Common FTP Today Risk Assessment Questions & Answers

How is data secured at rest?

All customers have the option of using client-side tools such as PGP to encrypt their files while at rest. We also offer an optional server-side file encryption service that will automatically encrypt files while at rest, which is transparent to all users and therefore requires no client-side tools to encrypt or decrypt files. More info

How is data separated from other customer/tenant data?

  1. Each tenant FTP site used a chrooted environment that limits the site owners to a particular directory tree for only that FTP site. There is no possibility of one tenant gaining access to another tenant's data.
  2. Network access is limited by active network protocols (controlled by you; see below) and is also limited to your FTP site’s target IP address (which is dedicated IP address we have assigned to your particular FTP site).

How long do files reside on the server?

This is entirely up to you. You and your users can manually delete files or you can let the system auto-delete files based on age since upload. You can control the aged deletion at the site level and also override the site default on inpidual workspaces in order to maintain separate file retention settings. File Retention Controls require either our Private Business plan or our Compliant Enterprise plan.

How is data securely erased from the system?

If and when you are no longer an FTP Today customer, your site and any remaining data will be erased immediately. Any hard drives removed from service are magnetically erased.

How is logical access addressed for admins of system?

On the back end, FTP Today's system admins can only access our systems over a VPN through our firewall. There is no public IP address for system administration. In addition, system admins must use a custom port for command line SSH access.

On the front end, anyone that you designate as a site administrator will have secure management access via our proprietary control panel (a web browser URL protected by high-grade HTTP-SSL).

What are the security features and capabilities available to customers to manage the security of their data?

  • Site Level Security Controls:
    • Protocol Blocker to limit active site protocols (all plans).
    • Country Bclocker to limit countries from which a login prompt is presented (all plans).
  • User Level Security Controls:
    • User IP & Protocol Enforcement to limit each user's remote IP address and/or protocol (Compliant Enterprise plan).
    • Password Enforcement to require password strength and expiration  (Compliant Enterprise plan).
    • SSH-key Authentication to require passwordless authentication with a Private/Public Key Pair belonging only to the end user.
    • Workspace Access to assign each user access to only certain data folders (all plans).
    • Workspace Permissions to limit each user to upload, download, delete and list directory on a per-user, per-workspace basis  (all plans).

What level of logging is available for customers?

Highly detailed logs are kept perpetually for as long as you are a customer. These logs are always available for you to download and are never deleted. More info

Talk to an FTP Today consultant and find out what the best subscription choice is for your business - contact us today by filling out the form to your right.

 
Yes