secure transfer

Results 1 - 25 of 52Sort Results By: Published Date | Title | Company Name
By: MobileIron     Published Date: Sep 26, 2017
The shift toward modern mobile-cloud technologies is forcing organizations to completely rethink their approach to endpoint security. For instance, while credential-based security is enough to secure access in an IT-controlled desktop environment, it doesn’t transfer to the mobile-cloud world
Tags : mobileiron, mobile, cloud, enterprise, security, endpoint security
     MobileIron
By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : globalscape, managed file tracker, data security, data breaches, security, enterprise applications
     Globalscape
By: Group M_IBM Q119     Published Date: Mar 05, 2019
The Aspera FASP high speed transport platform is enabled to provide high-performance secure WAN transport of files, directories, and other large data sets to, from and between a number of leading third-party cloud storage platforms. The implementation is an enhanced transport stack and virtual file system layer in the Aspera server software that allows for direct-to-object-storage transfer over the WAN using the FASP protocol and the native I/O capabilities of the particular third-party file system. The stack is available in all generally available Aspera server software products and supports interoperable transfer with all generally available Aspera client software
Tags : 
     Group M_IBM Q119
By: Juniper Networks     Published Date: Oct 02, 2018
As customers demand and expect more of a digitized experience, the scale and volume of secure data that’s being transmitted across the network is increasing exponentially. At the same time, across the APAC region high digital connectivity, contrasted with low cybersecurity awareness, growing cross-border data transfers and weak regulations have made this data a global target. The growth in the “as-a-service” nature of the cybercrime marketplace is also fueling an increase in the number of traditional crime groups and individuals drawn into cyber offending. New sources of vulnerability from mobile, BYOD, CYOD, web-services and IoT devices are further broadening the cyber threat landscape with ever-more sophisticated forms of malware and DDoS attacks. Download the IDC Report to get some tips on how to stay protected against cybercrime.
Tags : 
     Juniper Networks
By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability of your file transfer operations in order to deliver exceptional customer experiences. You’ll learn why it’s critical to: • Make data visible where it is in the network • Reduce or eliminate ad hoc use of FTP • Build scalability into your file transfer system • Monitor data transfers from beginning to end
Tags : 
     Group M_IBM Q4'19
By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
     Group M_IBM Q4'19
By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen the digital evolution that’s taking place in healthcare and you’re at your job every day as this evolution continues—and organizations seek to more efficiently and securely manage the proliferation and management of electronic health records (EHRs) and every type of digital file that relates to patient care.
Tags : ipswitch, healthcare, compliance, file transfer, secure transfer, efficiently transfer, clinical data, medical file, securely manage, best practices, business integration, change management
     Ipswitch
By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
     Brainloop
By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
     Ciena
By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
     YouSendIt
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage, web services, web service security, application integration, data protection, web service management, software compliance
     Aberdeen - youSENDit
By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.
Tags : yousendit, technology, greater business value, reliable file transfer, low-level protocols, security, internet security, web service security, web service management, secure content management
     Aberdeen - youSENDit
By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
     Attachmate
By: Ipswitch     Published Date: May 15, 2014
In this free on demand webinar, you’ll get a first-hand look at how leading companies leverage Managed File Transfer to improve security, reduce risk and relieve pressure on their IT departments.
Tags : ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
     Ipswitch
By: Proofpoint     Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Tags : proofpoint, encrypted email, secure file transfer, data breach prevention, encryption, email security, intrusion detection, intrusion prevention, email archiving
     Proofpoint
By: YouSendIt     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
     YouSendIt
By: YouSendIt, Inc.     Published Date: Sep 17, 2008
In this FactPoint study, discover why companies are increasingly adopting managed file transfer to send large and important files. Learn key factors driving the migration away from e-mail and FTP; the top 8 features to look for; and tough questions to help you choose a solution. Also, find out how to maximize privacy, security, speed, and ease of use. Find out why countless companies are making the move—download your copy now.
Tags : cost-effective file delivery, promo code: wp2, file transfer, attachment, email, ftp, security, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment, multimedia attachment, audio attachment, video attachment, large attachment, file size, digital content, digital content delivery, managed delivery service, large file delivery
     YouSendIt, Inc.
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.