file transfer

Results 1 - 25 of 88Sort Results By: Published Date | Title | Company Name
Published By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM APAC
Published By: Globalscape     Published Date: Nov 14, 2016
Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you’ll learn: - 3 layers most targeted: the network, data & users - Bad security practices - Why Managed File Transfer is a critical component to combat bad practices
Tags : 
globalscape, managed file tracker, data security, data breaches, security, enterprise applications, business technology
    
Globalscape
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
Functionality, cost effectiveness and efficiency drive your firm. Apply those standards to sharing large files if you want to beat competitors who use standard, less professional file-sharing tools with clients. Read this e-book to discover how you and your firm can: Avoid the unreliability and time-consuming limitations of FTP and email. Stop breaking up files and start tracking their status. Increase the speed of transferring proposals, specs and more without sacrificing security.
Tags : 
cost effectiveness, efficiency, data sharing, data security
    
Citrix ShareFile
Published By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : 
b2b integration, customer loyalty, ibm, customer growth
    
IBM
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to discover more about the true cost of "free" file sharing systems and file sharing best practices.
Tags : 
seeburger, file sharing, erp systems, file storage, security, file transwer, tco, mft, ftp, file transfer protocol
    
SEEBURGER, Inc.
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to find out how Managed File Transfer ensures your data flow is secure and speedy.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Published By: SEEBURGER, Inc.     Published Date: Sep 12, 2011
Read the white paper to learn five key ways MFT makes a difference for your business.
Tags : 
seeburger, mft, security, file transfer, data management, end-to-end insight, compliance, server, end points
    
SEEBURGER, Inc.
Published By: SEEBURGER, Inc.     Published Date: Feb 16, 2012
Traditional methods of managing file transfers can't prevent or protect your enterprise from compliance violations: they're insecure, inefficient, and non-auditable.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Published By: SEEBURGER, Inc.     Published Date: Feb 23, 2012
By applying best practices, many best-run businesses have achieved a competitive edge from consolidating and modernising their EDI, B2B and file transfer environments - including their SAP processes. Learn their secret!
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Published By: Ipswitch     Published Date: Dec 01, 2014
The third largest US-based provider of inter-bank transaction services offers a Financial Services case study illustrating the automation of over 1,100 tasks by MOVEit Core and MOVEit Central for managing financial transactions. MOVEit File Transfer to manage file transfers to client banks, regulators, and other financial institutions. Companion product MOVEit Central to automate file-based business processes.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation
    
Ipswitch
Published By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen it in the news. The fines levied against financial institutions for non-compliance with governmental regulations can be staggering. We’re no longer talking about millions of dollars—but billions of dollars. Needless to say, the stakes are high. And at no point in the life of your IT department has it ever been more important to ensure compliance with international, federal and state mandates. File transfers are a perfect case in point.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation, financial services
    
Ipswitch
Published By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen the digital evolution that’s taking place in healthcare and you’re at your job every day as this evolution continues—and organizations seek to more efficiently and securely manage the proliferation and management of electronic health records (EHRs) and every type of digital file that relates to patient care.
Tags : 
ipswitch, healthcare, compliance, file transfer, secure transfer, efficiently transfer, clinical data, medical file, securely manage
    
Ipswitch
Published By: Ipswitch     Published Date: Dec 01, 2014
It’s easy to understand why many organizations are confused about the need for a Managed File Transfer (MFT) system. There are a lot of different products in the market, file transfer product functionality is not clearly defined and often overlaps with other solutions, “MFT” is not fully understood, and there are a lot of mixed messages in the marketplace.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation
    
Ipswitch
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: YouSendIt     Published Date: Jul 18, 2011
This whitepaper highlights how organizations can solve their attachment management problems while imposing little or no change on the way that users work and increasing IT's visibility into the process for compliance purposes -- inexpensively and at reduced corporate risk.
Tags : 
email attachments, online file sharing, ftp replacement, send large files, secure file transfer, managed file transfer, file transfer, online file storage, large email attachment, upload, upload files, send it on, yousendit, file sharing, yousendit file sharing
    
YouSendIt
    
BMC
    
BMC
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Consumer-focused technologies that are deployed by employees can provide tremendous value to any business and can provide IT organizations with more functionality than they can afford or are willing to deploy. However, consumer technologies must be appropriately managed in order to satisfy corporate security, compliance and other requirements. This means integrating consumer technologies into the existing IT fabric in order to achieve the greatest possible synergies between consumer-focused and IT-deployed technologies.
Tags : 
yousendit, ftp replacement, secure file transfering, online fire sharing, uploading files, consumerization of it, ip storage, network attached storage
    
Aberdeen - youSENDit
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
Aberdeen Group research finds that file transfer has transformed from a loose collection of low-level protocols to full-featured, enterprise-class solutions for secure, reliable managed file transfer. This report examines how organizations benefit from managed file transfer solutions, and recommends steps to success for all organizations.
Tags : 
yousendit, technology, greater business value, reliable file transfer, low-level protocols, security
    
Aberdeen - youSENDit
Published By: Webroot UK     Published Date: Nov 11, 2009
This white paper discusses key issues around encryption for both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. This white paper also briefly discusses Webroot Software, the sponsor of this white paper, and their relevant offerings.
Tags : 
webroot, encrypted email, file transfer encryption, email server, content interception, tls, transport layer security, openpgp, s/mime, policy-based encryption, archiving, virus scanning
    
Webroot UK
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, filexpress managed file transfer, security
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Start   Previous   1 2 3 4    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.