file management

Results 51 - 75 of 148Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Aug 03, 2009
The usual cure for exploding file volumes is to add more general purpose file servers. That strategy eventually leads to server sprawl, which brings with it more management complexity, stranded disk capacity, wildly differing storage utilization rates and slower file access. Network-attached storage (NAS) appliances can add file serving capacity that's more easily managed, shareable, more scalable and more efficient than a sprawl of general purpose servers. Read this online article to learn about three basic considerations that can help simplify your NAS buying decision.
Tags : 
nas, network-attached storage, servers, storage
    
HP
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, knowledge management, data management, business technology
    
Dell Software
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, filexpress managed file transfer, security
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Published By: Box     Published Date: May 30, 2012
This report analyzes the longer-term, five-year cost of ownership and value for cloud applications across four categories: CRM, ERP, collaboration (including email), and IT service management.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, knowledge management, enterprise applications, data integration, information management
    
Box
Published By: Box     Published Date: May 31, 2012
Here's how some of the nation's most progressive corporations are meeting the many needs of their mobile workers - without overwhelming their IT departments - with the help of Box.
Tags : 
mobile, mobile worker, communication devices, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless
    
Box
Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, knowledge management, data integration
    
Box
Published By: Box     Published Date: May 31, 2012
This Gilbane Group Beacon examines how large-­scale trends are changing enterprise collaboration and content sharing expectations. It defines Cloud Content Management, an emerging set of content management practices.
Tags : 
cloud, content management, active control, collaboration, sharing, content sharing, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management
    
Box
Published By: Box     Published Date: May 31, 2012
This IDC Vendor Profile analyzes Box, a company playing in the public cloud advanced storage services market and the content management and collaboration market, and reviews key success factors, highlighting market information tailored to investment.
Tags : 
content, cloud, collboration, enterprises, free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace
    
Box
Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, security, enterprise applications, information management, virtualization
    
Box
Published By: Box     Published Date: Jun 07, 2012
Read how Box let companies rapidly implement a cost-effective and secure content storage and sharing system that can easily expand to accommodate any size and number of files.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, networking, storage, virtualization, cloud computing
    
Box
Published By: Box     Published Date: Jun 11, 2012
This paper examines the market drivers, inhibitors, and top vendors in this segment, including Box, Citrix Sharefile, Dropbox, Egnyte, Nomadesk, Sugarsync, Syncplicity and YouSendIt.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online, store documents online, online collaboration, collaboration tools, ftp replacement, sharepoint alternative, file storage, mobile data access, share files online, asset management, online workspace, workspace, wireless, enterprise applications, information management, cloud computing
    
Box
Published By: CDW Symantec     Published Date: Sep 06, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection
    
CDW Symantec
Published By: CDW Quantum     Published Date: Sep 07, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection, business technology
    
CDW Quantum
Published By: Delta Risk     Published Date: Jun 07, 2016
Recent high profile, high impact cyber breaches at some of the largest financial institutions in the United States have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This Viewpoint offers the Delta Risk perspective on how boards should engage in the management of cyber security risks, stressing four priority activities.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Webroot UK     Published Date: Sep 05, 2013
Webroot SecureAnywhere Business - Endpoint Protection offers a revolutionary approach to malware protection. It brings together Webroot's innovative file pattern and predictive behavior recognition technology, with the almost limitless power of cloud computing, to stop known threats and prevent unknown zero-day attacks more effectively than anything else. Read this white paper to learn about ultimate performance and minimal management security software from Webroot.
Tags : 
webroot, secureanywhere, business, software, security software, revolutionary software, predictive behavior, known threats, zero day attacks, ultimate protection, security
    
Webroot UK
Published By: GFI Software     Published Date: Mar 21, 2011
Companies' dependency on email to do business brings with it various problems. Storage limitations, backups, problematic PST files, access to old emails and regulatory compliance or eDiscovery requests are a few issues that arise. Failure to address these effectively could have serious repercussions for the organization.
Tags : 
gfi, email archiving, backups, storage, pst files, regulatory compliance, ediscovery, exchange server, email management software
    
GFI Software
Published By: IBM     Published Date: Nov 17, 2009
The information agenda is intended to map out corporate business and technology goals and to create a roadmap to ensure that companies can leverage their corporate information as a strategic asset in the pursuit of these goals.
Tags : 
ium evaluation, ibm, information on demand, uim, iod, information management, scential, filenet, cognos, soa, cross-ibm initiative, websphere, lotus, tivoli, ibm global services, ovum 2008, information agenda, vanguard, master data management, enterprise content integration
    
IBM
Published By: IBM     Published Date: Dec 06, 2010
Although great strides have been made to automate most services, government agencies remain burdened with processes that require high levels of manual intervention that, in turn, can lead to operational inefficiencies.
Tags : 
ibm filenet, government regulation, it management, productivity, case management, business application, corporate governance, information management
    
IBM
Published By: Proofpoint     Published Date: Apr 06, 2012
Gartner, Inc. positions Proofpoint in the Challengers quadrant in its 2011 Magic Quadrant for the Enterprise Information Archiving (email archiving, file archiving, social media archiving, retention management, eDiscovery, search, legal hold) market.
Tags : 
gartner, email archiving, archive email, eia magic quadrant, gartner, search, ediscovery, legal hold, cloud archiving, storage costs, information governance, archiving, regulatory compliance, information governance, discovery, ediscovery, file shares, managing content, cloud archiving, email retention
    
Proofpoint
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Retail Management Software Vendors.
Tags : 
business software
    
Business-Software
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Supply Chain Management Software Vendors.
Tags : 
business software
    
Business-Software
Published By: Business-Software     Published Date: Jul 14, 2010
Profiles of the Leading Warehouse Management Software Vendors.
Tags : 
business software, data warehousing
    
Business-Software
Published By: Tripwire, Inc     Published Date: Jan 29, 2010
Tripwire provides IT organizations with enhanced file integrity monitoring, configuration assessment and log management that automates continuous PCI compliance.
Tags : 
tripwire, pci compliance, file integrity monitoring, configuration assessment, log management, malware, security, event management
    
Tripwire, Inc
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept