Datasheet
Enhanced File Transfer™ (EFT™) software enables your organization to
securely manage file transfers among worldwide offices, clients, and
partners. EFT ensures the highest levels of compliance with government
and corporate security policies and privacy regulations, including PCI-DSS,
...
As the work environment becomes increasingly distributed, businesses need to collaborate in real time on large, critical documents with distant colleagues and partners. Individuals in multiple locations need to work with the same spreadsheets, CAD drawings or MRI images, without frustrating slowness...
Resource
GlobalSCAPE, Inc. (NYSE Amex: GSB), a leading developer
of secure information exchange solutions, today announced it
has received another multi-million dollar order from the U.S.
Army for Secure FTP Server(TM) and CuteFTP(R). The $2.7
million order includes new product licenses as well as 36
mo...
In order to comply with government purchasing protocol, The US Army was required to compare
the bids of three different vendors before making a purchasing decision. However, they soon realized
that only a limited number of server packages were available—and only one could meet their
strict ...
WAFS 5 simplifies enterprise collaboration, eliminates errors, and decreases bandwidth usage, providing secure, near real-time data access to both on-premises and cloud-based files located anywhere in the world. The software uses intelligent byte-level differencing technology to instantly update cha...
Whitepaper
Data Loss Prevention (DLP) monitoring products have greatly
reduced the tidal wave of sensitive information flowing out of
organizations. They inspect data-in-motion and identify
network traffic that needs protection. With a little incremental
effort, they can integrate with secure email tools t...
To the shock of many, the greatest threat to data security today is not
targeted cyber attacks or fraudulent hackers, it’s the carelessness of
corporate employees. In fact, according to a 2013 Ponemon Institute
report, almost two-thirds of data breaches can be attributed to
negligence, human e...