Standards  >  

Transport Protocols

RSS Feed    Add to Google    Add to My Yahoo!
Transport ProtocolsReports
 
Confidence in cloud file sharing: How to be protected and productive
sponsored by Dropbox for Business
WEBCAST: Watch this video to find out how your business can be confident that its shared files are consistently protected.
Posted: 31 Jul 2014 | Premiered: Jul 31, 2014

Dropbox for Business

The Keys to Securing Data in a Collaborative Workplace
sponsored by Dropbox for Business
WHITE PAPER: This white paper offers 5 valuable steps to secure file sync and share so that employees can enjoy the benefits of collaboration without fear of data loss.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Dropbox for Business

Solution Brief: Accelerating File Services Across the WAN
sponsored by BlueCoat
WHITE PAPER: Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

BlueCoat

Security best practices for file-based data movement— an IT practitioner’s guide
sponsored by IBM
WHITE PAPER: In this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
Posted: 03 Jul 2014 | Published: 30 Apr 2012

IBM

Controlling the Cost of File Transfers
sponsored by Attachmate Corporation
WHITE PAPER: View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution.
Posted: 09 Apr 2013 | Published: 31 Dec 2010

Attachmate Corporation

Cloud-based File Management System for BlackBerry PlayBook Tablet Customers
sponsored by BlackBerry
WHITE PAPER: Discover details about a cloud-based content management solution that helps you achieve simple, secure content sharing from desktops, laptops, smartphones, or tablets in a flexible, dynamic manner.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

BlackBerry

Solution Spotlight: How Secure Managed File Transfers Help Meet Compliance Requirements
sponsored by IBM and SI Architects
EGUIDE: This expert E-Guide explores the steps enterprises need to take to secure file transfer and regulatory compliance. Read on and learn how organizations can ensure file transfer security today.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Hightail Security: Securing Information in the New World
sponsored by Hightail
WHITE PAPER: The following white paper explores a file sharing solution that gives users the ability to share files easily, while providing IT with the required security infrastructure, comprehensive controls, and data tracking capabilities needed in today's data-driven business environment.
Posted: 28 Apr 2014 | Published: 28 Apr 2014

Hightail

Solution Spotlight: How to Manage Compliance and Secure File Transfers across a WAN
sponsored by IBM and SI Architects
EGUIDE: In this expert E-Guide from searchEnterpriseWAN.com, IT expert Dan Sullivan shares the seven essential requirements for reliable file transfer and maintaining compliance with file transfer regulations. Access now and start managing your WAN more effectively.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

IBM and SI Architects

Enterprise File Sync & Share Checklist
sponsored by Code42
WHITE PAPER: This informative whitepaper explores some key strategies for choosing your mobile collaboration and file transfer platform.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement