SlideShare a Scribd company logo
1 of 3
Download to read offline
IBM Software
IBM®
Sterling
Connect:Direct
Optimize performance and manage growth
without adding IT resources
The demands are growing daily
Organizations have never seen a greater need for reliable and secure file
transfer. File transfer provides the near real-time integration needed for
applications as diverse as convergence billing in telecommunications,
synchronization of central and disaster-recovery sites, secure transfer
of check image files, and consolidation of credit card transactions.
Secure file movement must also ensure data delivery to the right
destination within the right time window, so the receiving application
can process and act upon it consistently – day after day, and year after
year. The problem is, many existing file transfer “solutions” built on
FTP do not have the necessary mechanisms for management,
monitoring, or advanced security.
IBM®
Sterling Connect:Direct®
from IBM is the leading solution for
secure, point-to-point file transfers. It has been optimized for high-
volume, assured data delivery of files within and between enterprises,
and provides script-based automation, scheduling and alert notifications
for 24x7 unattended operations. A key component of the IBM®
Sterling
Managed File Transfer solution, Sterling Connect:Direct, allows
organizations to automate the data exchange between mission-critical
applications regardless of platform.
Unlike FTP implementations, Sterling Connect:Direct eliminates the
need for manual intervention in data delivery, improving the
productivity of your people and the reliability of your business processes.
Gain unprecedented scalability
Event-based architecture enables high volumes and large files – with no
product-defined limits on file sizes. Scalability ensures that you can
handle peak demand and keep pace as your business volumes grow,
whether you operate mainframes or distributed/clustered servers.
Benefits
Improve productivity•	
Gain unprecedented scalability•	
Count on reliable file delivery•	
Ensure security and compliance•	
Leverage existing infrastructure•	
Move files with confidence•
IBM Software
2
Count on reliable file delivery
An acid test for any file transfer system is how it responds
when there is a failure. Sterling Connect:Direct, which also
supports various clustering technologies and IBM Sysplex on
the mainframe, provides built-in automation and checkpoint
restart to ensure lights-out operations.
Move files with confidence
The proprietary and secure Sterling Connect:Direct protocol
has never been breached. Our solutions help customers satisfy
regulatory and industry requirements within their file transfer
operations, including compliance with Sarbanes-Oxley,
FIPS-140-2, Payment Card Industry (PCI) and healthcare
(HIPAA) requirements. Today, IBM is the world’s most trusted
collaboration partner and the leader in secure file transfer.
Capability Description
Automation and
management
• Supports 24x7 unattended operations
• Schedules jobs on a one-time, recurring, or continuous basis
• Assigns and manages file transfer workload
• Event driven alert notification
• Process language builds scripts to provide integration with back-end systems
• API and SDK for programmatic access by other applications
Assured file delivery • Supports checkpoint restart
• Automatic recovery from network interruptions
• Automated alert notifications for success/failure
Security and
compliance
• Standard Sterling Connect:Direct
– Interfaces with operating system security for user authentication
– Provides a complete audit trail of data movement through extensive
statistics logs
• IBM®
Sterling Connect:Direct®
Secure+ option
– User authentication
– X.509 certificates for authentication
– Data encryption (SSL/TLS)
– Certificate and Certificate Revocation List (CRL) checking
– FIPS 140-2 and Common Criteria certification
• IBM®
Sterling Secure Proxy
– Demilitarized Zone (DMZ)-based
authentication, session break and SSL
termination
– Ensure that no file is stored in the DMZ
– No inbound ports opened in the firewall
– Validation of the IBM® Sterling
Connect:Direct protocol
Multiple platform
support
• Operating systems support
– z/OS
– OpenVMS
– i5/OS (OS/400)
– UNIX and Linux
– Windows
– HP NonStop
• Network protocols support
– TCP/IP
– SNA
– UDT (UNIX 4.0, z/OS 4.8, Windows 4.5)
ZZD03052-USEN-01
Please Recycle
© Copyright IBM Corporation 2011
IBM Corporation
Software Group
Route 100
Somers, NY 10589
Produced in the United States of America
July 2011
All Rights Reserved
IBM, the IBM logo, ibm.com and Sterling Commerce are trademarks or registered
trademarks of International Business Machines Corporation in the United States,
other countries, or both. If these and other IBM trademarked terms are marked on
their first occurrence in this information with a trademark symbol (® or ™), these
symbols indicate U.S. registered or common law trademarks owned by IBM at the
time this information was published. Such trademarks may also be registered or
common law trademarks in other countries. A current list of IBM trademarks is
available on the web at “Copyright and trademark information” at www.ibm.com/
legal/copytrade.shtml.
The information contained in this publication is provided for informational purposes
only. While efforts were made to verify the completeness and accuracy of the
information contained in this publication, it is provided AS IS without warranty of
any kind, express or implied. In addition, this information is based on IBM’s current
product plans and strategy, which are subject to change by IBM without notice.
IBM shall not be responsible for any damages arising out of the use of, or otherwise
related to, this publication or any other materials. Nothing contained in this
publication is intended to, nor shall have the effect of, creating any warranties or
representations from IBM or its suppliers or licensors, or altering the terms and
conditions of the applicable license agreement governing the use of IBM software.
References in this publication to IBM products, programs, or services do not imply
that they will be available in all countries in which IBM operates. Product release
dates and/or capabilities referenced in this presentation may change at any time at
IBM’s sole discretion based on market opportunities or other factors, and are not
intended to be a commitment to future product or feature availability in any way.
Nothing contained in these materials is intended to, nor shall have the effect of,
stating or implying that any activities undertaken by you will result in any specific
sales, revenue growth, savings or other results.

More Related Content

What's hot

DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017
DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017
DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017panagenda
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data SheetÉric Guay
 
Changing the Status Quo for Small Business IT Solutions
Changing the Status Quo for Small Business IT SolutionsChanging the Status Quo for Small Business IT Solutions
Changing the Status Quo for Small Business IT SolutionsBilal Jaffery
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...panagenda
 
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...panagenda
 
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
 BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful... BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...BMC Software
 
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017panagenda
 
1692 - When Lightning Strikes Collaboration
1692 - When Lightning Strikes Collaboration1692 - When Lightning Strikes Collaboration
1692 - When Lightning Strikes CollaborationChristoph Adler
 
Managing IBM ECM platforms efficiently - IBM ECM System Monitor
Managing IBM ECM platforms efficiently - IBM ECM System MonitorManaging IBM ECM platforms efficiently - IBM ECM System Monitor
Managing IBM ECM platforms efficiently - IBM ECM System MonitorRoland Merkt
 
Xmanager enterprise 5 overview
Xmanager enterprise 5 overviewXmanager enterprise 5 overview
Xmanager enterprise 5 overviewAndrew W. Chang
 
360-Degree View of IT Infrastructure with IT Operations Analytics
360-Degree View of IT Infrastructure with IT Operations Analytics360-Degree View of IT Infrastructure with IT Operations Analytics
360-Degree View of IT Infrastructure with IT Operations AnalyticsPrecisely
 

What's hot (17)

DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017
DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017
DEV-1185: IBM Notes Performance Boost - Reloaded – IBM Connect 2017
 
IBM zAware
IBM zAwareIBM zAware
IBM zAware
 
IBM Endpoint Data Sheet
IBM Endpoint Data SheetIBM Endpoint Data Sheet
IBM Endpoint Data Sheet
 
Changing the Status Quo for Small Business IT Solutions
Changing the Status Quo for Small Business IT SolutionsChanging the Status Quo for Small Business IT Solutions
Changing the Status Quo for Small Business IT Solutions
 
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...DEV-1269: Best and Worst Practices for Deploying IBM Connections  – IBM Conne...
DEV-1269: Best and Worst Practices for Deploying IBM Connections – IBM Conne...
 
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
DEV-1223: Socialytics: Accelerating IBM Connections Adoption with Watson Anal...
 
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
 BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful... BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
BMC Control-M for SAP, BPI, and AFT - VPMA - Secret Weapons for a Successful...
 
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017DEV-1268: IBM Connections Adminblast – IBM Connect 2017
DEV-1268: IBM Connections Adminblast – IBM Connect 2017
 
1692 - When Lightning Strikes Collaboration
1692 - When Lightning Strikes Collaboration1692 - When Lightning Strikes Collaboration
1692 - When Lightning Strikes Collaboration
 
IBM Capacity Management Analytics
IBM Capacity Management AnalyticsIBM Capacity Management Analytics
IBM Capacity Management Analytics
 
What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?
 
IBM Flex System Manager
IBM Flex System ManagerIBM Flex System Manager
IBM Flex System Manager
 
Managing IBM ECM platforms efficiently - IBM ECM System Monitor
Managing IBM ECM platforms efficiently - IBM ECM System MonitorManaging IBM ECM platforms efficiently - IBM ECM System Monitor
Managing IBM ECM platforms efficiently - IBM ECM System Monitor
 
IBM OMEGAMON Performance Management Suite - Long Presentation
IBM OMEGAMON Performance Management Suite - Long PresentationIBM OMEGAMON Performance Management Suite - Long Presentation
IBM OMEGAMON Performance Management Suite - Long Presentation
 
Xmanager enterprise 5 overview
Xmanager enterprise 5 overviewXmanager enterprise 5 overview
Xmanager enterprise 5 overview
 
NZS-1543 - How IBM Service Management Unite Helps Mainframe O
NZS-1543 - How IBM Service Management Unite Helps Mainframe ONZS-1543 - How IBM Service Management Unite Helps Mainframe O
NZS-1543 - How IBM Service Management Unite Helps Mainframe O
 
360-Degree View of IT Infrastructure with IT Operations Analytics
360-Degree View of IT Infrastructure with IT Operations Analytics360-Degree View of IT Infrastructure with IT Operations Analytics
360-Degree View of IT Infrastructure with IT Operations Analytics
 

Similar to IBM Sterling Connect: Direct

IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure ProxyLightwell
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeLightwell
 
IBM Managed File Transfer Suite
IBM Managed File Transfer SuiteIBM Managed File Transfer Suite
IBM Managed File Transfer SuiteLightwell
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014Leif Davidsen
 
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...WASdev Community
 
IBM Control Center
IBM Control CenterIBM Control Center
IBM Control CenterLightwell
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Precisely
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudVincent Burckhardt
 
Data Governance with IBM Streams V4.1
Data Governance with IBM Streams V4.1Data Governance with IBM Streams V4.1
Data Governance with IBM Streams V4.1lisanl
 
What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?Keshav Murthy
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...IBM Security
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITDevOps for Enterprise Systems
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherPrecisely
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the FutureLightwell
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Robert Crane
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityPrecisely
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Precisely
 

Similar to IBM Sterling Connect: Direct (20)

IBM Sterling Secure Proxy
IBM Sterling Secure ProxyIBM Sterling Secure Proxy
IBM Sterling Secure Proxy
 
IBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and ExchangeIBM Governance, Risk and Compliance for Data Movement and Exchange
IBM Governance, Risk and Compliance for Data Movement and Exchange
 
IBM Managed File Transfer Suite
IBM Managed File Transfer SuiteIBM Managed File Transfer Suite
IBM Managed File Transfer Suite
 
IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014IBM Managed File Transfer Portfolio - IBMImpact 2014
IBM Managed File Transfer Portfolio - IBMImpact 2014
 
Butterfly
ButterflyButterfly
Butterfly
 
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
AAI-3281 Smarter Production with WebSphere Application Server ND Intelligent ...
 
IBM Control Center
IBM Control CenterIBM Control Center
IBM Control Center
 
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
Ironstream for IBM i - Enabling Splunk Insight into Key Security and Operatio...
 
TI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloudTI 1641 - delivering enterprise software at the speed of cloud
TI 1641 - delivering enterprise software at the speed of cloud
 
Data Governance with IBM Streams V4.1
Data Governance with IBM Streams V4.1Data Governance with IBM Streams V4.1
Data Governance with IBM Streams V4.1
 
What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?What's new in IBM Informix 12.1?
What's new in IBM Informix 12.1?
 
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
Don't Risk Your Reputation or Your Mainframe: Best Practices for Demonstratin...
 
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed ITAligning the Fast & the Slow: The Reality of Multi-Speed IT
Aligning the Fast & the Slow: The Reality of Multi-Speed IT
 
IBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work TogetherIBM i HA and Security: Why They Need to Work Together
IBM i HA and Security: Why They Need to Work Together
 
GO AnyWhere - MFT
GO AnyWhere - MFTGO AnyWhere - MFT
GO AnyWhere - MFT
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
File Transfer of the Future
File Transfer of the FutureFile Transfer of the Future
File Transfer of the Future
 
Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015Office 365 Security, Privacy and Compliance - SMB Nation 2015
Office 365 Security, Privacy and Compliance - SMB Nation 2015
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?Government Agencies Using Splunk: Is Your Critical Data Missing?
Government Agencies Using Splunk: Is Your Critical Data Missing?
 

More from Lightwell

Lightwell at a Glance
Lightwell at a GlanceLightwell at a Glance
Lightwell at a GlanceLightwell
 
Lightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell
 
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Lightwell
 
KeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyKeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyLightwell
 
CSX Transportation IBM Case Study
CSX Transportation IBM Case StudyCSX Transportation IBM Case Study
CSX Transportation IBM Case StudyLightwell
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement ManagerLightwell
 
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyHirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyLightwell
 
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationLightwell
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyLightwell
 
Bonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyBonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyLightwell
 
IBM Distributors Order Management
IBM Distributors Order ManagementIBM Distributors Order Management
IBM Distributors Order ManagementLightwell
 
B2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicB2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicLightwell
 
Protecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomProtecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomLightwell
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewLightwell
 
IBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewIBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewLightwell
 
IBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesIBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesLightwell
 
IBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewIBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewLightwell
 
Lightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell
 
Lightwell: Company Overview
Lightwell: Company OverviewLightwell: Company Overview
Lightwell: Company OverviewLightwell
 
IBM Infographic - Enterprise File Gateway
IBM Infographic - Enterprise File GatewayIBM Infographic - Enterprise File Gateway
IBM Infographic - Enterprise File GatewayLightwell
 

More from Lightwell (20)

Lightwell at a Glance
Lightwell at a GlanceLightwell at a Glance
Lightwell at a Glance
 
Lightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution GuideLightwell Healthcare B2B Gateway Solution Guide
Lightwell Healthcare B2B Gateway Solution Guide
 
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
Solutions to Accelerate Compliance with Affordable Care Act (ACA) Mandates an...
 
KeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case StudyKeHe Distributors: IBM Case Study
KeHe Distributors: IBM Case Study
 
CSX Transportation IBM Case Study
CSX Transportation IBM Case StudyCSX Transportation IBM Case Study
CSX Transportation IBM Case Study
 
IBM Partner Engagement Manager
IBM Partner Engagement ManagerIBM Partner Engagement Manager
IBM Partner Engagement Manager
 
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case StudyHirschvogel Inc: IBM Sterling B2B Integration Services Case Study
Hirschvogel Inc: IBM Sterling B2B Integration Services Case Study
 
CEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B IntegrationCEVA Logistics: IBM Sterling B2B Integration
CEVA Logistics: IBM Sterling B2B Integration
 
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case StudyCoca Cola Bottling: IBM Sterling B2B Integrator Case Study
Coca Cola Bottling: IBM Sterling B2B Integrator Case Study
 
Bonnie Plants IBM Case Study
Bonnie Plants IBM Case StudyBonnie Plants IBM Case Study
Bonnie Plants IBM Case Study
 
IBM Distributors Order Management
IBM Distributors Order ManagementIBM Distributors Order Management
IBM Distributors Order Management
 
B2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - InfographicB2B Integration for Healthcare - Infographic
B2B Integration for Healthcare - Infographic
 
Protecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in TelecomProtecting Margins and Creating Value in Telecom
Protecting Margins and Creating Value in Telecom
 
IBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions OverviewIBM Managed File Transfer Solutions Overview
IBM Managed File Transfer Solutions Overview
 
IBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions OverviewIBM Omnichannel Commerce Solutions Overview
IBM Omnichannel Commerce Solutions Overview
 
IBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud ServicesIBM Sterling B2B Cloud Services
IBM Sterling B2B Cloud Services
 
IBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines OverviewIBM B2B Integration Gateway and Transformation Engines Overview
IBM B2B Integration Gateway and Transformation Engines Overview
 
Lightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: DetailLightwell B2B Framework Infographic: Detail
Lightwell B2B Framework Infographic: Detail
 
Lightwell: Company Overview
Lightwell: Company OverviewLightwell: Company Overview
Lightwell: Company Overview
 
IBM Infographic - Enterprise File Gateway
IBM Infographic - Enterprise File GatewayIBM Infographic - Enterprise File Gateway
IBM Infographic - Enterprise File Gateway
 

Recently uploaded

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

IBM Sterling Connect: Direct

  • 1. IBM Software IBM® Sterling Connect:Direct Optimize performance and manage growth without adding IT resources The demands are growing daily Organizations have never seen a greater need for reliable and secure file transfer. File transfer provides the near real-time integration needed for applications as diverse as convergence billing in telecommunications, synchronization of central and disaster-recovery sites, secure transfer of check image files, and consolidation of credit card transactions. Secure file movement must also ensure data delivery to the right destination within the right time window, so the receiving application can process and act upon it consistently – day after day, and year after year. The problem is, many existing file transfer “solutions” built on FTP do not have the necessary mechanisms for management, monitoring, or advanced security. IBM® Sterling Connect:Direct® from IBM is the leading solution for secure, point-to-point file transfers. It has been optimized for high- volume, assured data delivery of files within and between enterprises, and provides script-based automation, scheduling and alert notifications for 24x7 unattended operations. A key component of the IBM® Sterling Managed File Transfer solution, Sterling Connect:Direct, allows organizations to automate the data exchange between mission-critical applications regardless of platform. Unlike FTP implementations, Sterling Connect:Direct eliminates the need for manual intervention in data delivery, improving the productivity of your people and the reliability of your business processes. Gain unprecedented scalability Event-based architecture enables high volumes and large files – with no product-defined limits on file sizes. Scalability ensures that you can handle peak demand and keep pace as your business volumes grow, whether you operate mainframes or distributed/clustered servers. Benefits Improve productivity• Gain unprecedented scalability• Count on reliable file delivery• Ensure security and compliance• Leverage existing infrastructure• Move files with confidence•
  • 2. IBM Software 2 Count on reliable file delivery An acid test for any file transfer system is how it responds when there is a failure. Sterling Connect:Direct, which also supports various clustering technologies and IBM Sysplex on the mainframe, provides built-in automation and checkpoint restart to ensure lights-out operations. Move files with confidence The proprietary and secure Sterling Connect:Direct protocol has never been breached. Our solutions help customers satisfy regulatory and industry requirements within their file transfer operations, including compliance with Sarbanes-Oxley, FIPS-140-2, Payment Card Industry (PCI) and healthcare (HIPAA) requirements. Today, IBM is the world’s most trusted collaboration partner and the leader in secure file transfer. Capability Description Automation and management • Supports 24x7 unattended operations • Schedules jobs on a one-time, recurring, or continuous basis • Assigns and manages file transfer workload • Event driven alert notification • Process language builds scripts to provide integration with back-end systems • API and SDK for programmatic access by other applications Assured file delivery • Supports checkpoint restart • Automatic recovery from network interruptions • Automated alert notifications for success/failure Security and compliance • Standard Sterling Connect:Direct – Interfaces with operating system security for user authentication – Provides a complete audit trail of data movement through extensive statistics logs • IBM® Sterling Connect:Direct® Secure+ option – User authentication – X.509 certificates for authentication – Data encryption (SSL/TLS) – Certificate and Certificate Revocation List (CRL) checking – FIPS 140-2 and Common Criteria certification • IBM® Sterling Secure Proxy – Demilitarized Zone (DMZ)-based authentication, session break and SSL termination – Ensure that no file is stored in the DMZ – No inbound ports opened in the firewall – Validation of the IBM® Sterling Connect:Direct protocol Multiple platform support • Operating systems support – z/OS – OpenVMS – i5/OS (OS/400) – UNIX and Linux – Windows – HP NonStop • Network protocols support – TCP/IP – SNA – UDT (UNIX 4.0, z/OS 4.8, Windows 4.5)
  • 3. ZZD03052-USEN-01 Please Recycle © Copyright IBM Corporation 2011 IBM Corporation Software Group Route 100 Somers, NY 10589 Produced in the United States of America July 2011 All Rights Reserved IBM, the IBM logo, ibm.com and Sterling Commerce are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the web at “Copyright and trademark information” at www.ibm.com/ legal/copytrade.shtml. The information contained in this publication is provided for informational purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this publication, it is provided AS IS without warranty of any kind, express or implied. In addition, this information is based on IBM’s current product plans and strategy, which are subject to change by IBM without notice. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, this publication or any other materials. Nothing contained in this publication is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in this publication to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in this presentation may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. Nothing contained in these materials is intended to, nor shall have the effect of, stating or implying that any activities undertaken by you will result in any specific sales, revenue growth, savings or other results.