image

Where is File Trans­fer Soft­ware installed?

By locat­ing and iden­ti­fy­ing all of the servers run­ning File Trans­fer soft­ware in your orga­ni­za­tion, the File Trans­fer Audit gives you the infor­ma­tion nec­es­sary to eval­u­ate them and decide whether to dis­able or secure the File Trans­fer soft­ware appro­pri­ately, depend­ing upon the needs of the busi­ness. Most cor­po­ra­tions reg­u­larly dis­cover servers run­ning File Trans­fer soft­ware in their net­work that were never autho­rized by IT and are expos­ing the com­pany to unnec­es­sary risk.


The screen­shot is a net­work scan which iden­ti­fies every server that is run­ning File Trans­fer software.
213 servers were located, a num­ber of which allow Anony­mous Login.
With a double-​click you can dis­play the con­tent of the server’s default folder.

The scans usu­ally also locate known servers, autho­rized for File Trans­fer usage. These can be excluded so you can focus on the new and ques­tion­able servers that are found.

Next Steps


File Trans­fer Analysis
Typ­i­cal Find­ings





Con­tact us for more infor­ma­tion

Want to know more?