top of page

Yazam MFT

Conventional Security

Unconventional Threats

Connecting your protected network to any MFT solution or any cloud-sharing services often involves only conventional security solutions (such as ● Firewalls ● Antivirus ● Antimalware ● Web proxies ● Secure browsers ● EDR/XDR ● WAF ● Sandboxes), screens against known vulnerabilities and common malware. Encrypting the traffic is not enough. Yet, these systems often lack the deep content analysis and active neutralization capabilities required to combat complex, polymorphic, or zero-day threats hidden within arrived files.

Risky Pathways

By Managed File Transfer (MFT) Services

Managed file transfer (MFT) services are intended to provide a secure and reliable method for transferring data between partners efficiently. MFT services are marketed to companies as a more secure alternative to using less secure protocols such as SMTP, HTTP/HTTPS, FTP/SFTP, or relying on cloud-sharing services like Google Drive, Microsoft OneDrive, Apple iCloud, and Amazon Drive.

MFT solutions and cloud-sharing services often involve exchanging (receiving and sending) files between partners while integrating them into the customers' internal workflows. This essential functionality, however, represents a significant entry point for sophisticated file-based cyber threats.

Yazam MFT

The Yazam MFT is not just a Data Exchange hub, and it is not only a simple platform for transferring files between partners, but it is a complete Managed Files Transfer (MFT) solution that embeds powerful filtering, based on CDR technology, into the transfer process. This solution proactively disarms and reconstructs the inbound and outbound files, ensuring that only clean, legitimate content enters and leaves your protected networks. It provides a robust defense against embedded threats, safeguarding the files entered and leaving your applications.

Main features:

  • CDR technology is an integrated part of the core solution, and not an external add-on.

  • Users are both registered and guests.

  • Original files are sent both manually and automatically.

  • Filtered files are received both manually and automatically.

  • Sending and receiving files both by HTTPS and SFTP protocols.

  • API for external sending and receiving applications.

  • Encryption both at rest and in motion.

  • Isolation between customers and between users.

  • Logging both for the transference and the CDR filtering.

  • Multilingual user interfaces.

  • Supplied as a full service (SaaS).

bottom of page