The Transfer Files

Pro2col

Inside the World of Secure File Transfer. The podcast built for IT professionals at every level. Whether you’re just beginning to explore secure file transfer or you’re a seasoned software engineer looking for deeper insights, every month, we bring you expert takes, real-world lessons, and the latest on secure data movement. Subscribe now and never miss an episode.

Episodes

  1. 4 FEB

    Shadow IT Risks and Zero Trust Security Explained

    Welcome to Episode Five of The Transfer Files Podcast .In this episode, hosts James and Steph are joined by returning guest Dave Hendley, Head of Technical at Pro2col, to unpack two of the most talked-about topics shaping cybersecurity today: Shadow IT and the rise of the Zero Trust security mindset.Shadow IT is expanding rapidly, driven by unsanctioned file sharing tools, creating hidden and unmanaged data transfer and compliance risks across organisations. At the same time, Zero Trust is becoming a strategic priority across enterprises globally, with CIOs, CISOs, and executive leaders now paying closer attention to cyber risk and operational resilience. This episode breaks down why Shadow IT continues to grow, how legacy file transfer methods like FTP amplify risk, and why Zero Trust principles are now essential for securing data flows, supply chains, and third-party relationships. If you’re an IT leader, security architect, or executive responsible for protecting sensitive data and critical systems, this conversation delivers practical insight into how Zero Trust thinking reduces exposure from Shadow IT and unmanaged file transfer risks.(00:00) Introduction to today’s episode of Shadow IT & Zero Trust Strategy (01:06) Why Shadow IT Is exploding in Modern Organisations (01:41) What is Shadow IT? (02:32) Most common Shadow IT tools in use today (03:33) Why AI tools are driving Shadow IT growth (06:37) Shadow IT risks & security threats explained (08:42) Are Legacy FTP Systems a security risk? (11:36) What is Zero Trust architecture? (12:52) How Zero Trust applies to File Transfer security (15:16) Why IT Leaders must adopt a Zero Trust mindset (16:08) Key takeaways from the episodeResources: 🟦 Get the Zero Trust Data Transfer whitepaper discussed in this episode - https://pro2col.com/a-zero-trust-approach-to-data-transfer?utm_source=podcastFollow Pro2col:LinkedIn - https://www.linkedin.com/company/pro2col/ Twitter - https://x.com/pro2colgroup#ShadowIT #ZeroTrust #CyberSecurity #FileTransferSecurity #MFT #ITSecurity #DataProtection #EnterpriseSecurity

    19 min
  2. 7 JAN

    The Framework Every Enterprise Needs for Secure File Transfer

    Welcome back to Episode Four of The Transfer Files Podcast.In this episode, hosts James and Steph are joined by Dave Hendley, Head of Technical at Pro2col, to unpack the Enterprise Maturity Model for Managed File Transfer (MFT) - a practical framework designed to help organisations assess, benchmark, and improve their file transfer infrastructure. By plotting solution capability against support capability, listeners will gain a clear understanding of where their organisation currently sits, and the steps needed to move forward securely, efficiently, and at scale.Whether you’re responsible for file transfer strategy, security, or operations, this episode provides valuable insight into how mature your MFT environment really is.(00:00) Introduction (00:57) How Dave’s love of technology led him into secure file transfer (02:23) Introducing today’s topic: The Enterprise Maturity Model for MFT (02:53) What is the Maturity Model for Managed File Transfer? (04:29) The five stages of solution capability (06:27) The five levels of support capability (07:23) Why businesses should care about their maturity level (09:05) Using the framework as an organisation-wide tool (10:46) Where organisations commonly fall short (14:14) How the Maturity Model is driving conversations across the file transfer space (16:48) Key takeaways from the episodeResources: 🟦 Download the Enterprise Maturity Model for Managed File Transfer - https://pro2col.com/managed-file-transfer/maturity-modelIf you’re wondering where you land on the maturity model and want to talk it through with someone who knows the space, we’re always happy to help. Get in touch and let’s have a conversation about your file transfer setup - https://pro2col.com/contact-us Follow Pro2col:LinkedIn - https://www.linkedin.com/company/pro2col/ Twitter - https://x.com/pro2colgroup #TechPodcast #EnterpriseTech #ITPodcast #ManagedFileTransfer #MFT #SecureFileTransfer #DataSecurity #EnterpriseSecurity #MaturityModel #ITStrategy

    19 min
  3. 03/12/2025

    Supply Chain Risk and Security Explained

    Welcome back to episode 3 of The Transfer Files where we dive into one of the most pressing issues facing businesses today - supply chain risk and security. In this episode, James and Steph unpack what is meant by “supply chain” in the context of file transfer, exploring not just the internal movement of data within an organisation, but also how businesses interact with external partners and suppliers. They discuss why supply chain security has come under increased scrutiny, citing recent high-profile cyber breaches that have had devastating financial and reputational consequences for companies across the globe. Listeners will also gain insights into how a secure managed file transfer system can help protect the supply chain, provided it is properly maintained, updated, and supported. They also highlight “red flags” for IT teams, such as lack of ownership of data transfer processes or not knowing what sensitive data is moving in and out of the organisation, and why addressing these issues proactively is essential. (00:00) Introduction (01:02) Today’s topic: supply chain security and scrutiny (01:28) Understanding the supply chain in the context of file transfer (03:07) Looking beyond your internal supply chain (05:05) Drivers of increased scrutiny (05:52) Notable cyber security breaches in the broader IT space and their impacts (09:49) The IT landscape is only getting more complex (10:56) How secure file transfer helps protect your supply chain (13:26) Importance of keeping systems updated and data secure (13:59) Consolidating tools and following best practices (15:10) Red flags IT teams should look out for (18:05) Key takeaways If you have questions or want to learn more about securing your supply chain and file transfer processes, reach out to our team https://pro2col.com/contact-us Follow Pro2col: LinkedIn - https://www.linkedin.com/company/pro2col/ Twitter - https://x.com/pro2colgroup #techpodcast #managedfiletransfer #securefiletransfer #datatransfer #cybersecurity #datasecurity #supplychain #supplychainmanagement

    21 min
  4. 05/11/2025

    How to Navigate the Complex World of Secure File Transfer

    Welcome to Episode 2 of The Transfer Files. In this episode, we unpack the niche yet complex file transfer space, discussing how the market has changed over time, and the variety of solutions available today. James shares insights on what matters most when embarking on a secure file transfer journey and how organisations can prioritise their requirements to find the right fit. We explore the different file transfer environments you can set up and discuss the strategic considerations that guide these choices. We also examine the current state of the MFT industry, including market growth forecasts, key players and trends, and the Gartner Quadrant landscape. Whether you’re just starting your journey with secure file transfer or looking to migrate an existing solution, this episode offers guidance, market insights, and expert perspectives to help you make smarter decisions. (00:00) Intro (01:22) File Transfer: A niche space but with many options (02:12) Key considerations on the secure file transfer journey (02:55) How the file transfer market has changed over time (04:05) Different file transfer environments you can set up (05:50) Discussing the MFT Industry Growth Forecast (07:30) Who are the key players in the market? (07:50) MFT Gartner Quadrant and current market landscape (10:32) Pro2col involvement as a Gartner Partner (11:04) Priorities when implementing an MFT solution (11:40) MFT functionality explained with a car analogy (12:55) Considering regional solutions based on location (13:40) “If it’s not broke, why fix it?” (14:35) Always consider the strategic direction of your business (15:37) Broader trends in the MFT market (17:52) Recommendations for implementing a data transfer solution (19:47) Key takeaways Resources: 🟦 Compare the top Managed File Transfer Tools - https://pro2col.com/mft-software-tools-list 🟦 Compare the best Cloud File Transfer Tools - https://pro2col.com/cloud-managed-file-transfer/best-cloud-mft-software 🟦 Gartner Insights - https://pro2col.com/gartner-managed-file-transfer-magic-quadrant 🟦 Explore industry use cases - https://pro2col.com/industries Follow Pro2col: LinkedIn - https://www.linkedin.com/company/pro2col/ Twitter - https://x.com/pro2colgroup #ManagedFileTransfer #MFT #FileTransfer #SecureFileTransfer #DataTransfer #CyberSecurity #DataSecurity #TechPodcast #BusinessPodcast

    22 min
  5. 01/10/2025

    Managed File Transfer 101: Industries, Security Challenges and Key Insights

    Welcome to the first episode of The Transfer Files podcast, hosted by Steph Johnson, Marketing Manager at Pro2col, and James Lewis, CEO of Pro2col. They are joined by Richard Auger, Principal Technical Consultant, to explore the fundamentals of Managed File Transfer (MFT) - what it is, why organisations need it, and how it helps businesses securely exchange data. In this episode, you'll hear the common triggers that start an organisation on the MFT journey, and why replacing outdated scripts and multiple file transfer systems is so important. The conversation covers security challenges such as hackers, shadow IT, and the risks of ignoring outdated infrastructure, along with practical signs IT leaders should look out for inside their organisations. Listeners will also benefit from real-world customer use cases, a simple library analogy that makes MFT easy to understand, and a look under the hood of a file transfer solution to see how it really works. (00:00) Intro (01:11) How James landed in the world of Secure File Transfer(03:10) How Richard landed in the world of Secure File Transfer (04:20) What is Managed File Transfer? (06:52) What industries are using File Transfer? (08:09) What starts people off on an MFT journey (09:18) The library analogy (11:20) Real-world customer use cases (15:22) Replacing home-grown scripts (16:44) Why it’s important your file transfer systems are up to date (17:30) Signs IT leaders should be considering (21:58) Taking a strategic position on your file transfer deployment (24:01) What’s under the hood of a file transfer solution (30:20) The evolution of MFT (31:51) Key takeaways from James & Richard Resources: 🟦 Download Our Free MFT Guide - https://pro2col.com/mft-buyers-guide-form 🟦 Benchmark your organisation’s file transfer maturity - https://pro2col.com/managed-file-transfer/maturity-model 🟦 A Zero Trust Approach to Data Transfers (Whitepaper) - https://pro2col.com/a-zero-trust-approach-to-data-transfer Follow Pro2col: LinkedIn - https://www.linkedin.com/company/pro2col/ Twitter - https://x.com/pro2colgroup #ManagedFileTransfer #MFT #FileTransfer #SecureFileTransfer #DataTransfer #CyberSecurity #DataSecurity #TechPodcast #BusinessPodcast

    36 min

About

Inside the World of Secure File Transfer. The podcast built for IT professionals at every level. Whether you’re just beginning to explore secure file transfer or you’re a seasoned software engineer looking for deeper insights, every month, we bring you expert takes, real-world lessons, and the latest on secure data movement. Subscribe now and never miss an episode.