be transferred and how.
  • Ensure all employees know these policies.
  • Work with your local security consultant to know what technologies are available to enforce these policies.