APRIL 2009 www.axway.com   

  In This Issue
» Introducing Axway B2Bi Express — Simplified, Pre-packaged B2B

» The Convergence of B2B, MFT & Email Security

» ING Ensures Stability and Security with Axway Managed File Transfer

» DB Schenker Implements Axway Synchrony™ for Multi-enterprise Integration Platform

» Axway and Lawson Expand Longstanding Partnership Providing Multi-enterprise Business Solutions

» Axway's 2008 Earnings Reflect Importance of Technology in a Challenging Economy

» Axway News

» Events & Webinars

» Axway Training

» Customer Quick Links

» Connections 2009

» Follow Axway on Twitter

  Axway News

Axway Wins 2009 HDMA iBusiness Solution Award for Axway Trade Activity Manager

Axway's Tumbleweed Validation Authority Integrates with BlackBerry Solution for Government Mobile Security

Publix Super Markets, Inc. Chooses Axway to Improve and Secure Mission-Critical Data Exchanges

All Axway News
  Events & Webinars

RSA Conference 2009
San Francisco, CA
20-24 April 2009

Lawson Conference and User Exchange 2009
San Diego, CA
19-22 April 2009

Gartner SOA & ADI Summit
London, UK
24-25 June 2009

Axway Event Center
  Axway Training

Gateway Interchange 5 AS (EDIINT)
21-24 April 2009
Chicago, IL

Gateway XFB
21-24 April 2009
Uxbridge, UK

Synchrony Sentinel
12-15 May 2009
Atlanta, GA

Full Course Catalog
  Connections 2009

Save the Dates!
Axway's Annual Customer Conventions:

North America
20-22 October 2009
Arizona Biltmore
Phoenix, Arizona

October 2009

More details coming soon!

The Convergence of B2B, MFT & Email Security
By Paul French, Vice President, Product and Solutions Marketing, Axway

"Define your risks in terms of visibility," I say. "What happens in real time or near real time? What sort of alerts do you have in place? How are you keeping track of files and messages so that errant ones can be tracked down and stewarded back to their destination?"

Consider that you must manage the processes associated with these questions, and that you must manage files and messages as they move inside the processes — not merely the files and messages themselves, as if they are self-propelled parcels that don't rely on stewards — drivers, pilots, delivery people — as they travel from one doorstep to another.

I tell the client to demand this level of visibility, to know exactly what they have.

"But how can I demand this level of visibility when customers won't buy a completely new infrastructure?" they ask. "How can I afford to do business with customers who take intolerable risks so lightly? How can I afford not to do business with them?"

You adopt flexible B2B, MFT, and email security infrastructures that allow you to do business the way you need to do business while allowing your customers to do business any way they like, and making it impossible for them to expose you to risk.

Flexible B2B, MFT, and email security infrastructures empower a company to identify and fix a specific business problem, whether it's a risk management problem, a compliance problem, or a cost-of-ownership problem, where you suddenly realize you're paying exorbitant sums to five different vendors when a single vendor could do the job for far less.

That's just for starters.

They also accommodate future compatibility.

In an economy like this, in a highly regulated industry, and in an industry whose players grow as a result of mergers and acquisitions (the story of virtually all of today's large companies), who knows what you'll be doing five years, two years, even a year from now? You need solutions that are compatible with anything and everything your partners throw at you.

You need to be able to control and monitor everything that is leaving your organization, leaving your domain, and coming into your domain. And you will need to do so without having to jump into five different environments. You will need to centralize that control, centralize that governance. Whatever industry you're in and however you make money for the company! - L. Frank Kenney, Gartner, Inc.

(How many B2B, MFT, and email security solutions vendors would you expect provide this consolidated view?)

This consolidated view isn't just a preventative measure, either. Like all truly great solutions, it is both preventative and corrective. Once you have it, once you can manage all interactions without inhibiting business, what benefits can you expect? To name just a few:
  • Root out and solve customer issues with increased efficiency.
  • Enhance customer revenue opportunities by tying events together.
  • Predict sourcing changes in real time.
  • Collaborate more effectively with your customers, co-innovate with them, and give them a view over all their collaborations.
It's critical that you bring together B2B, MFT, and email security in a way that manages policies and normalizes data from different ad-hoc systems and accommodates the way people actually work — in a manner that, despite their best intentions, exposes their company and business partners to intolerable risks. When a well-intentioned person does a silly thing, like sending an unencrypted email with a highly sensitive attachment, a consolidated system eliminates the risk. Aware of a company's policies, it will stop that email, sequester it cold, and allow a company to make decisions about it.

So how long has this been a problem? A year? Two years? When exactly did B2B, MFT, and email security converge?

I'll ask and answer a final question.

When was the first time a company sent an email with an attachment to another company?

That's when.


Quick Links
Axway Support Site
Axway User Forum
Axway Connections

More from Axway
Follow Axway on Twitter

Contact Us
Online Request Form
Find a Location

In the June 2009 Issue:
Email & Data Security, Connections Updates, and More!

© 2009 Axway All rights reserved.