玉山科技 AsiaPeak  
 


中文首頁
最新消息

解決方案

產品

檔案傳輸管理(MFT)

檔案加密傳輸服務

檔案傳輸管理員

檔案傳輸代理服務

跨平台SFTP/FTPS指令API

高速檔案傳輸

硬體加密模組(HSM)

網路型 HSM

單機型(PCIe卡) HSM

USB介面 HSM

OpenPGP加密

PGP加密指令集與API

PGP for Java API

PGP加密原理

電子時戳

資源

連絡我們

English Version

檔案傳輸服務

功能清單

 

File Transfer Protocols

SFTP - FTP over SSH
FTPS - FTP over SSL/TLS
SCP - Secure Copy over SSH
Standard FTP
HTTP/s
AS2 receive

Operating Systems Supported

Windows Server 2003, 2008 and 2012
Windows 7, 8, XP and Vista
Linux (Red Hat, SUSE, Ubuntu, CentOS, etc.)
UNIX
AIX for IBM Power Systems
IBM i (AS/400, iSeries)
HP-UX
Solaris
Mac OS X

Virtualized Environments

VMware Ready (certified)
Microsoft Hyper-V
IBM Power VM

Administration

Browser based administration (no PC install)
Secure access over HTTPS
Remote configuration and monitoring
Intuitive dashboard with quick links, statistics and tips
Graphical screens with point-n-click wizards
Context sensitive help text
Separation of duties (role-based permissions for admins)

Browsers Supported

Microsoft Internet Explorer
Mozilla Firefox
Google Chrome
Apple Safari

User Account Creation

Create accounts using templates
Auto-create accounts from Active Directory (AD) or LDAP servers
Import accounts from CSV or XML files
Self-register accounts with optional approval process
Allow users to invite others to register
Create accounts through API calls from external apps

User Authentication Methods

Active Directory (AD)
LDAP
IBM i user profiles
GoAnywhere database
SSL certificates (X.509 Standard)
SSH public keys
Single sign-on (SSO) support using SAML v2.0

Active Directory (AD) and LDAP Synchronization

Password strength policy (min length, special char, etc.)
Password age enforcement (min/max number of days)
Password history (disallow reuse of prior passwords)
Password expiration intervals (in days)
Password expiration email notifications
Administrator can force password reset
User can be allowed to change own password
Passwords encrypted using strong SHA-512 hash algorithm

User Account Security

Authorize services (SFTP, HTTPS, etc.) per user
Adopt user permissions from groups
Configure IP whitelists (allowable IPs) per user
Restrict login to certain days of the week (e.g. Mon-Fri)
Restrict login to certain times of the day (e.g. 8am-5pm)
Expire temporary accounts on specific dates
Auto-disable user accounts after X invalid login attempts
Auto-disable user accounts with no activity in X days
Time out sessions after X seconds of inactivity
Manually disable user accounts
Limit or disable anonymous access

Folder Configurations

Auto create folders using variables and/or constants
Virtual file and folder names (user friendly aliases)
Defined on user, group and template levels
Unlimited subfolders
Disk quotas at the user, group and folder level
Create and manage virtual folders/files through API calls

Folder/File Permissions

Upload (Write)
download (Read)
List
Overwrite
Append
Rename
Delete
Checksum
Subfolder Create
Subfolder Rename
Subfolder Delete
Share folders and files with other users

File Systems

Local file system
UNC paths
Mounted drives (e.g. NFS)
Network Attached Storage (NAS)
Storage Area Network (SAN)
Mapped drives
Samba (SMB)
Common Internet File System (CIFS)
IFS on IBM i
Chroot Jail

Encryption for File Transfers

Encrypt data in transit over SSL, TLS or SSH
Strong ciphers: AES128, AES192, AES256, Triple DES
Legacy cipher support: DES, RC4, Blowfish
Configure the ciphers allowed for client connections
Force encrypted command channels
Support for implicit and explicit SSL
FIPS 140-2 validated algorithms from RSA

Encryption for Data at Rest

Specify the targeted folders for encryption
Automatically encrypt files when written to targeted folders
Automatically decrypt files when read from targeted folders
Utilizes strong AES256 cipher and random key for encryption
Supports both local folders and network shares

Key and Certificate Management

Browser-based integrated Key Manager
Create new SSH keys and SSL certificates
Import existing SSH keys and SSL certificates
Export SSH keys and SSL certificates
Add and remove SSH keys from API interface
Assign one or more SSH keys per user
Authorize key management role to only certain admins

Connectivity

IPv6 compatible
Dual-stack network support (IPv4 and IPv6 coexisting)
Custom login banners
Multiple listeners allowed for inbound connections
Configurable port numbers
Can limit number of concurrent connections
Compression to reduce bandwidth requirements
Reject or accept files with certain extensions
Redirect HTTP traffic to HTTPS
Clear Command Channel (CCC) support for FTP/FTPS

Bandwidth Throttling

Limit upload speed
Limit download speed
Limit by specified days of the week
Limit by specified times of the day

Guaranteed Delivery

Support for client auto-resume / append
File integrity checksum
Mac algorithms of SHA1 and MD5

IP Filtering

Global IP blacklists and whitelists
User-level IP blacklists and whitelists
Monitor for DoS attacks (anti-hammering) with auto blacklist
Monitor for Brute Force attacks with auto blacklist
Temporary and permanent IP blacklisting
Email alerts on auto-blacklisted IPs

High Availability and Clustering

Database tables for product data (simplifies backup/recovery)
Active-Passive for disaster recovery
Active-Active for automatic failover
Cluster multiple systems (no 3rd party tools required)
Load balance sessions between multiple systems

DMZ Gateway

Inbound reverse proxy
Can keep sensitive files in the private network (out of DMZ)
Allows closing inbound ports into the internal/private network
Can optionally serve as an outbound (forward) proxy
Single DMZ gateway can service multiple systems

Auditing

Audits user login activity
Logs unauthorized attempts
Logs all trading partner account activity
Database storage of audit log entries
Optional SYSLOG feed of audit records
Automatically can archive old audit entries
Retention period can be customized
Real time monitoring of active sessions
Email alerts for invalid login attempts

Reporting

View audit logs from browser-based dashboard
Filter results by user, date, time, IP, etc.
Focus on certain activity (e.g. downloads, uploads, etc.)
Select which columns to show/hide
Sort columns by user, date, time, etc.
Export filtered audit entries into CSV format
Authorized users can view own activity logs

Workflow Automation - Triggers

Create triggers based on uploads, downloads, etc.
Multi-level conditions using IFs, ANDs and ORs
Complex expressions using parenthesis
Filter conditions based on user, file name, folder, etc.
Send custom email notifications
Launch external programs and scripts with parameters
Move files
Rename files
Delete files
Run projects in GoAnywhere Director?

Backend Database Support (for storing product tables)

DB2 for IBM i
Derby
Microsoft SQL Server
MySQL
Oracle

Adhoc File Transfers

Browser-based HTML web client for adhoc file transfers
Optional applet web client for enhanced file transfers
Multi-select files and folders
Context sensitive right-click menus
Drag-n-drop files for uploads and downloads
Monitor progress of transfers
Queue to process large numbers of transfers
Verifies the integrity of files
Large file support
Users can share folders and files with other users (if authorized)
Rebrand web client with custom logo, colors, fonts
Multilingual screens with support for 7 different languages
Customizable disclaimer and privacy policy

Secure Mail (email alternative for sending large or sensitive files)

Send secure mail from Outlook 2010 and 2013
Optionally send secure mail using a browser-based form
Attachments are automatically stripped and centrally stored
Address book to store frequently used contacts and groups
HTTPS links are generated for each secure mail package
Option to expire package after X number of days
Option to limit the number of downloads
Password protection; send in the same email or separately
Certified delivery option; recipient(s) must register before access
Customizable templates for email notifications
Sender can recall packages
Sender can receive notifications when packages are read
Inbox for working with messages received
Receipients can be forced to reverify email address
Recipient(s) can reply to sender
Files and messages are stored in encrypted format
Automatic cleanup of expired packages
Local control of secure mail packages (not hosted)
Administrator can restrict Secure Mail to certain email addresses

Mobile Devices (e.g. Smartphones, Tablets, etc.)

GoAnywhere administration through the browser
Perform adhoc file transfers from Android mobile device
Send Secure Mail from Android mobile device

System Alerts

Send emails to one or more administrators for system events
Alert when GoAnywhere is started or shut down
Alert when available memory reaches a minimum value
Alert when SSL certificates are about to expire
Alert when a license key is about to expire
Alert when a Trigger fails

Support

Phone based support with toll-free number
Email support
Live chat
Community web-based forum
Self-service knowledgebase
Product manuals in HTML and PDF format
Maintenance includes product upgrades

Licensing

On-premise software (not hosted)
Licensed per server partition/instance
Unlimited trading partner accounts
Unlimited administrator users
Unlimited transfers


 


相關資料:


Google

玉山科技 版權所有 © Copyright AsiaPeak 2006, All Rights Reserved