Operation management, operation support, and security

Management Functions

The following are functions used for operation management:

  • The management information required for a file transfer and the system environment of the local host are set in the system management information.

  • Transfer status and log records of operations can be viewed and output from the HULFT Management Console or by running commands.

For details about these functions and other available functions, refer to System management functions.

 

Support Functions

The following are functions used for operation support:

  • Business application jobs can be linked with the Send processing and the Receive processing. Linking transfer processing with business operations before and after file transfer can automate a series of operations and eliminate the need for human intervention.

  • An email can be sent after a file transfer. It is possible to send the file transfer result or other information in the message of the email after a file transfer ends. To do this, specify the information such as the address and body text in the Mail Interface Information, and associate it with the Send Management Information or with the Receive Management Information.

  • Multiple files can be joined and sent together. Also, the content in the received file can be split up and used. Multiple related files or multiple files in different data formats can be sent together.

For details about these functions and other available functions, refer to Support functions for the system operation.

 

Security

The following are functions used for maintaining security:

  • HULFT can encrypt the data when files are transferred. This allows files to be transferred over the Internet (VPN) securely.

  • Data consistency of received files can be checked. You can compare sent and received files to confirm that the data was not altered during transfer.

  • File access records and command execution records can be output to the operation log. If a suspicious log record is found, or if an improper value is set to the management information, you can identify when the log or management information was updated by whom.

For details about these functions and other available functions, refer to Security.