Standards  >   Network Protocols  >   OSI Protocols  >  

File Transfer Access and Management

RSS Feed    Add to Google    Add to My Yahoo!
File Transfer Access and Management Reports
 
WS_FTP Professional and WS_FTP Server with SSH
sponsored by Ipswitch WhatsUp Gold
DATA SHEET: Secure file transfer products enable businesses to manage data, control access, and securely move files between locations. This white paper highlights how going beyond the basic FTP solutions is necessary for secure and reliable file transfer.
Posted: 01 Aug 2007 | Published: 01 Jul 2007

Ipswitch WhatsUp Gold

Managed File Transfer: The Need for a Strategic Approach
sponsored by Inovis
WHITE PAPER: This paper discusses how business environments are governed by increasingly stringent regulations and consumer demands for privacy. Learn how Managed File Transfer (MFT) can be your solution.
Posted: 04 Sep 2008 | Published: 04 Sep 2008

Inovis

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Compliance Policy Management: Continuous Compliance with Tripwire Enterprise
sponsored by Tripwire, Inc.
DATA SHEET: Improperly configured physical and virtual IT infrastructure is the leading cause of security breaches. As a result, organizations are subject to an increasing number of complex regulations or standards designed to secure the IT infrastructure.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

Tripwire, Inc.

Guidelines for Specification of Data Center Power Density
sponsored by Schneider Electric
WHITE PAPER: Specifying data center density has yet to conform to an established standard within the industry. This paper describes the science and practical application of an improved method for the specification of power and cooling infrastructure for data centers.
Posted: 30 Oct 2006 | Published: 01 Jan 2005

Schneider Electric

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

Dual Stack Network
sponsored by Cisco Systems, Inc.
DATA SHEET: In order to ensure business continuity and future growth, all organizations need to carefully plan for coexistence between IPv4 and IPv6. A combination of both native IPv4 and IPv6, better known as dual stack, is the recommended coexistence strategy for enterprise networks. Continue reading to learn more.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

Top 10 Measurement and Planning Mistakes and How to Avoid Them
sponsored by Information Builders
WHITE PAPER: Access this white paper to review the 10 most common planning and measurement errors that businesses commit. In addition to examining these blunders, discover real-world examples of how an enterprise can avoid or correct them. Learn strategic solutions, such as setting sensible goals.
Posted: 08 Apr 2015 | Published: 31 Dec 2014

Information Builders

IPv6 Addressing Plan Basics
sponsored by Infoblox
WHITE PAPER: Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!
Posted: 26 Apr 2013 | Published: 26 Apr 2013

Infoblox

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement