Secure File Transfer Solutions for Data Privacy and Security
Cerberus FTP Server supports organizational privacy compliance with strong transfer encryption, robust access security, comprehensive logging and streamlined compliance tools.
It is one of a kind. 99% of searches done looking for “File Sharing” are cloud-based. This is not applicable for a lot of agencies that protect sensitive data that prefer or require data to remain on-premise. In addition, Cerberus FTP Server is scalable, clean-cut and simple for end users, and supports multiple sharing protocols.
File Transfer Integrity Checking
Using strong checksums based on SHA-512, SHA-256, or SHA-1 cryptographic hashes.
Secure File Access
Cerberus FTP Server’s User Manager protects access to your data through user- and protocol-based connection and login requirements; automatic account lockouts; password policies and change alerts; temporary user accounts; and the ability to block FXP and reserved ports for PASV connection.
Automatic Auditing & Logging
Cerberus FTP Server provides a complete view of your data at all times. Conduct full audits of all commands and file activity (including TLS/SSL cipher and bit strength per connection) while streamlining reporting with Syslog integration and rolling log files with configurable size limits.
File Retention Policy Management
Cerberus FTP Server offers several tools to simplify data retention policies:
Major Data Privacy Regulations that Affect Secure File Transfer
In this section, we provide a list of regulations to help your IT administration understand the requirements for your industry or jurisdiction.
General Data Protection Regulation - EU
Health Insurance Portability and Accountability Act (HIPAA) - USA
- A covered entity must implement technical policies and procedures that allow only authorized persons to access electronic protected health information (e-PHI)
- A covered entity must implement hardware, software, and/or procedural mechanisms to record and examine access and other activity in information systems that contain or use e-PHI
- A covered entity must implement policies and procedures to ensure that e-PHI is not improperly altered or destroyed. Electronic measures must be put in place to confirm that e-PHI has not been improperly altered or destroyed
- A covered entity must implement technical security measures that guard against unauthorized access to e-PHI that is being transmitted over an electronic network
For More Information: