Product Owner | Infrastructure Specialist at Kyndryl
Real User
Top 20
2024-01-09T18:50:00Z
Jan 9, 2024
There is a requirement to simplify access, particularly for managing large amounts of stored data within Files.com. Instead of navigating through firewall rules, etc., users seek the ability to bypass two-factor authentication when logging in via username and password. Missing this toggle could necessitate recreating the account. Additionally, there's a lack of clarity regarding users under this system, making monitoring challenging. However, Files.com does offer SSO, which addresses many of these concerns. The solution should show more in terms of the way we navigate things like FTP or FTPS with a username/password configuration, if not through SSO. It requires the use of an API key, among other things. There are workarounds and ways to address a few of these issues.
Managed File Transfer is a comprehensive technology that allows secure, efficient, and compliant data movement across various platforms, dramatically evolving traditional file transfer methods with enhanced visibility and control.This category offers a reliable solution for businesses seeking to streamline secure data transmissions. By centralizing file transfers with improved automation, scheduling, and auditing functionalities, MFT ensures data integrity and compliance with industry...
There is a requirement to simplify access, particularly for managing large amounts of stored data within Files.com. Instead of navigating through firewall rules, etc., users seek the ability to bypass two-factor authentication when logging in via username and password. Missing this toggle could necessitate recreating the account. Additionally, there's a lack of clarity regarding users under this system, making monitoring challenging. However, Files.com does offer SSO, which addresses many of these concerns. The solution should show more in terms of the way we navigate things like FTP or FTPS with a username/password configuration, if not through SSO. It requires the use of an API key, among other things. There are workarounds and ways to address a few of these issues.