Select below by category OR industry to highlight relevant whitepapers.

EFT Platform

  • Are Consumer File-Sharing Tools the Biggest Threat to Your Enterprise?
    Globalscape Workspaces, a new addition to our managed file transfer (MFT) solution suite, Enhanced File Transfer™(EFT™), allows employees to share folders and their files with any other user without sacrificing governance, visibility, or control.
  • Control Risk Across the Enterprise with a Managed File Transfer Solution
    Enterprise risk has grown dramatically in both scope and complexity since the dawn of the digital era. Managed File Transfer (MFT) is a prime example of a necessary tool that can mitigate a plethora of risks, delivering value for enterprises worldwide.
  • How to Implement a Strong BYOD Policy
    Developing a strong, comprehensive BYOD policy is the critical first step to finding success with the initiative. In general, it’s important to keep in mind the central goal of a BYOD policy: to protect the company’s data and networks.
  • Multifactor Authentication
    The classic username+password authentication to an account is only as secure as the security and complexity of the password.Globalscape EFT Enterprise integrates with SMS PASSCODE® to provide mobile-based, two-factor authentication for added security.
  • Managed File Transfer Buyers Guide
    Not all file-transfer solutions are created equally. This MFT Buyers Guide explains several things to consider when evaluating MFT technology.
  • High Availability Clustering
    Businesses count on consistent, dependable access to their mission-critical resources and applications. A gap in this service—even for just a few minutes—can cause losses of data, business opportunities, and revenue. High Availability (HA) clustering for MFT services seeks to optimize accessibility while reducing the chance that information and applications will be affected by unexpected events such as system failures. By investing in a secure and dependable HA solution, organizations can maximize their uptime and access to mission-critical information.
  • Three Ways System Downtime Affects Companies and Four Methods to Minimize It
    Downtime happens and often at the worst time possible. Organizations experiencing downtime face direct and indirect costs from the loss of critical systems. This whitepaper discusses a Globalscape survey of 283 IT professionals and end users revealing the frequency of unplanned downtime, the effects on organizations, including average costs, and what IT administrators can do to minimize core system failure.
  • Mobile is the New Normal for Conducting Business
    Mobile devices have offered organizations unparalleled access to information and a new level of flexibility in doing business. However, with this newfound freedom comes inherent risks and the danger of security breaches. This whitepaper discusses the growth of mobile devices in the workplace, inherent security issues in common file sharing services, and what organizations can do to enforce BYOD security policies without limiting the productivity of its employees.
  • File Security Evolution
    The IT landscape has changed significantly in the last five years. Technology has advanced as well as the inherent challenges in securing it. This whitepaper addresses the dangers of using common, but insecure, file sharing methods along with alternative—and secure—options for creating scalable, flexible, and intuitive technology to increase employee productivity.
  • Dangerous File Sharing
    To uncover the breadth of this issue, Globalscape asked more 530 U.S. professional employees about their information-sharing habits. Today’s workforce expects instant access to information, and the ability to send and receive data at the press of a button. When corporate technology and tools come up short, employees are forced to find a workaround. Most often, that workaround is a consumer-grade tool with inherent security flaws.
  • Protecting Digitalized Assets in Healthcare
    Healthcare providers face an urgent, internal battle every day: security and compliance versus productivity and service. For most healthcare organizations, the fight is an easy one: Providing quick, high-quality care wins every single time.
  • Choosing the Right MFT Solution
  • How to Maximize Uptime for Mission-Critical File Transfer
    MFT solutions play a critical role in many businesses. No matter how reliable and robust the solution itself, every MFT deployment is subject to outages or problems due to failures outside the application, such as OS problems, hardware failures, and networking failures.
  • EFT To Replace USB For SCADA
    To put it simply, USB drives are a security issue organizations can’t afford to keep for a host of reasons. This whitepaper discusses SCADA networks, their benefits in comparison to traditional local area networks, and how SCADA can be used as a secure alternative to USB drives.

Mail Express

Wide Area File Services (WAFS)

  • How WAFS can Create Flawless Business Continuity
    To optimize business productivity and reduce costs when collaborating over distances, IT organizations need to give users high-performance, easy-to-use methods for document collaboration, as if they were working with local colleagues. In addition, to protect business interests, they need to ensure that these solutions support centralized management and backup, prevent versioning or integrity errors, and do not impede network traffic.

Managed Information Xchange (MIX)

  • Is a SaaS Deployment Right for You?
    The applications for MFT are as varied as the businesses that use the solutions. Because managed file transfer is important to such a wide range of businesses, it stands to reason that there are many ways that businesses might want or need to deploy MFT. MFT solutions are typically delivered as some combination of software and services. This paper looks at some of the different deployment models, and offers guidelines for choosing the right model for your business. This whitepaper includes criteria for evaluating business requirements and the benefits and drawbacks of each deployment option.