Palo Alto, CA – June 2, 2010 — Accellion, Inc. today announced the industry’s first secure file transfer solution for the Microsoft Business Productivity Infrastructure (BPI) and Business Productivity ...
Ipswitch, a maker of secure, managed file transfer products and services, on Tuesday will announce it has acquired MessageWay Solutions, a provider of managed file transfer and business integration ...
Organizations Quickly and Securely Share Large Digital Files while Maintaining Compliance with HIPAA and FDA Regulations PALO ALTO, Calif.--(BUSINESS WIRE)-- The development and production of drugs ...
Businesses in a wide variety of industries, such as engineering, energy, and mining, use transmittals to transfer critical documents – such as contracts, drawings, specifications, calculations, and ...
Progress, a provider of application development and digital experience technologies, is releasing Progress MOVEit 2020, a secure, automated Managed File Transfer (MFT) solution that can be deployed on ...
Paula Skokowski, VP of Marketing for Accellion, and I had a lovely debate, err, conversation over the need for her company's product, a file transfer "virtualization" product. In the end, she won me ...
IRVING, Texas--(BUSINESS WIRE)-- Thru, Inc., a leading provider of cloud-native secure managed file transfer (MFT) solutions, and Crocs, Inc., a leader in innovative casual footwear for women, men, ...
Provides the Necessary Layers of Security and Compliance Required by HIPAA and the HITECH Act PALO ALTO, Calif.--(BUSINESS WIRE)-- HIPAA regulations and the HITECH Act place stringent requirements on ...
For 28 years, DataExpress™ has provided products and capabilities to the retail and financial services industries that ensure data security, privacy and efficiency across both private and public ...
To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results