Find out what your peers are saying about IBM, Progress Software, Fortra and others in Managed File Transfer (MFT).
IBM Aspera takes a different approach to tackling the challenges of big data movement over global WANs. Rather than optimize or accelerate data transfer, Aspera eliminates underlying bottlenecks by using its proprietary fasp technology that fully utilizes available network bandwidth to maximize speed and quickly scale up with no theoretical limit. Using fasp, transfers are secure end-to-end and are largely unaffected by file size, transfer distance, or network conditions, making transfer times up to 100Xs faster than TCP-based protocols.
IBM Aspera offers SaaS, on-prem, and hybrid solutions to meet the needs of modernizing infrastructures. All solutions offer robust security and compliance, intuitive file sharing, workflow automation, central administration, and real-time visibility. Quickly and easily initiate transfers across hybrid infrastructures, including support for cloud-to-cloud transfers. IBM Aspera offers unmatched transfer speeds, end-to-end security, reliability, and exceptional bandwidth control.
Control-M Managed File Transfer is a market leader in the field of building, scheduling, and managing internal and external file transfers. Users of this solution are able to automate whole portions of the transfer process. They can set up a dynamic scheduling feature, which will activate once a transfer operation has concluded. This automatically updates the schedule of activities that your system is supposed to perform. However, this feature does not stop with simply setting a schedule. After the schedule is updated, the system will set those activities in motion. The automation relieves you of the need to assign a team to write scripts or any kind of manual work. This will ensure that everything runs on schedule while at the same time reducing the amount of resources necessary to make that happen.
Control-M Managed File Transfer has a simplified and unified dashboard. Users are able to view and access all of the system’s file transfer information. This platform provides a high level of visibility and intuitive use. It ensures that users will be able to view any stage of their file transfer operations at any time that they wish. Users can conduct a quick search with specific pre-set search options and find any piece of information they might require.
Key Features
Some of Control-M Managed File Transfer’s key features include:
Reviews from Real Users
Control-M Managed File Transfer stands out among its competitors for a number of reasons. Two major ones are the robustness of the solution and its ability to integrate easily with other related programs. It is constantly being upgraded to meet the varied needs of its users.
A software engineer at a computer software company notes the robust nature of this solution when he writes, “This solution has a vast amount of features, and with every new release, there are lots of new features introduced. The application has high availability - we have multiple customers and it's highly available. On an application level, if something goes down with the primary, then the application goes over to the secondary, so it's very, very easy to do disaster recovery.”
Another PeerSpot user, who is an RPA-WLA BU director at a tech services company, takes note of how easy it is to use Control-M Managed File Transfer in conjunction with other products. They point out, “It is easy to use and integrate with different solutions. It is a good solution that is easy to implement and deliver.”
Cornerstone MFT closes the security gaps in your current file transfer processes while improving efficiency and visibility. Secure file transfer is critical, but encrypting data while it’s stored on your servers is equally important.
Cornerstone is the only MFT solution with real-time PGP encryption of files, encrypting and writing data in a single step, rather than writing an unsecure version of the file and encrypting it in a separate step. Cornerstone also supports a wide variety of file transfer protocols.
Whether it’s internal security policies to protect your business, or government privacy regulations such as HIPAA, SOX or PCI, Cornerstone helps you to execute on your security initiatives. Cornerstone also offers the easiest way to securely share and collaborate on documents. With easy setup that can have users collaborating withing hours rather than weeks, Cornerstone is a cost-effective and secure collaboration solution.
Cornerstone enables sharing and collaboration without locally syncing files. Secure protocols protect transmission of shared files, and controls assure that unauthorized users are never able to gain access to files. Streaming encryption protects data at rest without leaving gaps in security.
Cornerstone’s strong security doesn’t inhibit your users’ ability to be productive. Cumbersome additional steps can drive users to work around security measures by using commercial services for file sharing. Enabling users to work efficiently and in a familiar environment keeps processes under the control and management of your collaboration solution.
The solution is used by international banks, healthcare services and government agencies where compliance and staying ahead of the latest security standards is critical. Cornerstone MFT is available on-premise, in the cloud or as a hybrid solution. For added protection, Cornerstone can be paired with the optional DMZedge server for perimeter security that doesn’t require copying files into an unsecure DMZ.
Cornerstone MFT was named Product of the Week by Network World in 2015, was named one of the best secure file transfer servers by ITT Systems in 2016 and was named a "Top Managed File Transfer Pick" by PC Magazine in 2018. Cornerstone also won a silver medal in the Secure File Transfer Category of the Cybersecurity Excellence Awards in 2018 and 2019.
We monitor all Managed File Transfer (MFT) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.