Weekly Tip: Controlling Mobile Access to Company Data

By
May 11, 2016 | Posted in Mobile Business, Product

Is your company struggling to control access to data from devices owned by employees, clients, and partners? Do you need to revoke mobile access to corporate content for former employees? Thankfully with Thru device access controls, your company can control…

Weekly Tip: Quickly Locate Email Attachments Sent With Thru

By
May 2, 2016 | Posted in File Management, Product

Are you using the Thru Plugin for Outlook to securely send email attachments? If so, you may have noticed that these attachments cannot be opened when you go to Outlook’s Sent Items folder. In today’s weekly tip, we will show…

Weekly Tip: Creating and Managing Contacts in Thru Web

By
April 21, 2016 | Posted in Product

In today’s weekly tip, we will show you how to create and manage multiple contacts within Thru Web. Since your company probably has hundreds of internal and external contacts to manage, knowing how to use Thru’s contacts feature is a…

Security Mistakes that Software Developers Should Avoid

By
April 15, 2016 | Posted in Security, Software Delivery

Software development in today’s tech and electronics companies requires frequent collaboration on source code between onsite and offsite teams. Because the nature of the work involves meeting tight deadlines, many teams choose tools that are intuitive and get the job…

Weekly Tip: Publishing Thru Documents on the Web

By
April 11, 2016 | Posted in File Management, Product

Have multiple documents in Thru you want to make available to anyone for download? In this week’s tip, we will show you how your company can use the Thru Publishing feature to make any number of files available to the…

No Network Connection? No Problem – New Thru iOS and Android App Updates

By
April 4, 2016 | Posted in Mobile Business, Product

Stay Connected to Your Content with the latest Thru iOS and Android App Updates As more enterprises push content to the cloud, there is strong demand from the world’s mobile workforce to work anytime, anywhere. Even in places with no…

Secure BYOD: Is it Possible in Today’s Enterprises?

By
April 1, 2016 | Posted in Mobile Business, Security

The age of “policy-driven devices” owned and controlled by corporate IT seems to be coming to a close as BYOD is becoming a necessity in enterprises. According to a statistic from research firm Osterman Research, “there are now nearly twice…

Page 1 of 512345