Critical FilingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Critical Filing returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   File Transfer Management
 •   Storage Management
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disaster Recovery
 •   Network Security
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Access Critical
 •   Case Critical Filing
 •   Critical Importing
 •   Critical Make
 •   Critical Webcast
 •   Function Of Critical Filing
 •   Operational Critical Filing
 •   Purchasing Critical Filing
 •   Simple Critical Filing
 •   Strategies Critical Filing
Advertisement

ALL RESULTS
1 - 25 of 429 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

File Security: Audit and Protect Critical Files by Imperva

August 30, 2010 - (Free Research)
Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices. 
(WHITE PAPER) READ ABSTRACT |

Data Protection and Backup: Questions to Consider When Creating Your Disaster Recovery Plan by StorageCraft Technology Corporation

February 18, 2011 - (Free Research)
When it comes to data protection and recovery, many businesses are not as safe as they believe. The first thing that comes to mind when considering a disaster recovery plan, by the average consumer and corporate technology professionals alike, is a backup of critical files. This white paper will answer important questions on backups and recovery. 
(WHITE PAPER) READ ABSTRACT |

File Security for Linux/BSD/Solaris: Antivirus Protection for your servers by ESET

March 25, 2011 - (Free Research)
ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

ESET File Security for Linux/BSD/Solaris by ESET

August 03, 2010 - (Free Research)
Increasing volumes of malicious software are launched daily to steal passwords or sensitive corporate and customer information. ESET File Security provides Linux, BSD and Solaris file servers with on-demand and on-access protection from known and emerging viruses, worms, trojans, spyware, rootkits and other Internet threats. 
(DATA SHEET) READ ABSTRACT |

PCI Compliance Report: Cost Analysis Reveals Expense Justified by McAfee, Inc. [DO NOT USE]

December 2007 - (Free Research)
Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment. 
(WHITE PAPER) READ ABSTRACT |

The Mezeo Cloud Storage Platform for the Enterprise by Mezeo Software

September 2010 - (Free Research)
Cloud storage reduces the cost of storing less critical files, automating business processes and providing ubiquitous access to employees globally. The deployable Mezeo Cloud Storage Platform is an enterprise-class solution ideal for organizations looking to implement private clouds. 
(WHITE PAPER) READ ABSTRACT |

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Enhanced Classification and Policy Enforcement with Windows Server 2008 R2 and Titus Labs by Microsoft

March 2010 - (Free Research)
With the sheer volume of data on servers, it has become very difficult for IT administrators to manage the information and mitigate the risks of data leakage. File classification is a critical first step in addressing these challenges. This session covers how to leverage Windows servers to deliver enhanced classification and policy enforcement. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PST Archiving: What is it and How is it Done? by CommVault Systems, Inc.

January 2014 - (Free Research)
This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files. 
(WEBCAST) READ ABSTRACT |

Exchanging Large Files with External Partners by GlobalScape

May 2014 - (Free Research)
Access this resource to explore a range of security solutions built to fit varying business needs for exchanging large files. 
(WHITE PAPER) READ ABSTRACT |

A Guide to PST Files - How Managing PSTS will Benefit Your Business by C2C Systems (UK)

May 2013 - (Free Research)
This whitepaper provides a complete guide to personal storage files. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

Mobile is the New Normal for Conducting Business by GlobalScape

May 2014 - (Free Research)
This resource features a cloud-based mobile file sharing solution that enables convenient and secure user collaboration. 
(WHITE PAPER) READ ABSTRACT |

Disaster Recovery with the HP StorageWorks Enterprise File Services Clustered Gateway Linux Version and HP StorageWorks XP Continuous Access by Hewlett-Packard Company

December 2007 - (Free Research)
This white paper reviews proof points and best practices for file sharing disaster recovery. 
(WHITE PAPER) READ ABSTRACT |

The Economic Impact of File Virtualization: Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Network-based file virtualization is a key technology for more effectively managing file-based information. Download this IDC white paper to learn how file virtualization is being implemented and its impact on organizations. 
(WHITE PAPER) READ ABSTRACT |

Using Windows File Classification Infrastructure to Classify and Protect Documents by TITUS

November 2010 - (Free Research)
This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets. 
(WHITE PAPER) READ ABSTRACT |

EMC Extends Benefits of File Virtualization into the Archive by EMC Corporation

June 2008 - (Free Research)
This paper, discusses some of the challenges around virtualizing archives and explore how EMC has leveraged Rainfinity file virtualization with Centera CAS. 
(WHITE PAPER) READ ABSTRACT |

Managed File Transfer: When Data Loss Prevention Is Not Enough - Moving Beyond Stopping Leaks and Protecting Email by Coviant Software Corporation

December 2010 - (Free Research)
Read this paper to learn how Data Loss Prevention products can identify high-risk network traffic that require intervention and how your IT staff can use an MFT solution to reduce your business risk from these transfers. 
(WHITE PAPER) READ ABSTRACT |

Avocent Accelerates Critical Applications over WAN While Ensuring Distributed Web Security at Branch Offices by BlueCoat

September 2011 - (Free Research)
IT infrastructure management solutions provider, Avocent Corporation, needed to accomplish two critical tasks: Improve performance of key business applications and provide decentralized Web security and control for their branch offices. View this case study to learn how they were able to meet both needs with just one solution. 
(CASE STUDY) READ ABSTRACT |

Evaluating cloud-based file transfer services by IBM

July 2011 - (Free Research)
If you are looking for smarter ways to approach file sharing in your commerce environment, you are probably thinking about outsourcing or moving to the cloud. This evaluation from IBM, supported by research from Vanson-Bourne, can help by showing you critical factors to consider. 
(WHITE PAPER) READ ABSTRACT |

The Five Critical SLA Questions by IBM

February 2011 - (Free Research)
SLAs are critical tools that can help ensure appropriate performance. And the use of SLAs as part of the service delivery management process is on the rise. If you’re going to succeed, you’ll have to do your homework. This paper identifies the five critical steps you should take before you define your Service Level Agreements. 
(WHITE PAPER) READ ABSTRACT |

Tape vs. Archive for Long-term Data Retention by Iron Mountain

October 2011 - (Free Research)
While there is still some talk predicting the death of tape, the reality is quite the opposite. More significant than tape’s survival in the backup environment is its emergence as the preferred medium in archiving and large-file processing. Check out this presentation to learn more about tape and why it isn't going anywhere anytime soon. 
(PRESENTATION) READ ABSTRACT |

U.S. Army Relies on GlobalSCAPE® Secure Information Exchange Solutions to Protect Critical Data by GlobalScape

June 2011 - (Free Research)
Now you can get a file sharing solution that the U.S. Army uses and eliminate any worries you have about transferring sensitive business data. This case study will show you how this solution has been very successful for the Army and will teach you how your business could benefit a great deal as well. 
(CASE STUDY) READ ABSTRACT |

The Critical Need for Encrypted Email and Secure File Transfer Solutions by Proofpoint, Inc.

July 2009 - (Free Research)
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption. 
(WHITE PAPER) READ ABSTRACT |

Market Trends - Secure File Sharing and Collaboration in the Enterprise by Accellion, Inc.

February 2014 - (Free Research)
This report by Forrester Analyst Heidi Shey showcases workforce behaviors and trends that are hastening demand for secure file sharing and collaboration solutions. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 429 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts