Anonymous FTP Reports

E-Guide: Matching WAN application acceleration options to network needs: Expert roadmap
sponsored by BlueCoat
EGUIDE: This expert e-guide discusses basic WAN acceleration techniques as well as best practices to boost application performance. Uncover how to match WAN optimization with acceleration options in order to meet your network’s needs.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

BlueCoat

EMC Isilon Best Practices for Hadoop Data Storage
sponsored by EMC IT Solutions India Private Limited
WHITE PAPER: This white paper describes the best practices for setting up and managing the HDFS service on an EMC Isilon cluster to optimize data storage for Hadoop analytics.
Posted: 31 Mar 2014 | Published: 28 Feb 2014

EMC IT Solutions India Private Limited

Realizing the benefits of FTP consolidation
sponsored by IBM
WHITE PAPER: Businesses are experiencing a growing demand to move high volumes of data both internally and externally. File transfer protocol (FTP) servers are proliferating among individual departments and raising traffic levels with customers and suppliers. This white paper explains and explores the opportunity and benefits of FTP consolidation.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM

FTP Replacement: Where MFT Makes Sense and Why You Should Care
sponsored by IBM
WHITE PAPER: This research provides advice on when to replace FTP with managed file transfer (MFT) solutions and which features to consider.  MFT solutions can be MFT software and MFT as a service.  The report also highlights where MFT fits into the technology landsacpe, along with some of its key benefits.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

FTP Replacement: Where MFT Makes Sense and Why You Should Care
sponsored by IBM
WHITE PAPER: This research provides advice on when to replace file transfer protocol (FTP) with managed file transfer (MFT) solutions, and which features to consider. This Gartner report includes MFT software and MFT as a service. Also highlighted is where MFT fits into the technology landscape and some of the key benefits.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM

The Guide to Data Movement and Governance
sponsored by IBM
EGUIDE: Missed opportunities and lost revenue might be the least of your worries. In some cases, poor practices can lead to lawsuits, fines and even the failure of the business itself. The purpose of this e-guide is to help you grasp the measures that can keep your organization on track to meet objectives and stay in line with regulations.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM

Transferring Data without Secure Protocols?
sponsored by Globalscape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

Globalscape

byREQUEST®: Automatically Sweeps Files into Sharepoint
sponsored by Hillary Software
TRIAL SOFTWARE: From any operating system or any application, byREQUEST® can automatically pickup and move reports, documents, files and data directly into SharePoint on an hourly, daily, weekly and monthly schedule.
Posted: 21 Jul 2009 | Premiered: 21 Jul 2009

Hillary Software

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

E-Guide: Steps to securing your file transfers and meeting compliance requirements
sponsored by TechTarget Security
EGUIDE: Security has become a main issue with the swift way we have started working, making data transfers less safe. Read this expert E-Guide and learn the steps necessary to secure your managed file transfers and meet compliance requirements.
Posted: 09 Jan 2012 | Published: 09 Jan 2012

TechTarget Security