Fetch Reports

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

Secure, Reliable, Any-Size File Transfer with FileXpress
sponsored by Attachmate Corporation
WEBCAST: This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business.
Posted: 11 Apr 2013 | Premiered: Feb 20, 2013

Attachmate Corporation

Secure File Transfer Solution Saves Bank Time and Money
sponsored by Linoma Software
CASE STUDY: Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
Posted: 24 Mar 2010 | Published: 24 Mar 2010

Linoma Software

Case Study - Square Enix
sponsored by Riverbed Technology, Inc.
CASE STUDY: The Square Enix Group constructed an international business promotion structure with major development locations established in Japan, North America, and Europe, with develop data (ROM) transferring between locations on a daily basis. After adopting Steelhead appliances, Square Enix saw transfer times reduce by more than 90%.
Posted: 17 Jan 2014 | Published: 31 Dec 2013

Riverbed Technology, Inc.

Solution Brief: Accelerating File Services Across the WAN
sponsored by BlueCoat
WHITE PAPER: Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

BlueCoat

Best Practice in Managed File Transfers
sponsored by IBM
WHITE PAPER: In this Aberdeen Group report, learn about 7 key capabilities of enterprise-class managed file transfer solutions that will help support collaboration between individuals, and integrate business processes within and between enterprises.
Posted: 30 Jun 2014 | Published: 30 Apr 2013

IBM

Hightail Security: Securing Information in the New World
sponsored by Hightail
WHITE PAPER: The following white paper explores a file sharing solution that gives users the ability to share files easily, while providing IT with the required security infrastructure, comprehensive controls, and data tracking capabilities needed in today's data-driven business environment.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Hightail

Secure File Transfer Tech Guide
sponsored by TechTarget Security
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security