Files AWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Files A returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   File Transfer Management
 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Virtualization
 •   Enterprise Data Protection and Privacy
 •   Enterprise Content Management (ECM)
 •   Collaborative Tools
 •   Data and Application Distribution
 •   Network Security

Related Searches
 •   Concerns Files A
 •   Demonstration Files
 •   Files A Budgets
 •   Files A Wyoming
 •   Finds Files A
 •   Linux Files
 •   Needs Files A
 •   Reports Files
 •   Scheduling Files A
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Simplifying Network Security with a Single Source Provider by Perimeter eSecurity

December 2008 - (Free Research)
Read this whitepaper for a look at how, if done properly, reducing the number of security vendors or only selecting one vendor for multiple services is a great way for organizations to manage costs, obtain needed expertise, and expand security services. 
(WHITE PAPER) READ ABSTRACT |

The Children's Internet Protection Act by NETGEAR Inc.

December 2010 - (Free Research)
Schools and libraries must certify they have complied with, or are in the process of complying with, the CIPA requirements by filing a form with the Federal government in order to receive discounts on the telecommunication charges for access or connection costs. Are you certified? Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Smarter Process in the age of the customer by IBM

April 2013 - (Free Research)
Customers expect your operations to be instant, seamless and insightful so that each interaction is fast and effective. Access this fascinating white paper today to learn about expert solutions for improving business operations so as to effectively cater to customer interactions. 
(WHITE PAPER) READ ABSTRACT |

ABBYY Mobile DataCapture Solution: An Exciting New Channel for Data Exchange by ABBYY

May 2012 - (Free Research)
Read this technical paper to learn about a mobile data capture application technology designed to extract information from images scanned with your phone. With application tool kits like this, developers can create mobile applications that make the workforce more efficient with features that are unique to their marketplace. 
(WHITE PAPER) READ ABSTRACT |

Secure File Transfer: Send it Fast, but Send it Safely by SearchSecurity.com

April 2014 - (Free Research)
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-in is real. This guide to secure file transfer show how best to cure that sense of FTP insecurity. 
(EBOOK) READ ABSTRACT |

The Forrester Wave™: File Sync And Share Platforms by EMC Corporation

July 2013 - (Free Research)
This report and accompanying spreadsheet detail the findings about how well each file sync and share vendor scores based on Forrester's criteria and where they stand in relation to each other. Read on to discover more! 
(WHITE PAPER) READ ABSTRACT |

File Archiving: Your best or Worst Nightmare by OpenText

February 2014 - (Free Research)
Consult the following white paper to uncover the best practices for archiving file-based content as well as recommendations about how to handle the future growth of your files. 
(WHITE PAPER) READ ABSTRACT |

Enterprise Security with mobilEcho® : Enterprise Security from the Ground Up by Acronis

December 2013 - (Free Research)
This white paper highlights a mobile file management (MFM) solution that ensures secure corporate file access for the mobile workforce. 
(WHITE PAPER) READ ABSTRACT |

Toad Simplifies Oracle Trace by Dell Software

February 2013 - (Free Research)
View this white paper to learn how Toad™ for Oracle can help you mine your trace files faster and more effectively. Learn why Oracle's native trace file tools are limited, and how Toad can fill in the gaps. 
(WHITE PAPER) READ ABSTRACT |

Beyond FTP: Securing and Managing File Transfers by Linoma Software

March 2010 - (Free Research)
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol. 
(WHITE PAPER) READ ABSTRACT |

ActivEcho Trial Download by Acronis

October 2013 - (Free Research)
activEcho is an enterprise file sharing and syncing solution that balances the end user’s need for simplicity and effectiveness with the security, manageability and flexibility required by Enterprise IT. Download this free trial to give it a try. 
(PRODUCT DEMO) READ ABSTRACT |

Secure File Transfer in the Era of Compliance by Ipswitch WhatsUp Gold

July 2007 - (Free Research)
Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information. 
(WHITE PAPER) READ ABSTRACT |

IDC Opinion: The Economic Impact of File Virtualization - Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Enterprises are adopting new strategies for building file-based storage solutions. In several interviews, IDC found that companies are increasing their file-based storage by 50-120% a year, placing a high priority on efficiency. 
(WHITE PAPER) READ ABSTRACT |

Intelligent File Virtualization: Breaking Free from the Constraints of Today's File Storage Infrastructure by F5 Networks

January 2007 - (Free Research)
Intelligent file virtualization solves issues pertaining to current file storage infrastructure in a simple and effective manner. This white paper introduces the Acopia intelligent file virtualization solution, which is now a part of F5 Networks 
(ARTICLE) READ ABSTRACT |

File Virtualization Explained by F5 Networks

October 2009 - (Free Research)
At its most basic, file virtualization is about separating file data from restrictions in how it is accessed and manipulated. It can also ease things when it comes to migrating those storage systems. Read this presentation transcript to find out more about file virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Economic Impact of File Virtualization: Reducing Storage Costs and Improving Management Efficiency by F5 Networks

May 2007 - (Free Research)
Network-based file virtualization is a key technology for more effectively managing file-based information. Download this IDC white paper to learn how file virtualization is being implemented and its impact on organizations. 
(WHITE PAPER) READ ABSTRACT |

Using Windows File Classification Infrastructure to Classify and Protect Documents by TITUS

November 2010 - (Free Research)
This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets. 
(WHITE PAPER) READ ABSTRACT |

Course: Insecure Temporary Files (CWE-377) by Klocwork

November 2013 - (Free Research)
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377. 
(WEBCAST) READ ABSTRACT |

Sharepoint WAN Optimization And WAFS by Peer Software

February 2011 - (Free Research)
Design teams across the world collaborate to create and develop prod­ucts. Unfortunately, IT organizations face serious challenges when collaborative teams share large files. This white paper will assess the strengths and weaknesses of the four technologies most commonly used to enhance file sharing for distributed teams. 
(WHITE PAPER) READ ABSTRACT |

File Server Migration: Pain is in permissions by Dell Software

August 2012 - (Free Research)
Access this white paper to discover a three-phase approach to easily fixing problematic file permissions and securely migrating files even in the most complex environments. 
(WHITE PAPER) READ ABSTRACT |

10 Building Blocks for Securing File Data by Imperva

March 2011 - (Free Research)
This guide describes ten phases for securing file data, including how and when to use these basic capabilities, as well as when to deploy other complementary technologies. 
(WHITE PAPER) READ ABSTRACT |

File Security: Audit and Protect Critical Files by Imperva

August 2010 - (Free Research)
Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices. 
(WHITE PAPER) READ ABSTRACT |

Managing PST Files from Discovery to the Archive - Free White Paper by C2C Systems (UK)

February 2008 - (Free Research)
This white paper outlines some ideas, methods and applications for living with legacy .PST files and avoiding the creation of new ones. It will help you: -Assess the true facts about .PST files -Manage existing .PST files -Avoid the need for .PST 
(WHITE PAPER) READ ABSTRACT |

Guide: File System Auditor by ScriptLogic Corporation

August 2009 - (Free Research)
It sounds simple, but just try to figure out who accessed your confidential data yesterday. IT management standards insist on it, compliance standards require it, but can you deliver? 
(WHITE PAPER) READ ABSTRACT |

Solution Brief: Accelerating File Services Across the WAN by BlueCoat

February 2011 - (Free Research)
Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts