Resources

On-Demand Webinar

FileCatalyst vs. FTP – Compare File Transfer Speeds

Summary TCP, the foundation of the internet, has been in use since the 1970s. But as the files we transfer has exploded in size since the invention of TCP, it is no longer a feasible means of efficiently sending these large files across the WAN. The serial nature of TCP means that time is wasted waiting on acknowledgments instead of sending data. The alternative protocol, UDP, can send files...
On-Demand Webinar

FileCatalyst for C++ Developers

Summary This webinar, presented by FileCatalyst’s President and CEO, John Tkaczewski, shows viewers how to leverage the FileCatalyst C++ API to add file transfer acceleration directly into a workflow. The webinar covers the features of the C++ API, the requirements, how to get started with using the API, and a demo on building a visual C++ fast file transfer application. What & How The...
On-Demand Webinar

FileCatalyst for Java Developers

Summary FileCatalyst Co-Founder and President, John Tkaczewski, presents viewers with an in-depth look at FileCatalyst from a developer’s perspective. This webinar provides an overview of how to build a fully functional file transfer application using the FileCatalyst Client Java API and NetBeans. What & How The Development Kit is the foundation of our products; if you own any qualifying...
On-Demand Webinar

Remote Data Replication for disaster recovery

Summary When working across global networks, getting files from office to another across continental distances can be a very slow, and costly task to accomplish. Whether making off-site disaster recovery backups, mirroring data across multiple offices, FTP limits the possibilities of creating global content distribution networks. What & How In this webinar FileCatalyst Co-Founder and President...
On-Demand Webinar

Overcoming the Limits of Email Attachments with FileCatalyst

Summary We all use email on a daily basis; millions are sent every minute, making it “the way” we communicate at work. As handy as emails are, they still have limitations that hold back their content sharing potential. One critical setback is the strict size limitations placed on attachments, at a mere 25 MB. In this webinar, FileCatalyst’s Co-Founder and President, John Tkaczewski, shows...
Case Study

FileCatalyst & MMTV

Before deploying FileCatalyst, MM TV reporters shipped their media assets to headquarters either physically via physical storage or electronically via email, FTP and TCP. The time it took to deliver content became a major bottleneck in their workflow and significantly hindered their overall productivity. Read on to learn how FileCatalyst was utilized to fix this bottleneck.
Case Study

FileCatalyst & Evirx

While each failed file transfer method had its issues, Evirx encountered similar problems with each assessment: video uploads were slow and unreliable, files were often too large to transfer, user interfaces were unintuitive and difficult to navigate, and the solutions couldn’t integrate into Evirx’s existing web-based solution. Read on to learn how FileCatalyst Direct was deployed to help solve these problems.
Case Study

FileCatalyst & NICE Software

Learn how, using FileCatalyst, EnginFrame’s client organizations were able to recoup lost time by gaining rapid access to their valuable data, applications, and resources.
Case Study

FileCatalyst & NBC Sports Group at Sochi 2014

Learn how, with the help of FileCatalyst, NBC Sports Group broke new ground in live sports production by overcoming the limits of concurrent transfers and solving the problems associated with dynamically changing MXF files.
Blog

GoAnywhere MFT Not Affected by EFAIL Vulnerabilities

Ashland, NE, May 16, 2018 In light of the recent Open PGP & S/MIME warning (EFAIL), GoAnywhere has performed a software security review of its managed file transfer solution to ensure customers and their encrypted emails are not affected by this vulnerability. The review was positive and demonstrates that GoAnywhere MFT is already protected...
Blog

The Square Kilometer Array (SKA) & The Mind Blowing Big Data It Will Produce

I’ve been looking into projects that are generating large amounts of data or big data in other words, and one project I came across that really peaked my interest was the Square Kilometer Array (SKA) Project. This a long term project (currently phase 5 of 7) is working to answer some of science’s hardest, and mankind’s oldest, questions to better understand the origins of the universe and...
Blog

IT Pros in Healthcare: How to Choose a Secure File Transfer Solution

Every healthcare provider wants to avoid being the next data breach headline—and unfortunately, we have seen many incidents and their consequences in 2018 so far. The causes of these data breaches range from wrongly configured databases to successful malware attacks and unauthorized user access.For those looking to avoid the pain, embarrassment, and...
Blog

3 Ways Your Peers are Using Secure Forms

If you exchange any amount of sensitive information as paper documents, electronic PDFs, images, or spreadsheets, you know keeping track of data and ensuring it gets where it needs to go can be a challenge. And if you work with multiple parties to receive this information, like employees, vendors, clients, stakeholders, and trading partners, you also...
Blog

On-Premises and the Cloud: A Comparison of Two Unique Environments

On-premises. The cloud. Hybrid environments.As technology evolves and business needs grow, organizations are rapidly trying to make sense of their options. What are the benefits of running their software and data on-premises? What concerns should IT and security teams be aware of when implementing their processes in the cloud? Can they do a bit of both and go hybrid?There is no right or wrong...
Blog

15 Ways to Avoid Document Chaos with Secure Forms

Vendors, employees, customers, and trading partners exchange an abundance of files every day, often by a variety of means including mail, email, telecomm apps like Skype, shared file storage like Dropbox or Google Drive, and sometimes even SMS. While documents are an inescapable reality for busy organizations, keeping track of this data can be...
Blog

2018 Cybersecurity Concerns in Healthcare and How to Address Them

The first few weeks of January always seem to be accompanied by an influx of new cybersecurity trends, forecasts, and concerns. As expected, 2018 has followed this pattern—and with the need for secure patient information growing ever more critical and the arrival of GDPR in May, it’s no surprise that healthcare experts are deep in conversation about...