Where is File Transfer Software installed?
By locating and identifying all of the servers running File Transfer software in your organization, the File Transfer Audit gives you the information necessary to evaluate them and decide whether to disable or secure the File Transfer software appropriately, depending upon the needs of the business. Most corporations regularly discover servers running File Transfer software in their network that were never authorized by IT and are exposing the company to unnecessary risk.
The screenshot is a network scan which identifies every server that is running File Transfer software. 213 servers were located, a number of which allow Anonymous Login. With a double-click you can display the content of the server’s default folder.
The scans usually also locate known servers, authorized for File Transfer usage. These can be excluded so you can focus on the new and questionable servers that are found.