What is IBM Sterling Connect:Direct?
IBM® Sterling Connect:Direct® is point-to-point (peer-to-peer) file-based integration middleware meant for 24×365 unattended operation, which provides assured delivery, high-volume, and secure data exchange within and between enterprises.
What protocol does IBM Connect:Direct use?
File Transfer Protocol (FTP)
IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises.
How do I set up Connect:Direct?
Installing Connect:Direct for UNIX
- Install the server on a local system and the clients on remote systems.
- Install the server and at least one client on a local system and the remaining clients on remote systems. Install Connect:Direct for UNIX on a local drive.
- Install using a Silent Installation.
Does Connect:Direct encrypt data?
Connect:Direct originally did not support encrypted and secure data transfers, however an add-on, Connect:Direct Secure+, provided such support. Encryption can be accomplished with Transport Layer Security using SSL, TLS or Station-to-Station protocol (STS).
Is Connect:Direct a protocol?
The proprietary and secure Connect:Direct protocol has never been breached. That solutions help customers satisfy regulatory and industry requirements within their file transfer operations, including compliance with Sarbanes-Oxley, Payment Card Industry (PCI) and healthcare (HIPAA) requirements.
How do I install Windows Connect Direct?
Install Connect:Direct for Microsoft Windows and Optionally Connect:Direct Secure Plus
- On the Welcome dialog, click Next.
- To install Connect:Direct Secure Plus, select Custom and click Next.
- To change the default installation path, click Change.
- Click Next.
- To configure the Connect:Direct, enable Custom and click Next.
Is Connect Direct Secure?
What is Connect:Direct Secure Plus?
Connect:Direct Secure Plus enables you to implement multiple layers of security. You can select one of two security protocols to secure data during electronic transmission: Transport Layer Security (TLS) or Secure Sockets Layer protocol (SSL).