Standards  >   File Transfer Protocols  >  

Anonymous FTP

RSS Feed    Add to Google    Add to My Yahoo!
Anonymous FTP Reports
 
Sending and Sharing Large Files: Optimizing Existing IP Networks
sponsored by Signiant, Inc.
WHITE PAPER: Discover in this paper an advanced file acceleration protocol that works with your business' existing IP networks to eliminate latency, optimize available bandwidth, and overcome throughput bottlenecks when moving large files over distance, like video and high-resolution images.
Posted: 27 Jul 2016 | Published: 27 Jul 2016

Signiant, Inc.

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: In this resource, explore the right MFT solution for you—one that meets the highest standards of compliance, security, productivity, and profitability.
Posted: 02 Jul 2014 | Published: 01 Oct 2013

IBM

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation
sponsored by Linoma Software
CASE STUDY: In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Solving Scripting Problems with Technology: The Limitations of Scripting in a Complex Business Environment
sponsored by Network Automation, Inc
WHITE PAPER: This paper explains that as automation tools continue to evolve in a quest to deliver the most comprehensive set of automated capabilities, the notion of writing scripts will be rendered anachronistic. Continue reading to learn more about the shift from scriping to dynamic, intelligent process automation.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Network Automation, Inc

Transferring Data without Secure Protocols?
sponsored by GlobalScape
WHITE PAPER: This white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
Posted: 07 May 2014 | Published: 07 May 2014

GlobalScape

Sharepoint WAN Optimization And WAFS
sponsored by Peer Software
WHITE PAPER: Design teams across the world collaborate to create and develop prod­ucts. Unfortunately, IT organizations face serious challenges when collaborative teams share large files. This white paper will assess the strengths and weaknesses of the four technologies most commonly used to enhance file sharing for distributed teams.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Peer Software

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit
sponsored by Attachmate Corporation
CASE STUDY: This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more!
Posted: 09 Apr 2013 | Published: 30 Mar 2012

Attachmate Corporation

The Lucky 7 System i Resources
sponsored by Help/Systems
WHITE PAPER: Robot/CONSOLE©, the System i™ message management and resource monitoring software, can make you and your critical IBM i resources very lucky. With automatic resource monitoring, proactive checking keeps resources running and helps them avoid the unlucky Service Level Agreement (SLA) meeting.
Posted: 03 May 2010 | Published: 03 May 2010

Help/Systems

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods
sponsored by Attachmate Corporation
WHITE PAPER: This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach.
Posted: 10 Apr 2013 | Published: 31 Dec 2012

Attachmate Corporation

Presentation Transcript: Protecting System i Data from FTP, ODBC and Remote Command
sponsored by PowerTech
PRESENTATION TRANSCRIPT: When developing a security strategy, it is critical for businesses to consider their System i platform in order to protect themselves from data breaches. In this presentation transcript, learn how to control network access on System i and protect your organization from data loss.
Posted: 16 Oct 2009 | Published: 16 Oct 2009

PowerTech
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement