Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

file transfers

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 26, 2017
Business executives and managers at business-to-business (B2B) enterprises care about time, money, competitive advantage, customer loyalty and growth. Few pay much attention to the vital IT infrastructure that supports transactions and collaboration with trading partners—though that B2B backbone directly affects performance and profitability. In fact, just 26 percent of business managers view B2B integration as a competitive differentiator, according to a study for IBM by Vanson Bourne, a research consultancy. As a result, many enterprises continue to utilize manual and error-prone emails, faxes and file transfers for B2B transactions. Reliance on complex, brittle and antiquated systems to exchange critical data impacts time to market, cost-efficiency and satisfaction across suppliers and end-customers. Modernization of B2B integration in recent years has moved forward in fits and starts, often undermined by competing priorities and misalignment between business and IT managers.
Tags : 
b2b integration, customer loyalty, ibm, customer growth
    
IBM
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
Is your file transfer infrastructure equipped to meet today’s business demands? Read four keys you can apply to dramatically improve the security, auditability, service delivery, and scalability of your file transfer operations in order to deliver exceptional customer experiences. You’ll learn why it’s critical to: • Make data visible where it is in the network • Reduce or eliminate ad hoc use of FTP • Build scalability into your file transfer system • Monitor data transfers from beginning to end
Tags : 
    
Group M_IBM Q4'19
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
    
Group M_IBM Q4'19
Published By: SEEBURGER, Inc.     Published Date: Feb 16, 2012
Traditional methods of managing file transfers can't prevent or protect your enterprise from compliance violations: they're insecure, inefficient, and non-auditable.
Tags : 
seeburger, streamline, mft, managed file transfer, network connections, trading partners, security, business integration server
    
SEEBURGER, Inc.
Published By: Ipswitch     Published Date: Dec 01, 2014
The third largest US-based provider of inter-bank transaction services offers a Financial Services case study illustrating the automation of over 1,100 tasks by MOVEit Core and MOVEit Central for managing financial transactions. MOVEit File Transfer to manage file transfers to client banks, regulators, and other financial institutions. Companion product MOVEit Central to automate file-based business processes.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation
    
Ipswitch
Published By: Ipswitch     Published Date: Dec 01, 2014
You’ve seen it in the news. The fines levied against financial institutions for non-compliance with governmental regulations can be staggering. We’re no longer talking about millions of dollars—but billions of dollars. Needless to say, the stakes are high. And at no point in the life of your IT department has it ever been more important to ensure compliance with international, federal and state mandates. File transfers are a perfect case in point.
Tags : 
ipswitch, lendingtools, streamlines, file trasnfer, flexibility, moveit, transfer scripts, streamlined solution, audit trail, transfer security, automation, financial services
    
Ipswitch
Published By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : 
o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr, ciena 6200, ciena 5410, waveserver, wavelogic, wavelogic 3, wavelogic photonics, wavelogic3, sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy
    
Ciena
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci, pc ftp application, script file exposure, file encryption processes
    
Linoma Software
Published By: IBM     Published Date: Jul 02, 2012
Many organizations move a wide variety of sensitive information with file transfer protocol (FTP), and these servers are proving to be easy targets for thieves. Read this paper to learn more about IBM Sterling Managed File Transfer that helps you manage and control the critical information flows in your company's dynamic business networks.
Tags : 
ibm, ftp, secure file transfer, file, business, business network, technology, business technology
    
IBM
Published By: Ipswitch     Published Date: May 02, 2014
With fewer resources and an increasing volume and size of file transfers each year, moving files in the extended enterprise has never seemed more complex. In this whitepaper, you’ll learn how to tackle the challenge of higher costs, increasing volume and size of file transfers, and fewer resources with one mature, managed file transfer process.
Tags : 
ftp client, ftp server, sftp client, ftp software, large file transfer, secure email service, ftp program, sftp server, secure file transfer    , ftp download, file transfer software, managed file transfer, enterprise application integration, ftp server software, workflow automation, b2b integration, enterprise file transfer, data transfer software, download ftp server, cloud file transfer
    
Ipswitch
Published By: Silver Peak     Published Date: Jun 24, 2013
With key productivity applications becoming more bandwidth, processing and storage-intensive, dwp turns to Silver Peak Virtual Acceleration Open Architecture software to accelerate its file transfers and optimize WAN performance.
Tags : 
wan, productivity, reducing infrastructure costs, silver peak, collaboration, bandwidth management, wide area networks
    
Silver Peak
Published By: Cleo     Published Date: Jan 03, 2017
Modern MFT is designed to connect all of your information sources and consumers in a way that drives business agility with a simple user experience to manage data movement across your organization and beyond. With legacy and outsourced MFT technologies, companies are at a disadvantage when it comes to managing business-critical file transfers. Read this white paper to learn 10 considerations when evaluating the capabilities of your existing MFT solution or a replacement to help your business better meet existing and future use-case requirement.
Tags : 
cleo, mft, mft technology, file transfer, b2b integration, enterprise applications
    
Cleo
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: IBM     Published Date: Mar 18, 2015
Read this e-book to find out how you can create your own innovative approach to managed file transfer—one that ensures reliable, convenient and secure file transfers across every business process.
Tags : 
managed file transfer, ibm, secure file transfer, file delivery, visibility
    
IBM
Published By: IBM     Published Date: Nov 16, 2009
Is your information at risk? Read this whitepaper to find out how the IBM WebSphere MQ FTE solution, built on WebSphere MQ, offers reliable, secure and auditable file transfers.
Tags : 
ibm, ebf, websphere mq, file transfer edition, fte, ftp
    
IBM
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper provides guidance on common high-availability and scale-out deployment architectures, and discusses the factors to consider for your specific business environment. Three basic models are described for deploying an on-site managed file transfer (MFT) solution. The attributes of each option are described; each has pros and cons and offers a different balance of cost, complexity, availability, and scalability. The paper explains that, no matter how reliable each model is, any deployment can experience outages. The recommendation is to use clustering services to protect your data when the inevitable hardware, software, or network failures occur.
Tags : 
clustering, uptime, failover, mft, network failure, high volume, scale-out configuration, sla, ha cluster, high availability, load balancer, mission-critical transfers, active/passive, edi, it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security, eft, mail express, security, it management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management
    
Globalscape
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.