file level

Results 26 - 38 of 38Sort Results By: Published Date | Title | Company Name
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Jordan & Skala Engineers is a growing company with 5 offices.  It needed a scalable solution to optimize their network and their resources as more and more work was distributed across sites. Using GlobalSCAPE WAFS files mirror instantly in real time using byte-level differencing.  So as soon as a file is saved or closed, the file deltas appear in every other location on the network. Users are never waiting for files to upload, download, or open across a network.
Tags : 
wide area networks, wan, wans, wafs, wafs, file transfer, file transmission, globalscape
    
GlobalSCAPE
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection, personal finance, finance
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: Mentor Graphics     Published Date: Apr 03, 2009
For advanced signaling over high-loss channels, designs today are using equalization and several new measurement methods to evaluate the performance of the link. Both simulation and measurement tools support equalization and the new measurement methods, but correlation of results throughout the design flow is unclear. In this paper a high performance equalizing serial data link is measured and the performance is compared to that predicted by simulation. Then, the differences between simulation and measurements are discussed as well as methods to correlate the two.
Tags : 
mentor graphics, equalized serial data links, design flow, high loss channels, tektronix, pcb, bit error rate, ber
    
Mentor Graphics
Published By: Unitrends     Published Date: May 12, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of each of these techniques and explain why incremental forever when combined with byte-level deduplication is the superior methodology for reducing redundant data in the most efficient manner possible.
Tags : 
unitrends, redundant data, backup solution, data deduplication, olsen twins, mark kate olsen, ashley olsen, content awareness
    
Unitrends
Published By: Unitrends     Published Date: Dec 16, 2011
In this paper, we'll compare and contrast the advantages and disadvantages of various deduplication techniques.
Tags : 
deduplication, techniques, incremental, data, duplicate data, file-level, block-level, byte-level
    
Unitrends
Published By: HP     Published Date: Aug 26, 2014
Just Right IT solutions, based on HP servers, storage, networking, and services, simplify business technology, giving you more time to focus on your business. Whether you’re just getting started with virtualization and file sharing, or supporting expansion with solutions for server consolidation, data backup, and business consolidation, Just Right IT solutions provide appropriate technologies for your organization’s needs today. And when your business is ready for the next level of expansion, HP offers Just Right IT solutions that address growing requirements for collaboration, continuity, and consolidation. Learn more.
Tags : 
virtualization, data backup, business, technology, portfolio, cloud-based, support, portal
    
HP
Published By: Onaro     Published Date: May 09, 2007
Endless capital requests for additional storage resources are the bane of existence for many storage directors and infrastructure VPs. This white paper proposes a more effective approach to solving the utilization challenge in complex SANs.
Tags : 
san, sans, srm, storage, storage management, storage infrastructure, sanscreen, file-level utilization
    
Onaro
Published By: GFI     Published Date: Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
Tags : 
adobe, adobe acrobat, acrobat, gfi, spam, image spam, pdf spam, anti-spam
    
GFI
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Previous    1 2     Next   
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.