Weekly Tip: Quickly Locate Email Attachments Sent With Thru

By
May 2, 2016 | Posted in File Management, Product

Are you using the Thru Plugin for Outlook to securely send email attachments? If so, you may have noticed that these attachments cannot be opened when you go to Outlook’s Sent Items folder. In today’s weekly tip, we will show…

Thru’s 2015: Taking Our Platform to the Next Level

By
April 28, 2016 | Posted in Company, News

After an outstanding financial year, we are eager to announce the results of our efforts. Thru was consistently the leading enterprise file sync and share (EFSS) solution among top technology companies. In 2015 we were able to custom-engineer solutions for…

Weekly Tip: Creating and Managing Contacts in Thru Web

By
April 21, 2016 | Posted in Product

In today’s weekly tip, we will show you how to create and manage multiple contacts within Thru Web. Since your company probably has hundreds of internal and external contacts to manage, knowing how to use Thru’s contacts feature is a…

Security Mistakes that Software Developers Should Avoid

By
April 15, 2016 | Posted in Security, Software Delivery

Software development in today’s tech and electronics companies requires frequent collaboration on source code between onsite and offsite teams. Because the nature of the work involves meeting tight deadlines, many teams choose tools that are intuitive and get the job…

Weekly Tip: Publishing Thru Documents on the Web

By
April 11, 2016 | Posted in File Management, Product

Have multiple documents in Thru you want to make available to anyone for download? In this week’s tip, we will show you how your company can use the Thru Publishing feature to make any number of files available to the…

No Network Connection? No Problem – New Thru iOS and Android App Updates

By
April 4, 2016 | Posted in Mobile Business, Product

Stay Connected to Your Content with the latest Thru iOS and Android App Updates As more enterprises push content to the cloud, there is strong demand from the world’s mobile workforce to work anytime, anywhere. Even in places with no…

Secure BYOD: Is it Possible in Today’s Enterprises?

By
April 1, 2016 | Posted in Mobile Business, Security

The age of “policy-driven devices” owned and controlled by corporate IT seems to be coming to a close as BYOD is becoming a necessity in enterprises. According to a statistic from research firm Osterman Research, “there are now nearly twice…

Page 3 of 1612345...10...Last »