Your browser does not allow storing cookies. We recommend enabling them.


Simplified Management of File Operations

Tectia MFT Events simplifies the management of file operations, and reduces time spent on maintaining and monitoring the file transfer environment. In addition to saving the valuable IT resources, Tectia MFT Events helps minimize the possibilities of human errors as the event management can be concentrated to a limited number of experts.

Tectia MFT Events provides a Management Console (an administration interface) that helps in managing the events according to a logical workflow. The Management Consoles can be used by the operators to manage (create events, edit the configuration, view logs) several Tectia MFT Events engines.

The console can be installed together with the Tectia MFT Events engine, or remotely, for example, to file transfer operators' workstations. The remote Management Consoles can be used for remote management of one or several Tectia MFT Events engines. The console is available on Linux and Windows platforms.

Dedicated user account for running events

Tectia MFT Events is run using only one user account, by default named sshmft. All configuration tasks of the Tectia MFT Events software, and creating and handling of events are allowed to the sshmft user account.

Intuitive administration interface for managing file transfers and remote commands

Tectia MFT Events provides an easy-to-use Management Console (administration interface) for the operators to create, edit, run, and stop file transfer events. The intuitive Management Console requires minimal user training, and the user experience is the same on all platforms. The console is available on Windows and Linux platforms.

All configurations are also created via the Management Console, so the Tectia MFT Events operator does not need to access the XML-format configuration file at all.

Testing events

The Management Console allows to run events manually one by one, so operators can test the created events — in addition to viewing their configurations.

Disabling individual events

Newly created events are enabled by default, and they will get executed according to their triggers. The Management Console allows to disable events one by one, so that their configurations remain stored, but the events are not run.

Browsing remote file systems

When creating file transfer actions, the operator can open connections and browse remote file systems on different platforms using the Tectia MFT Events Management Console. This can reduce human errors in the configuration phase, as the file paths can be selected, instead of typing them in.

Mainframe support

Tectia MFT Events is capable of connecting to the Tectia Server for IBM z/OS, and data can be transferred to and from mainframes. Full and configurable ASCII/EBCDIC conversion is supported, as well as configurable CONVXLAT conversion tables for seamless cross-platform compatibility between IBM z/OS and Unix/Linux/Windows hosts.

When used in conjunction with Tectia Server for IBM z/OS, users of Tectia MFT Events can use the following mainframe-specific features:

  • MVS dataset listing : users can list IBM Multiple Virtual Storage datasets as files and folders, facilitating seamless cross-platform file transfer between mainframe and non-mainframe systems.

  • Extended MVS streaming for direct, one-step processing of MVS dataset transfers. Extended streaming provides optimized throughput, and on-the-fly file format and code set conversions between distributed hosts and IBM z/OS systems.

Tectia Server for IBM z/OS is described in Tectia Server for IBM z/OS Product Description.

Control utility on command line

A command line utility, ssh-events-ctl, is available with Tectia MFT Events. It can be used to stop Tectia MFT Events, to trigger events, and to monitor the process status and statistics on the events. The utility can also be used as a handle to external tools.


Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more