Whitepapers and eBooks

Whether you’re looking for general information on a particular file transfer topic, or are looking for in-depth answers to a technical problem, our collection of whitepapers and eBooks cover a wide range of topics to help you get the most from your file transfer processes.

Business-class File Sharing
Business-class File Sharing
Consumer-grade solutions such as Dropbox, webmail and USB drives are being rapidly adopted in the workplace but are they right for you? Explores the differences between Managed File Transfer and Enterprise Sync and Share (EFSS) tools.
Are Employees Putting Your Company’s Data at Risk?
Are Employees Putting Your Company’s Data at Risk?
Are your employees transferring files through personal email, YouSendIt, Dropbox and other unsecured ways? Does your IT department lack visibility and control over person-to-person file transfer and distribution of your company's sensitive data and information?
Overcoming Key File Transfer Problems
Overcoming Key File Transfer Problems
Organizations must transfer enormous amounts of information to support a wide range of business processes and these content transfers must be timely and managed in a consistent, compliant and efficient way. This whitepaper offers a roadmap for organizations putting together a file transfer strategy.
How MFT Systems Integrate with Other Business Processes: Vol 2
How MFT Systems Integrate with Other Business Processes: Vol 2
Download this guide for clear explanations that can provide guidance for any organization developing an MFT solution strategy. Once you know you need a Managed File Transfer system, how do you integrate it with your existing systems, both internal and external, and enable central management and control? Don Jones, author of more than 30 IT books, this valuable eBook answers a set of questions fundamental to Managed File Transfer (MFT) with detailed, real-world answers.
MFT Project Management: Deployment , Integration, and Preparing for Audits: Vol 3
MFT Project Management: Deployment , Integration, and Preparing for Audits: Vol 3
Should you deploy MFT on premise or in the cloud (Software as a Service)? How do Managed File Transfer Systems integrate with SEIM systems? What should I look for in an MFT System--including: Encryption Standards, Flexibility with Protocols, Workflow, Data Handling and Clients? What will auditors like or dislike about Managed File Transfer? Get answers to these questions by downloading this guide by Don Jones, author of more than 30 IT books.
Choosing a File Transfer System: Comparing Solutions and Why to Consider Integrated MFT: Vol 4
Choosing a File Transfer System: Comparing Solutions and Why to Consider Integrated MFT: Vol 4
Developed by Don Jones, author of more than 30 IT books, this valuable guide answers a set of questions fundamental to Managed File Transfer (MFT) with detailed, real world answers. It covers key features like:Protocol Support, Access Control, Auditing, Process Automation and Workflow, Reliability, and Policy‐Based Management.
Case Studies: How Different Organizations Approach Managed File Transfer Vol 5
Case Studies: How Different Organizations Approach Managed File Transfer Vol 5
For companies that have already embraced Managed File Transfer, the question is, “what’s next?” This guide by Don Jones, author of more than 30 IT books, offers a view of how different organizations have integrated MFT into their key business processes.
Shopping for a Secure File Transfer Solution for Retail
Shopping for a Secure File Transfer Solution for Retail
Retailers and merchant service providers are under increasing pressure to adhere to PCI DSS in an effort to avoid costly fines — and the even more detrimental loss of customer confidence that results from data leakage or data breaches. PCI DSS compliance requires organizations to protect the security, privacy, and confidentiality of cardholder information — and requires intensive audits. Managed File Transfer (MFT) delivers a proven, simple, and innovative method for exceeding your PCI DSS compliance needs.
FIPS 140-2 Validated Cryptography
FIPS 140-2 Validated Cryptography
The U.S. Federal Information Processing Standard (FIPS) has requirements concerning acceptable encryption methods and strengths. FIPS section 140-2 applies to information processing for government agencies and the military, and it often also applies to vendors, contractors, and suppliers doing business with those entities.
Evolution from FTP to Secure File Transfer
Evolution from FTP to Secure File Transfer
Do you know where your organization's confidential and sensitive files were transferred today? Are you sure they even made it to the right people and not the wrong hands? If you are concerned with the information- and data-sharing practices of your company, you are not alone.
Displaying results 11-20 (of 22)
 |<  <  1 - 2 - 3  >  >| 

Managed File Transfer 101

X