SAN ANTONIO--(BUSINESS WIRE)--Aug. 1, 2006--GlobalSCAPE (OTCBB:GSCP) today announced Enhanced File Transfer (EFT) Server is available with advanced auditing and reporting that captures all of the ...
Dr. Chris Hillman, Global AI Lead at Teradata, joins eSpeaks to explore why open data ecosystems are becoming essential for enterprise AI success. In this episode, he breaks down how openness — in ...
SAN ANTONIO--(BUSINESS WIRE)--Users of Enhanced File Transfer Server™ (EFT Server™) by Globalscape (NYSE MKT: GSB) gain real-time visibility of transaction information through a new IT and business ...
SAN ANTONIO--(BUSINESS WIRE)--GlobalSCAPE, Inc. (NYSE American: GSB), a worldwide leader in the secure movement and integration of data, today announced it has released updates to its Enhanced File ...
SAN ANTONIO, TX--(Marketwired - February 08, 2016) - Today's enterprise applications must meet an "always on" standard, and be scalable and reliable enough to meet a business' needs. In response, ...
SAN ANTONIO, TX--(Marketwired - April 25, 2016) - GlobalSCAPE, Inc. (NYSE MKT: GSB), a pioneer and worldwide leader in the secure and reliable exchange of business information, announces the immediate ...
Every business needs to transfer files whether they're large files containing millions of records or raw media files, and sending them via email isn't always the best way. While there are plenty of ad ...
GlobalSCAPE (GSB) is a software development company that develops products such as file transfer protocol [FTP] client programs, including CuteFTP, CuteFTP Pro, and Secure FTP Server. GlobalScape also ...
EFT Server is a secure file transfer software. The core EFT Server platform provides the transport of protocols, extensive user account control, and post processing workflow.
Managed file transfer platform maker Globalscape is continuing to build a strong base of channel partners, according to Chris Cleary, senior director of channel sales, who said shedding the company's ...
A username and password are no longer enough to authenticate the identity of employees accessing corporate networks and data. Research indicates that weak or stolen user credentials are the preferred ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results