Electronic File Transfer Access Method White Papers

(View All Report Types)
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

The Managed File Transfer Buyer’s Guide
sponsored by Progress Software Corporation MOVEit
BUYER'S GUIDE: The cost of a data breach has surpassed the $4 million mark and doesn’t appear to be slowing down. While sending files through EFSS and EFP mediums reduces exposure, these methods are still not safe enough. In this buyer’s guide, find the right file transfer solution that protects your organization while meeting your unique needs.
Posted: 22 Nov 2024 | Published: 22 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

Simplify and Secure File Data Movement With Managed File Transfer
sponsored by Progress Software Corporation MOVEit
ESG WHITE PAPER: According to TechTarget’s Enterprise Strategy Group, 87% of surveyed IT decisionmakers believe their application and data environments will become distributed across even more locations over the next two years. Read this ESG White Paper to learn how Progress MOVEit can help to significantly reduce the cost and complexity of managed file transfer.
Posted: 15 Nov 2024 | Published: 16 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

How File Transfer Automation Can Support IT Security Goals and Data Growth
sponsored by Progress Software Corporation MOVEit
ESG WHITE PAPER: Download this ESG White Paper to learn more about how file transfer automation can support data growth and how MOVEit Automation from Progress could help your business.
Posted: 19 Nov 2024 | Published: 19 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

How to Automate and Integrate with Managed File Transfer: Analysis and Breakdown
sponsored by Progress Software Corporation MOVEit
EBOOK: Manually transferring numerous files may seem like small potatoes but it can easily chip away at your time, especially if you’re doing it every day. Read this eBook for a walkthrough on how to accomplish effective file transfer automation, including how to configure automation processes and examine file transfer logging and visibility issues.
Posted: 14 Nov 2024 | Published: 14 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

TeamViewer Tensor Secure Attended Access
sponsored by TeamViewer
PRODUCT OVERVIEW: As different as their industries may be, there is one thing that all manufacturers have in common: When a problem occurs, their customers expect quick support. That’s why many have begun connecting their products to provide instant remote support. Download this resource to learn more.
Posted: 08 Dec 2023 | Published: 09 Dec 2023

TOPICS:  .NET
TeamViewer

Why It’s Time for Healthcare Organizations To Modernize Data Transfer
sponsored by Progress Software Corporation MOVEit
EBOOK: The healthcare sector is innovating rapidly to cope with an aging population and staffing shortages, using technologies ranging from big data analytics to artificial
Posted: 26 Nov 2024 | Published: 26 Nov 2024

TOPICS:  .NET
All resources sponsored by Progress Software Corporation MOVEit

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 03 Apr 2024 | Published: 04 Apr 2024

XtelligentMedia Healthcare

How DirectTrust is Improving the Usability and Interoperability of Health Data
sponsored by XtelligentMedia Healthcare
EGUIDE: DirectTrust is looking to improve the usability of the Direct standard for use cases such as closed-loop referrals and ADT notifications to drive health data interoperability.
Posted: 27 Mar 2024 | Published: 27 Mar 2024

XtelligentMedia Healthcare

A Five-Step Roadmap to Building Your Mobility Strategy
sponsored by Zebra Technologies
WHITE PAPER: Electronic health record systems have become the industry standard for many patient care applications and processes. Yet caregivers at the patient’s bedside don’t always have immediate access to this critical information. View this report to access 5 critical steps to developing a clinical mobility strategy for your healthcare facility.
Posted: 19 Apr 2024 | Published: 19 Apr 2024

TOPICS:  .NET
Zebra Technologies

TeamViewer Tensor Secure Attended Access
sponsored by TeamViewer
PRODUCT OVERVIEW: Discover how TeamViewer's Secure Attended Access feature enables instant remote support, reduces downtime, and increases customer satisfaction for OEMs and manufacturers. Learn more by reading the full solution brief.
Posted: 10 Oct 2024 | Published: 10 Oct 2024

TeamViewer

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018

TechTarget ComputerWeekly.com

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

File Upload Security: The Missing Category for a Comprehensive Security Posture
sponsored by Deep Instinct
WHITE PAPER: Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
Posted: 25 Feb 2023 | Published: 25 Feb 2023

TOPICS:  .NET
Deep Instinct

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

Understanding Today’s Threat Actors
sponsored by Fortinet, Inc.
WHITE PAPER: Discover insights on today's threat actors and how they gain access to corporate networks. Learn the most common tactics used to maintain access, conduct discovery, and exfiltrate data. Download the full report for tips on how to improve your security posture.
Posted: 28 Mar 2024 | Published: 28 Mar 2024

TOPICS:  .NET
Fortinet, Inc.

Answering the Data Challenge in the AEC Sector
sponsored by Creative ITC
EBOOK: Discover how File-as-a-Service (FaaS) can help the AEC industry manage exponential data growth and enable seamless global collaboration. Learn about the benefits of FaaS, including enhanced security, effective recovery, and simplified IT operations. Read the full eBook to learn more.
Posted: 08 Nov 2024 | Published: 08 Nov 2024

Creative ITC

A Computer Weekly E-guide to NAS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TechTarget ComputerWeekly.com

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: This Analyst Report provides an overview of the Privileged Access Management (PAM) market, evaluating leading vendors and their solutions. It offers insights into the evolving landscape, focusing on cloud security, identity management, and advanced features. Read the full report to learn how to select the right PAM solution for your organization.
Posted: 29 Oct 2024 | Published: 29 Oct 2024

One Identity

Computer Weekly - 2 June 2020: What will be the IT security priorities of the post-coronavirus world?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the working world after the pandemic will be very different – we assess the IT security priorities for the 'new normal'. Facial recognition firms are racing to identify people wearing face masks. And how did Europe's telecoms networks cope with the switch to remote working? Read the issue now.
Posted: 08 Feb 2021 | Published: 02 Jun 2020

TechTarget ComputerWeekly.com

The ultimate guide to identity & access management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Businesses leaders and IT departments can no longer rely on manual and error-prone processes to assign and track user privileges. IAM automates these tasks and enables granular access control and auditing of all corporate assets. This e-guide outlines everything you need to know about IAM from pros and cons to the technologies, tools and vendors.
Posted: 22 Jan 2023 | Published: 23 Jan 2023

TechTarget ComputerWeekly.com

Reimagine workforce access with an identity-first security strategy
sponsored by CyberArk
WHITE PAPER: The rise in MFA bypass attacks and browser-based vulnerabilities indicate that just protecting the login is not enough to secure your workforce. This whitepaper explores a modern identity security strategy to securing workforce identities that’s centered on securing the complete digital user journey. Read on now to learn more.
Posted: 04 Dec 2024 | Published: 03 Dec 2024

CyberArk

Automated document management system tools transform workflows
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, we examine the components of a viable DMS and the technologies influencing its broader acceptance, how e-signatures are powering DM Simplementations, the differences between electronic and digital signatures, and the role of automated document management system tools in ensuring continuity for the new hybrid workforce.
Posted: 16 Dec 2021 | Published: 16 Dec 2021

TechTarget ComputerWeekly.com