Transport Protocols Reports

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Agosto Takes Managed Services to a New Level with Google Apps
sponsored by Google Apps Authorized Reseller Program
CASE STUDY: Read this case study to learn how Agosto used Google Apps to help their client, Dunn Bros', communicate and collaborate between its many store and office locations.
Posted: 15 Oct 2009 | Published: 15 Oct 2009

Google Apps Authorized Reseller Program

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data
sponsored by OpenText
WHITE PAPER: In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization.
Posted: 30 Oct 2013 | Published: 30 Oct 2013

OpenText

Solution Brief: Accelerating File Services Across the WAN
sponsored by BlueCoat
WHITE PAPER: Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request.
Posted: 09 Feb 2011 | Published: 09 Feb 2011

BlueCoat

The Five Critical SLA Questions
sponsored by IBM
WHITE PAPER: SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

IBM

What to Look for in Secure File Transfer
sponsored by TechTarget Security
EBOOK: In this exclusive guide, you will discover how secure file transfer products work and determine which will be the best fit for your particular environment. Read on to learn about the key features of secure file transfer and get insight into a file hosting service.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

TechTarget Security

Storage Magazine: July 2013
sponsored by TechTarget Storage
EZINE: This issue of Storage Magazine takes a closer look at the latest solid-state storage trends, uses, and form factors. It also provides cloud-based file sharing need-to-knows, expert perspectives on LTFS and the future of tape, advice on simplifying VM data protection and more.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

TechTarget Storage

FTP-Stream China Data sheet
sponsored by Maytech
DATA SHEET: Find out how FTP-Stream China cracks the file sharing services problem by reading this resource now.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

Maytech

IBM WebSphere MQ File Transfer Edition
sponsored by IBM
WHITE PAPER: This solution brief describes how you can lower business risk and increase productivity with trusted and secured file transfers.
Posted: 07 Jul 2011 | Published: 10 Dec 2010

IBM

Realizing the benefits of FTP consolidation
sponsored by IBM
WHITE PAPER: Businesses are experiencing a growing demand to move high volumes of data both internally and externally. File transfer protocol (FTP) servers are proliferating among individual departments and raising traffic levels with customers and suppliers. This white paper explains and explores the opportunity and benefits of FTP consolidation.
Posted: 29 Nov 2011 | Published: 28 Nov 2011

IBM