RSS feed Get our RSS feed

News by Topic

transfer

Results 176 - 200 of 203Sort Results By: Published Date | Title | Company Name
By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how replacing FTP servers, CD's and courier services with YouSendit has resulted in a more secure, easier and efficient creative workflow process both internally and with their external vendors and parnters.
Tags : wacom, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
     YouSendIt
By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
     YouSendIt
By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how AMAG drastically cut completion time of critical projects by eliminating e-mail transfer of large files, ultimately improving security, increasing cost-savings and accelerating time to market.
Tags : amag, pharmaceuticals, intravenous drugs, anemia, online file sharing, ftp replacement, send large files, secure file transfer
     YouSendIt
By: YouSendIt     Published Date: Aug 10, 2011
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it. It also provides an overview of the offerings from YouSendIt, the sponsor of this white paper.
Tags : yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it
     YouSendIt
By: Network Automation     Published Date: Dec 10, 2008
The Auxiliary IT Operation center at the Indiana University has a lot of responsibility on its plate. It is in charge of the majority of for-profit activities the university is engaged in, namely the halls of residence, parking, dining facilities, campus transportation and much more. Additionally, this unit supports many critical IT processes including the secure distribution of student photos for identification cards.
Tags : network automation, data security, data transfer, disaster recovery, security
     Network Automation
By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
     Ping Identity
By: Citrix Online     Published Date: Apr 06, 2009
Today, stakeholders and projects pepper the globe. Successfully navigating the project lifecycle - from risk management and estimating to managing scope and facilitating knowledge transfer - now requires a different recipe.
Tags : citrix, project management, project lifecycle, risk management, managing scope, risk, collaboration, projects
     Citrix Online
By: Arcserve     Published Date: May 29, 2015
Today, data volumes are growing exponentially and organizations of every size are struggling to manage what has become a very expensive and complex problem. It causes real issues such as: • Overprovisioning their backup infrastructure to anticipate rapid future growth. • Legacy systems can’t cope and backups take too long or are incomplete. • Companies miss recovery point objectives and recovery time targets. • Backups overload infrastructure and network bandwidth. • Not embracing new technologies, such as cloud backup, because there is too much data to transfer over wide area networks.
Tags : backup infrastructure, legacy systems, overload infrastructure, cloud, security
     Arcserve
By: Signiant     Published Date: Oct 15, 2010
There is more content than ever and many new ways to consume that content - thus the complexity of managing the flow of that content throughout the supply chain - from creation to the consumer.
Tags : signiant, file transfer software, digital distribution, content management
     Signiant
By: File Transfer Consulting     Published Date: Jun 07, 2011
Examines IPv6 issues specific to file transfer applications, then tests 14 applications for readiness.
Tags : ipv6, managed file transfer, mft, file transfer, interoperability, compatibility
     File Transfer Consulting
By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper illustrates how, by using YouSendit and replacing FTP, Cisco has dramatically cut video administration costs by 90%. The Flip video file delivery process for Cisco Networking Academy's global operations is now much simpler, less costly and more efficient.
Tags : cisco networking academy, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage
     YouSendIt
By: Western Union Business Solutions     Published Date: Jul 26, 2011
In an increasingly interconnected global economy, an effective cash flow management strategy can provide an essential foundation for your company's success in foreign markets.
Tags : money transfer, transfer money, send money, western union money transfer, online money transfer, bill payment, bill payment services, western union prepaid card
     Western Union Business Solutions
By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management
     Attachmate
By: IBM     Published Date: Apr 22, 2014
Read this ebook from Aberdeen to learn why leading organizations are moving away from the chaos of multiple methods to a single managed file transfer platform, and get best practices for developing a secure, best-in-class file transfer process of your own. 
Tags : ibm, file transfer, mft, ftp, managed file transfer, mature file transfer process, mft platform, content management
     IBM
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : globalscape, saas, managed file transfer, mft, deployment, deployment model, security, automation
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
     Globalscape
By: Globalscape     Published Date: Mar 21, 2014
This whitepaper explains that USB drives have been used to transport viruses and malware, both on purpose and accidentally. The paper explains that no manually handling of files, such as with USB drives, is unnecessary when you set up a secure network architecture using five zones of protection. You can transfer files to and from your network around the globe, and know the data and the network are secure, automatically scanning files to block dangerous data while allowing "clean" data into the network. The paper notes several reasons why it matters that data is secure while remaining accessible.
Tags : viruses, malware, hackers, leaks, supply chain interruptions, stuxnet, scada, usb
     Globalscape
By: Salesforce     Published Date: Nov 19, 2015
Over the next 50 years, more than $41 trillion in assets will be transferred from one generation to another. The non-profit Center on Wealth and Philanthropy sets the bar even higher--$58.1 trillion by 2061. Whatever the final figure, the generational shift of wealth represents an extraordinary opportunity for financial advisers.
Tags : 
     Salesforce
By: Salesforce     Published Date: Nov 19, 2015
In the next five years, more than $2 trillion is expected to transfer between generations. To capitalize on this massive redistribution of wealth, today’s financial advisors need to meet the demands of today’s clients who are social, mobile, more connected, better informed and looking to collaborate with their advisors when they want, where they want.
Tags : salesforce, financial services, cloud, mobile, data
     Salesforce
By: Forcepoint     Published Date: May 03, 2016
Quanto mais tempo os atacantes permanecerem em sua rede, mais movimento lateral é possível e maior o risco de furto de dados. Parar a exfiltração de dados, em vez de tentar impedir as violações de dados, é a abordagem mais realista para a segurança de dados e a redução do tempo do comprometimento à reparação de ameaças.
Tags : 
     Forcepoint
By: IBM     Published Date: Mar 30, 2017
To meet the business imperative for enterprise integration and stay competitive, companies must manage the increasing variety, volume and velocity of new data pouring into their systems from an ever-expanding number of sources. They need to bring all their corporate data together, deliver it to end users as quickly as possible to maximize its value, and integrate it at a more granular level than ever before—focusing on the individual transaction level, rather than on general summary data. As data volumes continue to explode, clients must take advantage of a fully scalable information integration architecture that supports any type of data integration technique such as extract, transfer and load (ETL), data replication or data virtualization.
Tags : data integration, data security, data optimization, data virtualization, database security
     IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics