タグ: mft gdpr
CData Arc Recognized by G2 for Best ROI
We are proud to announce that once again, CData Arc has been recognized by G2 in the Best Return on Investment(ROI) Winter 2022 category. G2 is the world s largest tech marketplace which gathers thousands of reviews by actual users to help them make buying decisions for their business technology. G...
Connecting B2B Integration with Salesforce
Many organizations think about data movement differently based on whether integrations are internal or external facing. Internal data integration refers to the connectivity between applications and data sources that support internal operations — for example, connecting Salesforce with data from an ...
A Commonsense Approach to EDI and Managed File Transfer Pricing
Software licensing runs the gamut from perpetual to subscription, transactional and connection-based. Deciding on which approach is best for an organization is traditionally driven by the software vendors pricing policy and/or the size of the buyer s budget. In today s world of serverless technolog...
CData Arc V21 Released
We are excited to announce the latest release of CData Arc Version 2021. Extend CData Arc with custom connectivity, link your entire cloud application ecosystem, and simplify user management for scalable self-service integrations. The latest CData Arc release is packed full of new enterprise capabi...
CData Arc V21 Beta
We are excited to release the first public beta of the all-new CData Arc 2021. Extend CData Arc with custom connectivity, link your entire cloud application ecosystem, and simplify user management for scalable self-service integrations. The latest CData Arc release is packed full of new enterprise ...
How CData Arc Ensures GDPR-Compliant File Transfer
The General Data Protection Regulation (GDPR) is a set of rules designed to give citizens of the European Union greater control over their personal data and their data transfers. GDPR also requires businesses to ensure personal data remains private and to notify customers of any data breaches. Whil...
Healthcare EDI Basics: What You Need to Know
Many things come to mind when we talk about healthcare. From technologies and lifesaving procedures to tireless staff who are dedicated to helping patients live better lives. Not typically at the forefront of our minds are the vast mounds of paperwork needed to support these healthcare professional...
EDI to Excel Translation: A Quick and Easy Way to Get Started with EDI
Getting your EDI process up and running with a new trading partner is typically a time-consuming and complex process. You need to get specifications from your partner describing the EDI format they require and set up a template for translating data from your operational systems into the requisite E...
Do You Have a Process for File Transfer Governance?
The onslaught of data security breaches today is relentless. The first six months of 2019 alone saw more than 3,800 breaches, an increase of 54 percent over the previous year, according to a report by Risk Based Security . The costs for each breach have burgeoned as well. The 2019 Ponemon Institute...
What You Risk When You Keep Your Legacy File Transfers
Many organizations continue to use legacy solutions to perform critical enterprise file and data transfers. These outdated technologies can include everything from unsecured FTP clients to hand-coded scripts and legacy “managed file transfer tools. While these collections of ad hoc approaches typic...
17 Ways MFT is Superior to Scripting for Automating File Transfers
File transfer is essential to many business processes. It provides a straightforward way for trading partners to share critical information. But many of the tasks involved in file transfer are tedious and repetitive. As a result, many system administrators today use scripting to automate file trans...
How to Reduce The Most Common File Transfer Security Risks
Individuals are constantly transferring files to their colleagues and trading partners, whether those files are Word documents, reports and spreadsheets, or shipping notices and acknowledgements. Most of the time, people simply assume these file transfers are safe. But in reality, hidden risks abou...