file level

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Group M_IBM Q4'19     Published Date: Oct 25, 2019
IBM Sterling Secure File Transfer Demo - simplify and scale your file transfers Companies of all sizes in every industry are extremely reliant on file transfer as an essential infrastructure to power business. In fact, 55% of all systems integration is still done through file transfer.? IBM Sterling Secure File Transfer is a battle-tested platform that secures and simplifies scalable file-based transactions. In a single offering, you can: • Automate inbound and outbound file transfer across multiple protocols so you can partner with anyone, anywhere. • Handle your most demanding workloads with reliable, point-to-point file transfers. • Gain full end-to-end visibility and governance to help you meet your service level agreements. • Protect your brand reputation and comply with tightening regulations.
Tags : 
    
Group M_IBM Q4'19
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: TE Connectivity     Published Date: Feb 07, 2018
Our free solutions guide profiles solutions made to take safety & security in both new and older buildings to a higher level. You’ll get 1. Building Safety & Security Solutions Guide 2. Building Safety & Security Fact Sheet 3. USB Interconnects Quick Reference Guide 4. PIDG Terminals & Splices Quick Reference Guide 5. AMPMODU Interconnect System Catalog
Tags : 
    
TE Connectivity
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
workforce, security, task automation, content security, employee collaboration
    
Citrix ShareFile
Published By: Citrix ShareFile     Published Date: Jul 11, 2017
When your business doesn’t provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies: Why a consolidated approach to file sharing can boost security and productivity How business-wide adoption of enterprise-level tools aids workplace mobility What time-consuming tasks can be automated to improve efficiency and security
Tags : 
data security, mobility, content collaboration, security efficiency, productivity
    
Citrix ShareFile
    
Ciena
Published By: Citrix ShareFile     Published Date: Jun 12, 2017
Examine a few of the enterprise-level features that IT departments and administrators will look for in a file-sharing service. Some file-sharing services make the grade at a consumer level, but don’t offer the kinds of features that make a system workable for enterprise. An enterprise-level service should be able to balance its efficiency – a primary user concern – with the needs of a company’s IT department.
Tags : 
file sharing, consumer level, enterprise level, efficiency
    
Citrix ShareFile
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: Veracode     Published Date: Oct 26, 2016
When a high-profile, or simply branded, vulnerability is disclosed, security teams are expected to abandon their planned activities and react. But, these responses can be time-consuming and costly. Even if the vulnerability is achieving mainstream awareness, enterprises need to balance responses against risk. Download this handy report for guidance on preparing for a high-profile vulnerability disclosure so risk-management or security teams can respond with the appropriate level of urgency.
Tags : 
veracode, security, vulnerability, high-profile vulnerability disclosure, vulnerability disclosure
    
Veracode
Published By: IBM     Published Date: Sep 30, 2016
Securing sensitive data presents a multi-dimensional challenge where complex environments—which often include a wide range of heterogeneous database management systems (DBMS), enterprise applications, big data platforms, file systems, OS platforms with multiple access paths and permission levels—have created a seemingly end-less array of security risks and violation scenarios. This data security ebook examines the top 5 scenarios and essential best practices for defending against insider threats and external attacks.
Tags : 
ibm, data, big data, safeguard, sensitive data, security, dbms, data management
    
IBM
Published By: Adobe     Published Date: Nov 10, 2015
Download this white paper to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, data security, mobile device, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Aug 11, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, enterprise, mobile, security, saas, document management, cloud
    
Adobe
Published By: Adobe     Published Date: Apr 13, 2015
The purpose of this research is to understand the challenges companies face in their document or file level security practices as a result of the adoption of such disruptive technologies as mobile devices and cloud services.
Tags : 
adobe, document security, cloud services, it research, global insights
    
Adobe
Published By: IBM     Published Date: Mar 18, 2015
Your business depends on the easy, secure movement of data. But if you’re using outdated technologies and unsecure file transfer protocol (FTP), you’re exposing your organization to risk—and driving up costs as well. Use the FTP Risk Advisor to find out your risk level, and get a customized report with recommended actions you can take to protect your files—and your business.
Tags : 
ibm, secure data movement, risk advisor, file transfer protocol, risk report, file protection, personal finance, finance
    
IBM
Published By: NetApp     Published Date: Sep 24, 2014
ESG research indicates that the corporate usage of public cloud computing in the form of cloud-based infrastructure services, business applications , and/or application development continues to grow. What are the profiles of the organizations at the forefront of the cloud adoption movement, how are these services being leveraged today, and what is their likely level of impact over a five-year horizon?
Tags : 
public cloud, corporate use, cloud-based infrastructure, business applications, application development, cloud impact
    
NetApp
Published By: HP     Published Date: Aug 26, 2014
Just Right IT solutions, based on HP servers, storage, networking, and services, simplify business technology, giving you more time to focus on your business. Whether you’re just getting started with virtualization and file sharing, or supporting expansion with solutions for server consolidation, data backup, and business consolidation, Just Right IT solutions provide appropriate technologies for your organization’s needs today. And when your business is ready for the next level of expansion, HP offers Just Right IT solutions that address growing requirements for collaboration, continuity, and consolidation. Learn more.
Tags : 
virtualization, data backup, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection
    
HP
Published By: Achievers     Published Date: Jan 17, 2014
Knowledge and strategic relationships fuel many organizations in today’s rapidly changing, global economy. As such, organizations need to leverage the individuals—and their networks—that possess the most relevant knowledge, whether they are current employees or are only loosely connected to the organization. To do this, organizations should create and leverage peer collaboration networks that enable them to identify and connect with individuals who have the unique skills, knowledge, and capabilities these organizations need. Bersin’s Research, Why Reputations and Networks Matter in the Open Talent Economy, indicates that this approach works in driving value—organizations that have effectively used internal reputation networks and profile databases have been able to increase key metrics such as employees’ time to productivity and innovation levels.
Tags : 
talent management, employee enagement, human resources
    
Achievers
Published By: EMC Corporation     Published Date: Mar 06, 2013
This technology profile examines how IT decision makers’ expectations and approaches are evolving to address increasing demands for higher levels of IT availability from their organizations and clients.
Tags : 
high availability, continuous availability, business continuity, risk management, data center
    
EMC Corporation
Published By: CDW Quantum     Published Date: Sep 07, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection
    
CDW Quantum
Published By: CDW Symantec     Published Date: Sep 06, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection
    
CDW Symantec
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.