EDI Secure
EDI secure is a question that is increasingly on the top of business owners' minds. The benefits of exchanging transaction data using EDI are well known and established. The process of actually exchanging the EDI data however is often misunderstood and not well known even by proficient EDI users. EDI secure is a key aspect of implementing any EDI infrastructure that your organization should insist on. An EDI transaction, even though encoded using the EDI standard, is not by definition an EDI secure document. In the event that someone intercepted your EDI message it would be relatively easy for them to decode the document and obtain access to very confidential information. All this can be prevented through an EDI secure implementation.
Understanding EDI secure
The first step in creating an EDI secure infrastructure is to understand the communication channels your EDI software will use. Specifically, what communication protocols do your trading partners and/or VANs allow you to use to send and receive data. EDI secure can be accomplished independent of the communication protocol, but the most popular ones tend to be Secured FTP and HTTPS. Regardless of whether you use a VAN or communicate directly to your partner, you should ensure that your EDI transactions are EDI secure by using either the FTPs, the sFTP or HTTPs protocols. The easiest way to accomplish EDI secure communication channels is to acquire software specifically designed to be compatible with EDI secure methodologies. Often this type of software is referred to as "AS2" software but most frequently these software package support more than just the AS2 protocol.
What Protocol is EDI secure? By now you may be confused by all these acronyms. FTP, FTPS, AS2 - it seems very daunting. In reality it's really rather simple. In the world of EDI secure there are three main protocols used to exchange EDI data in a secure manner. AS1 is simply the SMTP e-mail protocol that is being used in an encrypted means to exchange EDI data. Similarly, AS2 is nothing more than the HTTP protocol used in a secure manner, and finally the AS3 protocol specifies the use of a secure FTP channel to exchange data.
How do you Select an EDI secure Provider?
As you start getting more comfortable with EDI secure the process of selecting a software vendor will become easier. The first question you should ask is how many of the EDI secure protocols the software in question can support. Additionally, if you are going to be using the AS2 protocol you should inquire if the software has received what is known as a Drummond certification. This certification is given by an industry watchdog organization known as the Drummond Group that tests EDI secure software and ensures that it meets the specifications as defined.
The world of EDI can be very complicated at first blush. Once you start to understand some of the core terminology and concepts, however, you will find that getting a good working knowledge of EDI is not as difficult as it first seemed. Along the way its important to work with companies that can help you make sense of the entire process and that can provide you with tools and services that will make your experience with EDI better and easier. With over 15 years of experience helping small and mid-sized organizations, EMANIO is just such a provider. |