Securely Transform Your File Transfer Process through Automation
View On-Demand
March 15, 2016
View On-Demand
Moving your files from point A to point B sounds simple, but file transfers can be time consuming when you have so many other things to do, and maintaining security of the data being transferred is paramount. As a business grows and the volume of file transfers increases, finding reliable and secure ways to streamline the process becomes more difficult.
The key technologies behind robust, safe data transport are encryption and authentication, both of which are supported by open standards. Alas, there are many standards from which to choose, so matching your objectives with the available standards requires understanding how they work under the covers.
In this presentation, IT security experts Mel Beckman and Donna Horton give you the details you need about encryption and authentication, as well as file transfer automation to help these work together unattended. You’ll learn:
The tradeoffs between security and speed for various encryption algorithms.
The value of digital certificates in automating file transfers without exposing passwords to the job control environment.
How to secure legacy transfer protocols such as FTP using “at rest” encryption.
Methods of error detection and correction to reduce errors and failures.
The value of automation to ensure that only intended data is transferred.
Register Now!
If you have already registered, click here to access
Speakers:
Mel Beckman, Industry Expert
Mel Beckman has been writing computer-related features and product reviews for more than 20 years, with a focus on IT, data centers, networking, and communications. Mel has presented hundreds of seminars on computing technology throughout the United States, Europe, and Asia.
Donna Horton, Training and Services Consultant
Donna has over 20 years of experience in Information Technology, including network and systems administration, support, engineering, enterprise software management, and technical training. At HelpSystems, she helps customers automate a wide range of systems and IT business applications through training, consulting, professional services, and support.
About the Author
You May Also Like