transfer security

Results 26 - 50 of 51Sort Results By: Published Date | Title | Company Name
Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality
    
YouSendIt, Inc.
Published By: Linoma Software     Published Date: May 18, 2011
This paper demonstrates how you can bring FTP into a modern framework that increases IT manageability while decreasing security exposures and adhering to growing compliance/auditing requirements.
Tags : 
linoma software, ftp, file transfers, file transfer protocol, user interaction, security exposure, regulatory compliance, pci
    
Linoma Software
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Globalscape     Published Date: Jun 27, 2014
Globalscape’s Enhanced File Transfer™ (EFT™) High Security module (HSM), with the Auditing and Reporting module (ARM), helps achieve or exceed security practices mandated by the most rigorous standards, including PCI DSS, FIPS 140-2 Validation, HIPAA, and Sarbanes-Oxley. This whitepaper discusses how EFT, the HSM, and ARM can help you achieve compliance and stay compliant with the PCI DSS.
Tags : 
globalscape, enhanced file transfer, high security module, auditing, reporting, security practices, compliance, file transfer
    
Globalscape
Published By: Globalscape     Published Date: Jun 27, 2014
The PCI Security Standards Council issued version 3 of their PCI DSS guidelines for processing electronic payments. Our whitepaper details the newest additions to the guidelines as well as tools and resources to help organizations comply with the standards.
Tags : 
globalscape, file transfer, security, compliance, payment information, electronic payments, ecommerce, security
    
Globalscape
Published By: Qualys     Published Date: Jan 08, 2015
Health care organizations face a variety of security challenges—from the growing presence of online personal data to new methods of accessing and transferring medical information. Protecting sensitive data requires more vigilance than ever. Learn how your IT security peers are responding to threats from mobile and cloud technologies to address these open systems in this latest SANS survey:New Threats Drive Improved Practices: State of Cybersecurity in Health Care Organizations. Inside you’ll see all the results—revealing better awareness of risks with improved commitment of resources and support. Download now to learn more about how leading health care organizations: Assess information ecosystems — to understand gaps in infrastructure Establish data-centric security controls — focusing on information, not just infrastructure Manage identities — tying data controls closely with identity and access management Invest in incident response — documenting and maintaining a formal response p
Tags : 
it security, information ecosystems, data-centric security, identity management
    
Qualys
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
AON’s Human Capital division needed a better way to automate their data transfer processes. They wanted a simple yet flexible system that didn’t require customization to adapt to growing needs.  They wanted to consolidate their sensitive data transfers and ensure the security of this data and to provide integration with current workflow and key legacy applications. AON deployed the GlobalSCAPE EFT (Enhanced File Transfer) server.
Tags : 
file transfer, file transmission, eft, mft, secure file transfer, data transfer, data transmission, globalscape
    
GlobalSCAPE
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
The Payment Card Industry Data Security Standard is a detailed series of 130+ requirements that anyone who stores or transfers credit card data has to comply with.  However due to the protection it offers, the PCI DSS is fast becoming a security standard for all sensitive data that needs to be protected.  The goal of the standard is to ensure security of data in transit and at rest while ensuring compliance is maintained. 
Tags : 
pci, pci dss, pci compliance, compliance, credit card, credit cards, payment card, data protection
    
GlobalSCAPE
Published By: McAfee Inc     Published Date: Oct 30, 2009
Browsers are the least-protected and therefore easiest medium for transferring malware, which is why protecting your company against web-borne threats should be part of a total security solution. This brief explains the key benefits of implementing a web security solution with McAfee. Read more.
Tags : 
mcafee, email protection, midsize, global threat intelligence, security, data protection, spam
    
McAfee Inc
Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing, file sharing, byod, mobile devices
    
GlobalSCAPE
Published By: thawte     Published Date: Nov 06, 2006
A guide to understanding SSL certificates, how they operate and their application. By making use of an SSL certificate on your web server, you can securely collect sensitive information online, and increase business by giving your customers confidence that their transactions are safe.
Tags : 
ssl, encryption, security, application security, online data transfer, data security, secure socket layer, ssl certificate
    
thawte
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, file transfer systems, stagnation, automation, file movement, file security, regulatory compliance
    
Ipswitch
Published By: Ipswitch     Published Date: Mar 14, 2014
In this case study, you’ll learn how Rochester General Hospital leveraged MOVEit’s point and click simplicity to set up, manage and track more than 70 different file transfer operations between hospital servers and the systems used by payers and outside healthcare providers.
Tags : 
ipswitch, moveit, sensitive data, managed file transfer solution, file transfer, file transfer systems, records management, data security
    
Ipswitch
Published By: Ipswitch     Published Date: Mar 14, 2014
Due to the massive volume and complexity of the information – compounded by the use of cumbersome DOS scripts – Viva Health needed to simplify and automate their file transfer processes while also remaining in compliance of various regulations. See how they accomplished both objectives with MOVEit Central.
Tags : 
ipswitch, moveit, information management, automation, file transfer, file transfer process, regulatory compliance, file transfer system
    
Ipswitch
Published By: Ipswitch     Published Date: Mar 14, 2014
This newly-released e-Guide provides senior technology leaders with a concise assessment of the challenges they face with legacy file transfer systems—and looks at innovative solutions and best practices that can solve these problems.
Tags : 
ipswitch, file transfer, stagnation, automation, file management, file management systems, file transfer systems, productivity
    
Ipswitch
Published By: Ipswitch     Published Date: Mar 14, 2014
This just-released e-Guide provides IT professionals who are “in the trenches” with a concise assessment of why legacy file transfer systems are no longer adequate in the face of today’s skyrocketing user demands. Specifically, the e-Guide exposes the limitations of “business as usual” file transfer solutions such as FTP and e-mail, and looks at an innovative solution that can make the IT professional’s job much easier
Tags : 
ipswitch, file transfer, file location, file transfer system, automation, integration, centralization, file transfer solution
    
Ipswitch
Published By: Symantec     Published Date: Dec 28, 2015
Learn how code signing mitigates the risks of transferring code over the Internet or wireless networks, as well as allows end users to take advantage of the ease and convenience of content distribution without worrying about security consequences.
Tags : 
code signing, wireless networks, transferring code, content distribution, security
    
Symantec
Published By: YouSendIt     Published Date: Jul 18, 2011
This case study illustrates how AMAG drastically cut completion time of critical projects by eliminating e-mail transfer of large files, ultimately improving security, increasing cost-savings and accelerating time to market.
Tags : 
amag, pharmaceuticals, intravenous drugs, anemia, online file sharing, ftp replacement, send large files, secure file transfer
    
YouSendIt
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml
    
Ping Identity
Published By: Attachmate     Published Date: Jul 09, 2013
Is your file transfer system keeping up with growing trading-partner requirements? Can it accommodate multiple platforms, protocols, and security standards? Can it successfully deliver large files, to the right person, on time? If uncertainty is part of your daily routine, you need to see this video.
Tags : 
download ftp program, secure ftp, secure large file transfer, managed file transfer, ftp automation, managed ftp reflection ftp client, file transfer software, file transfer management
    
Attachmate
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper describes the formal and informal file-sharing methods business employees use to perform their daily functions and explains that, from sending small text documents to multi-gigabyte video files, the right managed file transfer (MFT) solution can allow such transfers to continue without risking the security of the corporate network. The paper explains that the right MFT solution can enable business growth, enhance operational efficiency, enable compliance, reduce costs, and increase ROI. Choosing the right MFT solution requires eight considerations described in the paper, and concludes by explaining why Globalscape solutions are the choice of our customers around the world.
Tags : 
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services. This paper explains that employees may not be aware that their file transfer methods can cause a risk to security. Ways to ensure that employees can securely send files without risking corporate data security and what that dangers are with BYOD transfers are also discussed. Recent security breaches are referenced in the paper, and why such attacks are expected to continue into the future. The paper concludes with a description of how companies can ensure data security and how Globalscape's secure file transfer products meet and exceed that need.
Tags : 
byod, dropbox, google drive, file transfer, file sharing, mft, mobile security, data protection
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Email. It can be the source of some of IT's biggest headaches. As it eats up storage and bandwidth, it also opens up holes in your IT security plan. But there is good news. Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too!
Tags : 
file transfer, file sharing, mft, mobile security, data protection, internet security, network security, data security
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
Find out the answer and as well as the other deployment options.
Tags : 
globalscape, saas, managed file transfer, mft, deployment, deployment model, security, automation
    
Globalscape
Start   Previous    1 2 3    Next    End
Search Resource Library