Secure File Transfer with DEXcenter

Corporate product data is your most valuable asset yet frequently it is put at risk via unsecure email and ftp exchanges. DEXcenter provides a secure, web environment for managed exchange of sensitive proprietary data. Data exchanged through DEXcenter is encrypted while in transit across the internet to prevent interception by others. Additionally records of every exchange are maintained to validate what each partner was sent, when it was sent, and when they received it. Since DEXcenter is a web solution, it is extremely easy to learn and use.

Security

  • Since DEXcenter is installed in your network, it utilizes security mechanisms you already have in place
  • JEE 4 tier architecture separates data and application components to minimize unauthorized access risks
  • Industry standard JBOSS application server combined with Oracle or MySQL database support
  • SSL encryption for transmission (https or sftp)
  • The modular architecture is compatible with firewalls
  • Files reside safely in your network until retrieved by recipient or alternately can be delivered directly to a partner's SFTP site
  • Access is controlled by requiring a unique username and password authenticated through LDAP, SSO, or DEXcenter's built-in authentication method
  • Users can access only their own data and information
  • Suppliers have no knowledge of other suppliers

Management

  • Exchanges are organized into Sessions
  • Each Session is accessible only by the individuals to whom it was sent
  • Each transaction is logged in a database to support auditing and verification. A built in Report Generation function allows easy generation of usage and auditing reports
  • Automatic PURGE functions delete sessions of a specified age
  • User profiles maintain critical information to allow easy and consistent use
    • The type of data preferred to be received
    • Limit exchange to only specified recipients
    • Which data to provide to recipients
    • Transmission methods
    • Translation processing methods
    • Ensures ITAR Compliance
  • Protects Intellectual Property by ensuring appropriate confidentiality agreements are effective.
Contact
Demo