File Transfer Access Method White Papers

(View All Report Types)
SOA Best Practices: The BPEL Cookbook
sponsored by Oracle Corporation
WHITE PAPER: The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.
Posted: 16 Mar 2009 | Published: 02 Aug 2007

Oracle Corporation

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

SOA Platforms - Evolving to Meet Stringent Market Realities
sponsored by Fiorano Software, Inc.
WHITE PAPER: This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.
Posted: 13 Jun 2007 | Published: 01 Jun 2007

Fiorano Software, Inc.

TCP/IP Sleuthing--Troubleshooting TCP/IP Using Your Toolbox
sponsored by Global Knowledge
WHITE PAPER: Troubleshooting is a necessary part of supporting any network installation. This paper will explain how to consider troubleshooting different problems that could exist in network.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Holistic Master Data Management Solutions and Services: Establishing the Foundation for Increasing Business Value
sponsored by Accenture
WHITE PAPER: Master data management solutions helps organizations maximize the value of postmerger integrations, manage the product lifecycle, meet regulatory requirements and improve the effectiveness of transactional and reporting systems.
Posted: 26 Jun 2008 | Published: 01 Jan 2007

Accenture

The OSI Model: Understanding the Seven Layers of Computer Networks
sponsored by Global Knowledge
WHITE PAPER: This paper explains each of the seven layers of OSI model, including their functions and their relationships, also it provide with an overview of the network process, which can act as a framework for understanding the details of computer networking.
Posted: 10 Dec 2008 | Published: 01 Jul 2006

Global Knowledge

Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER: Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007

Enterprise Management Associates (EMA)

Router Essentials
sponsored by Global Knowledge
WHITE PAPER: Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008

Global Knowledge

8 secure file transfer services for the enterprise
sponsored by TechTarget ComputerWeekly.com 
EGUIDE: Today's organisations need confidence that file transfers will not compromise their data's confidentiality, integrity and availability. In this e-guide, learn how secure file transfer works and the different secure file transfer services available to help you make an informed decision about how to best protect your organisation's data.
Posted: 20 Jun 2023 | Published: 20 Jun 2023

TechTarget ComputerWeekly.com 

Five AWS data migration methods to consider
sponsored by New Relic
EGUIDE: More organizations than ever are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data to the cloud isn't always straightforward. This exclusive e-guide reveals five data migration methods to move storage to AWS.
Posted: 08 Feb 2021 | Published: 21 Jun 2016

New Relic

Infographic: 6 file transfer best practices
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: File sharing is a critical everyday practice across the enterprise. The wide-scale adoption of IM and collaboration tools, as well as cloud-based file-sharing sites, has made the process of sharing data easier -- but also less secure -- than ever. Here are six secure file transfer best practices to avoid exposing confidential data.
Posted: 05 May 2022 | Published: 05 May 2022

TechTarget ComputerWeekly.com

Ctera Enterprise File Services Platform Cyber-Resilient File Platform From Any Edge To Any Cloud
sponsored by CTERA
PRODUCT OVERVIEW: The CTERA Enterprise File Services Platform unifies endpoint, branch office, and cloud file services to enable secure, modern file storage, collaboration, data protection, and disaster recovery. Learn how this platform can help you centrally manage file services and reduce IT costs by up to 80% in the full content.
Posted: 28 Oct 2024 | Published: 28 Oct 2024

CTERA

ServiceNow and Remote Support Integration Datasheet
sponsored by ServiceNow and Beyond Trust
PRODUCT OVERVIEW: Enhance remote support with ServiceNow integration. Increase productivity, strengthen security, and meet compliance requirements. Initiate remote sessions directly from ServiceNow, update tickets automatically, and access session details on demand. Read the full product overview to learn more.
Posted: 10 Jan 2025 | Published: 11 Jan 2025

ServiceNow and Beyond Trust

Data reduction methods for the all-flash data center
sponsored by Micron Technology
WHITE PAPER: This expert e-guide reveals how thin provisioning, deduplication, and compression can provide two major benefits to your data center. Also, learn about the alternative to reduction: native capacity.
Posted: 08 Feb 2021 | Published: 01 Jun 2016

Micron Technology

The Configurable Solution for PLM, PDM, and DMS
sponsored by Revalize
PRODUCT OVERVIEW: Discover a flexible, low-code PLM and DMS solution that enables fast, straightforward implementation through individual configuration. Access this e-book to learn how PRO.FILE can streamline your product-related processes and accelerate digital transformation.
Posted: 04 Oct 2024 | Published: 07 Oct 2024

Revalize

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 15 Mar 2021 | Published: 12 Feb 2021

TechTarget ComputerWeekly.com

SAN block access storage in the age of cloud and hyper-converged
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Royal Holloway: An enhanced approach for USB security management
sponsored by TechTarget ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 08 Feb 2021 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Object storage: A great fit for large, unstructured data sets
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Object storage is a rising star. In this e-guide we walk you through the key differences between object storage and the currently more mainstream approaches - file and block access. In doing so you'll clearly see the benefits and drawbacks of the object approach, which is to organise data in a flat structure with unique identifiers.
Posted: 08 Feb 2021 | Published: 12 Nov 2018

TechTarget ComputerWeekly.com

Accelerating Suspicious File Triage
sponsored by Reversinglabs
WHITE PAPER: Detecting malware in suspicious files has become increasingly challenging as cybercriminals employ advanced techniques to evade traditional security measures. By combining industry best practices with cutting-edge technology, SOC teams can implement an efficient and cost-effective approach to uncover malware.
Posted: 18 Mar 2025 | Published: 18 Mar 2025

Reversinglabs

NAS meets cloud and unstructured data challenges
sponsored by TechTarget ComputerWeekly.com
EGUIDE: NAS file access storage has progressed to meet the challenges of the cloud era. This e-guide provides key insights into NAS as we know it in the era of cloud and big, unstructured data sets.
Posted: 08 Feb 2021 | Published: 11 Jan 2019

TechTarget ComputerWeekly.com

Your expert guide to object storage: potential successor to traditional file and block storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Object storage does away with the tree-like hierarchies of file systems used by traditional storage NAS and SAN systems.
Posted: 08 Feb 2021 | Published: 06 Jun 2017

TechTarget ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 08 Feb 2021 | Published: 23 Nov 2017

TechTarget ComputerWeekly.com

Privileged Access Management
sponsored by One Identity
ANALYST REPORT: Read this comprehensive overview of the Privileged Access Management (PAM) market including vendor capabilities, product ratings and market leadership analysis from KuppingerCole. Discover leading PAM solutions to help secure privileged access across endpoints, servers, applications and cloud.
Posted: 17 Apr 2024 | Published: 17 Apr 2024

TOPICS:  Access Control
One Identity

File Upload Security: The Missing Category for a Comprehensive Security Posture
sponsored by Deep Instinct
WHITE PAPER: Organizations accept files through their web applications to run their business. But, files being uploaded by customers could contain malware or some other risk that could hurt your business. What is scarier is that 80% of successful breaches come from zero-day attacks. Read on to learn more and don’t let malicious files stay like uninvited guests.
Posted: 25 Feb 2023 | Published: 25 Feb 2023

TOPICS:  .NET
Deep Instinct

Essential Guide to LTFS tape NAS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Linear Tape File System (LTFS) offers the chance to build nearline storage with the cost profile of tape and the access times of NAS. This guide walks you through LTFS and tape NAS.
Posted: 08 Feb 2021 | Published: 16 Jan 2019

TechTarget ComputerWeekly.com

The State Of Cloud Data Security
sponsored by Palo Alto Networks
RESEARCH CONTENT: This research report analyzes over 13 billion files to reveal where sensitive data resides in the cloud, who has access to it, and how it flows between services. Learn how to improve cloud data security and compliance by reading the full report.
Posted: 10 Dec 2024 | Published: 11 Dec 2024

Palo Alto Networks

The Configurable Solution for PLM, PDM, and DMS
sponsored by Revalize
PRODUCT OVERVIEW: Discover how the configurable PRO.FILE platform can streamline your product data management and digitalization efforts. Read the overview to learn about its fast, flexible implementation, pre-built application packages, and mobile access.
Posted: 18 Sep 2024 | Published: 19 Sep 2024

Revalize

Authentication Best Practices: On and Off the Cloud
sponsored by HID Global
EGUIDE: Two-factor authentication vs. multifactor authentication: Which is better? Access this e-guide to compare the two methods of authentication, and find out whether one is favored for securing cloud credentials.
Posted: 08 Feb 2021 | Published: 12 Oct 2016

HID Global

A Computer Weekly E-guide to NAS
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.
Posted: 19 Apr 2021 | Published: 19 Apr 2021

TechTarget ComputerWeekly.com

Fortinet Unified Secure Access Service Edge
sponsored by Fortinet, Inc.
ANALYST REPORT: Fortinet SASE Solution Earns AAA Rating. CyberRatings.org thoroughly tested FortiSASE to determine how it handled TLS/SSL 1.2 and 1.3 cipher suites, how it defended against 205 exploits and 7,140 malware samples, and whether any of 1,124 evasions could bypass its protection. Read the full report to get all the details.
Posted: 18 Dec 2024 | Published: 04 Dec 2024

TOPICS:  .NET
Fortinet, Inc.

Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Insider threats come from employees, contractors, or partners with access. Exabeam's UEBA technology detects these by analyzing user behavior, setting baselines, and scoring risk. It uses machine learning and automation to identify unusual activities. Read this white paper to see how analytics can protect your organization from data theft.
Posted: 22 Mar 2025 | Published: 20 Mar 2025

Exabeam

Preventing Insider Threats with UEBA
sponsored by Exabeam
WHITE PAPER: Insider threats come from employees, contractors, or partners with access. Exabeam's UEBA technology detects these by analyzing user behavior, setting baselines, and scoring risk. It uses machine learning and automation to identify unusual activities. Read this white paper to see how analytics can protect your organization from data theft.
Posted: 20 Mar 2025 | Published: 20 Mar 2025

Exabeam