{"version":"1.0","provider_name":"Control Threat","provider_url":"https:\/\/controlthreat.com","author_name":"techplus","author_url":"https:\/\/controlthreat.com\/index.php\/author\/techplus\/","title":"Virtual Dataroom and the FTP process: comparison - Control Threat","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"THC3qa5n7v\"><a href=\"https:\/\/controlthreat.com\/index.php\/2019\/12\/12\/virtual-dataroom-and-the-ftp-process-comparison\/\">Virtual Dataroom and the FTP process: comparison<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/controlthreat.com\/index.php\/2019\/12\/12\/virtual-dataroom-and-the-ftp-process-comparison\/embed\/#?secret=THC3qa5n7v\" width=\"600\" height=\"338\" title=\"&#8220;Virtual Dataroom and the FTP process: comparison&#8221; &#8212; Control Threat\" data-secret=\"THC3qa5n7v\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/controlthreat.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"With the growth of the global business, more and more companies use technological innovations to deal with and store large amounts of files and files. For these purposes you need to guarantee certain confidentiality that defends the data. In recent years it is these needs that best meet the , which wins against other technology","thumbnail_url":"https:\/\/t2conline.com\/wp-content\/uploads\/2019\/10\/viratual-data-rooms-899x600.jpeg"}