Cornerstone MFT Server is a managed file transfer server with multi-layer security, high availability and automation. An MFT Server solution must meet the latest versions of compliance standards and provide point-to-point encryption with no gaps. High Availability and failover features mean that Cornerstone MFT Server is always available, while powerful automation capabilities keep your business processes moving.
Security and compliance are primary concerns for every business. Cornerstone MFT Server is simple to deploy, with highly-granular configuration options to assure that security settings are correct for each server instance, user and group in your Cornerstone MFT Server installation.
Cornerstone’s rapid onboarding means that users don’t need to resort to readily-available but risky consumer grade services. Available on premise or in the cloud, Cornerstone offers the immediate solution to keeping control of your critical files, maintaining security policies, and offering users the productivity solution that they can quickly and easily adopt.
Cornerstone MFT balances security and productivity. Implement IT security policies, protect your confidential data, and give your users effortless file sharing.
The productivity benefits of Enterprise File Sync and Share with the security, automation and compliance of Managed File Transfer. In one simple solution.
You have work to do. Your employees have work to do. Consumer-focused file sync and share services seem to make it easy to share files internally and with customers and partners. But at what cost?
High profile data breaches continue to plague consumer file sharing services, but the risks go far beyond hackers and privacy concerns. When users rely on unsanctioned file sharing services to get their work done, your critical files walk out the door with them if they leave the company. And there’s nothing you can do about that.
Unless you implement a better solution. Cornerstone MFT provides the effortless file sharing that has become the expectation of business users, with the security, tracking and control that you need to protect your confidential files and your business.
Secure file transfer only solves a piece of your data security and compliance requirements. There are other considerations that, if overlooked, can result in costly compliance violations or data security breaches.
When files are stored on your server, there is still a need to assure that they are protected from unauthorized access. Cornerstone’s Real-time PGP encrypts the files on your servers with the highest industry-standard encryption. This process avoids interim steps that write the unencrypted data to the disk. Cornerstone encrypts that data on the fly so that it is never exposed, and does not require additional steps to sanitize deleted data.
Preventing unauthorized access to your network, without increasing complexity for you users and IT department, is easily accomplished with Cornerstone. Using a combination of perimeter security and two-factor authentication, risks of network breach are greatly reduced.
Perimeter Security with DMZedge. To keep unauthorized users out of your network, the optional DMZedge server, used in with CornerstoneMFT, enables you to close inbound ports on your firewall, opening a dynamic outbound connection to service user requests.
Two-factor Authentication e-tokens. Text passwords can be easily broken, and users frequently write them down or share them. CornerstoneMFT, used in conjunction with WebDrive, adds a second layer of authentication security – one that is not easily compromised.
When files are uploaded or downloaded from your server, you need the assurance that they are safe from unauthorized access. This is especially important if you store financial or healthcare data. Cornerstone secures your files transfers using your choice of secure protocols. You can use SFTP or run FTP or WebDAV through an SSL encrypted connection.
Cornerstone can require all connections to the server to be secure, refusing any unsecure connections.
Cornerstone Cloud provides all of the security and performance features of an on-premise MFT Server, with the convenience and cost savings of a cloud solution. Now available in Amazon’s AWS Marketplace as a pre-built AMI.
Visit the Cornerstone Cloud page in the Amazon Marketplace for additional details, pricing and available configurations.
Try it now and see how easy and cost-effective Cornerstone Cloud can be for your organization.
Cornerstone is the Managed File Transfer solution that provides security and performance that’s easy to implement and easy to manage. Cornerstone Cloud provides the additional benefit of running in the cloud. If you prefer the on premise version of Cornerstone, you can download now.
The DMZedge Server enables you to close inbound ports on your firewall, reducing the risk of network intrusion and enabling the highest level of security for both data storage and transfers. When combined with the Cornerstone MFT Server, the DMZedge Server uses a two-way connection originating from the Secure MFT that is inside of the firewall on your corporate LAN. The DMZedge works as a communication proxy, replacing unsecure inbound connections from the Internet to your internal network.
The DMZedge Server works as a proxy between users on the Internet and your secure corporate LAN. DMZedge Server resides in the Demilitarized Zone (DMZ) – outside of your corporate firewall. The Cornerstone MFT Server that resides on your network initiates a session with the DMZedge through a secure outbound connection. All incoming client requests and data are forwarded to the back-end server through a connection that has already been established between the MFT Server and the DMZedge Server. The MFT servers reside securely behind your corporate firewall, although ease of access for your end users is as simple as if the servers were in your DMZ. Data storage and authentication take place on the back-end server, and no inbound ports are opened through your firewall.
The design of the Cornerstone MFT solution provided us with greater securityFrederick Curry
which assists us in meeting our regulatory requirements.
Director of Information Security
Children’s National Medical Center