RSS feed Get our RSS feed

News by Topic

file sharing

Results 76 - 100 of 143Sort Results By: Published Date | Title | Company Name
By: Hewlett Packard Enterprise     Published Date: Nov 06, 2017
The Cloud, once a radical idea in IT, is now mainstream. Whether it’s email, backup or file sharing, most consumers probably use a cloud service or two. Similarly, most IT professionals are familiar with cloud service providers such as Amazon, Google and Microsoft Azure, and many companies have moved at least some of their information technology processes into the cloud. In fact, the cloud has become so popular it’s easy to assume that running IT applications on-premises is not cost competitive with a cloud based service. In this report Evaluator Group will test the validity of that assumption with a TCO (Total Cost of Ownership) model analyzing a hyperconverged appliance solution from HPE and a comparable cloud service from Amazon Web Services (AWS).
Tags : infrastructure, cost competitive, cloud, hyper converged, amazon web services, total cost of ownership, tco
     Hewlett Packard Enterprise
By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : globalscape, saas, managed file transfer, mft, deployment, deployment model, security, automation
     Globalscape
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Citrix XenMobile and Citrix ShareFile meet the complex needs of your mobile workforce with a complete, integrated and secure enterprise mobility solution—with a consumer-like experience people love. Both products are included in XenMobile Enterprise.
Tags : citrix, mobile, . mdm, secure, file sharing
     Citrix Systems, Inc.
By: hightail     Published Date: Jan 17, 2014
Learn 3 essential values for securing the cloud and see how you can better prioritize security and improve your organization’s productivity.
Tags : 
     hightail
By: hightail     Published Date: Jan 17, 2014
Learn 5 ways the cloud will enhance your professional life in 2014 and how understanding the technology will improve how organizations store and share files.
Tags : 
     hightail
By: hightail     Published Date: Jan 17, 2014
Learn how the method of data collection and storage has changed and learn the 4 essential stages of managing your content in the digital age.
Tags : 
     hightail
By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security
     Attachmate
By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection
     Brainloop
By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools
     Box
By: IBM MaaS360     Published Date: Oct 08, 2015
Get the latest mobile devices and apps in the hands-off learners and educators quickly and securely with mobile device and app management.
Tags : ibm, mobile, device management, education, app management, file sharing
     IBM MaaS360
By: Globalscape     Published Date: Aug 13, 2014
Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
Tags : globalscape, mobile, business, byod, security
     Globalscape
By: Readdle     Published Date: Feb 02, 2015
Does your work enviornment look anything like that of the popular TV sitcom The Office? Probably not. If your company is like most businesses, it’s highly unlikely you see coworkers regularly communicating face to face. And there’s a good chance those type of meetings will continue to decline, according to the latest statistics. The mobility trend has been accelerating in just the past few years. By the end of 2015, 38 percent of the world’s workforce will be mobile. That’s up 65% since 2011, reports Forrester Research. So what have you been doing to help your company adjust to this evolving workplace? If your answer is “not much” or “a few tweaks here and there,” you could be missing out on significant opportunities to generate efficiencies that could impact your company’s bottom line. Today, more companies are discovering that email, file sharing and other traditional methods of collaborating and completing tasks just don't cut it - especially with employees who are accustomed to
Tags : mobility, evolving workplace, generate efficiencies, collaboration
     Readdle
By: Intralinks     Published Date: Nov 23, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights
     Intralinks
By: Intralinks     Published Date: Oct 14, 2015
Download this detailed, insightful article and follow Volterra Fietta’s journey to their “just right” solution.
Tags : intralinks, mwd, volterra fietta, goldilocks zone, security, file sharing, information rights
     Intralinks
By: HP     Published Date: Aug 26, 2014
Just Right IT solutions, based on HP servers, storage, networking, and services, simplify business technology, giving you more time to focus on your business. Whether you’re just getting started with virtualization and file sharing, or supporting expansion with solutions for server consolidation, data backup, and business consolidation, Just Right IT solutions provide appropriate technologies for your organization’s needs today. And when your business is ready for the next level of expansion, HP offers Just Right IT solutions that address growing requirements for collaboration, continuity, and consolidation. Learn more.
Tags : virtualization, data backup, business, technology, portfolio, cloud-based, support, portal
     HP
By: GlobalSCAPE     Published Date: Jan 08, 2008
Disaster can strike when you least expect it.  So how do you back up and maintain control of your data and still provide access to data in a distributed organization?  The challenges are clear...large and growing amounts of data need to be distributed across many sites yet complications such as bandwidth usage, file coherence, version consistency, and file latency all result in lost productivity.
Tags : globalscape
     GlobalSCAPE
By: Intralinks     Published Date: Oct 14, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : osterman, enterprise, file sync, share solutions, file-share, cfss, efss
     Intralinks
By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : osterman, enterprise, file sync, share solutions, file-share, cfss, efss
     Intralinks
By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : security
     BitSight Technologies
By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : drm solutions, locklizard, document protection, secure file sharing, security
     LockLizard
By: Egress ABM Pilot     Published Date: Dec 07, 2017
This white paper is about the sinking feeling you get when you realise you’ve sent an email to the wrong person, attached the wrong file, or uploaded the wrong document to a file sharing site.
Tags : 
     Egress ABM Pilot
By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : data protection, code 42, data security, intellectual property
     Code42
By: Globalscape     Published Date: Mar 21, 2014
Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.
Tags : globalscape, healthcare, digitalized assets, healthcare technology, ehr, file sharing solutions, electronic health records, healthcare it
     Globalscape
By: NuSphere     Published Date: Jul 31, 2008
The problem of providing remote access to the files is nothing new, but the implementation of the solution quite often also determines reliability, safety and productivity. In this article we will look at accessing a remote computer (Unix, Linux or Windows) over non-trusted network.
Tags : remote files sharing, samba, ssh tunnel, nusphere
     NuSphere
By: Box     Published Date: Nov 24, 2015
With the cloud being an essential part of so many IT organizations, best practices have emerged to help IT evaluate the right vendors’ ability to meet mission critical security needs. Download this whitepaper to learn the best practices for determining file sharing provider’s capabilities and see how it will allow you to select the right vendor to meet mission critical operational and security needs.
Tags : file sharing, file sharing providers, secure files, security needs, security
     Box
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics