You are here

Share
ensuring data loss prevention across the enterprise
Posted by Tejaswini Vadrevu
Data Loss or Data Leak Prevention, more commonly known as DLP, has been around a long time and it doesn’t take a computer scientist to understand why. As data breaches continue to occur in increasing frequency and sophistication, interest in DLP technology has exploded. According to Forrester...
even fine watch makers need to collaborate securely
Posted by Accellion Team
This Accellion customer (they have asked to remain anonymous) is a leading manufacturer of luxury wrist watches and is one of the world’s most recognizable brands. A lot more goes into producing fine wrist watches than one would think. Sure, engineering, design, technology and craftsmanship...
Protecting EU citizens' data with GDPR
Posted by Accellion Team
We live in a world marked by extreme data generation and accumulation, fueled by our interaction with an increasing number of applications, systems and devices. It's hard to believe but IoT development and adoption is set to drive this increase in data generation exponentially further...
Supporting Abbotsford Police Department’s Investigative Teams
Posted by Accellion Team
Abbotsford Police Department serves the city of Abbotsford, British Columbia. With over 200 police offers, supported by another 200 staff and volunteers, Abbotsford PD is dedicated to providing the highest quality service to its residents with the goal of making Abbotsford the safest city in...
your legal data is at risk
Posted by Accellion Team
When it comes to the security of sensitive legal information, you don’t have to be a Panamanian law firm with star-studded clientele to have a huge target on your back. Recent breaches at some of the country’s most prestigious law firms, including Cravath Swaine & Moore LLP and Weil...
Embracing the Digital Transformation
Posted by Ajay Nigam
Lately when businesses have discussed improving the customer experience, increasing efficiencies, attracting and retaining talent, and generally staying competitive, the term “digital transformation” has come up. Like Web 2.0, cloud computing, and social media, digital transformation...
CJIS and Content Security for Mobile, Cloud-based IT
Posted by Izak Bovee
Criminal Justice Information (CJI) is data used in the practice of criminal justice, including the investigation and prosecution of crimes. Modern mobile and cloud technologies present law enforcement with new opportunities to capture and communicate CJI, potentially speeding investigations,...
Enhanced File Sharing and Collaboration Help Latham & Watkins Stay Productive and Secure
Posted by Accellion Team
Latham & Watkins is the world’s largest law firm by revenue. Headquartered in Los Angeles, the firm employs more than 2,000 attorneys in offices all around the world. With so many attorneys representing clients on a variety of legal matters, the firm generates a lot of content: contracts...
Aragon Research Globe for MCM
Posted by Accellion Team
We’re thrilled to announce Accellion has been named a Leader in Mobile Content Management by Aragon Research for the third consecutive year. 1 Mobile Content Management, or MCM, has evolved considerably in the last three years. Driving the evolution is the increased demand among organizations...
8 Reasons Why Pharmaceuticals Need BYOD and BYOD Security
Posted by Marianna Prodan
The Pharmaceuticals industry depends on three things: data, collaboration and security. Okay, perhaps four things, the fourth being drugs that work but that’s by and large dependent upon the first two things. Data includes bioinformatics, medicinal chemistry data, in vitro testing data,...
Enterprise IT vs. Employee BYOD: Who’s in Control?
Posted by Bob Ertl
An enterprise IT department, regardless of size or industry, has a number of responsibilities. That said, the mandate for any IT department boils down to one critical, albeit complicated, task: manage and secure enterprise content, devices, and connections. Without data security, nothing else...
information security is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple data silos and protected by rigorous security controls. The second...
ransomware is becoming more common, more stealthy, and more costly
Posted by Marianna Prodan
Once a rare form of malware found primarily in Eastern Europe, ransomware is becoming more common, more stealthy, and more costly. In 2015, there were about 1,000 attacks per day, according to Symantec. In 2016, there have been days with 4,000 attacks. Most attacks are against individuals and...
Accellion Joins Forces with Microsoft Azure
Posted by Hormazd Romer
We recently announced that our private cloud content collaboration platform, kiteworks, is now available on the Microsoft Azure Marketplace. For the uninitiated, Microsoft Azure is an enterprise-grade public cloud platform and infrastructure that offers numerous integrated cloud services including...
information accessibility is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple content silos and protected by rigorous security controls. The second...
SWIFT Security Vulnerabilities Put Billions of Dollars at Risk
Posted by Amy Chu
In this day and age, if you want to rob a bank, you can dispense with the overcoat, the wig, the cheap sunglasses, and the note slid across the counter to a blanching teller. According to numbers from the FBI, the yield from robbing bank branches is relatively low— $7,500 on average , even if...
Healthcare data breaches put patient data at risk
Posted by Marianna Prodan
Healthcare data breaches are increasingly common—that’s one of the stark conclusions from the Ponemon Institute’s sixth annual study on the state of security and privacy in the healthcare industry. Drawing on a detailed survey of healthcare organizations (HCOs) and their business...
Moving beyond TLS to enhance security and compliance
Posted by Izak Bovee
Accellion recently released a security patch, FTA_9_12_110, that allows IT administrators to disable TLS 1.0 and 1.1. (Accellion released a similar patch, kw_2016.02.00, for kiteworks customers in May.) TLS, or Transport Layer Security, is a cryptographic protocol that provides communications...
IT Security After Snowden
Posted by Yorgen Edholm
This month “ Snowden ,” Oliver Stone’s movie about NSA whistleblower Edward Snowden, opens in theaters around the country. It’s as good an occasion as any to look back at what’s changed in the three and a half years since this computer prodigy leaked information about...
Connecting City of Pleasanton employees to their content
Posted by Hormazd Romer
Pleasanton is a city of 78,000 people in the Tri-Valley area of the San Francisco Bay Area. The City is also home to about 4,000 businesses, including offices for companies such as Clorox, Oracle, Safeway, and Workday. It’s a full service city, meaning that it has its own police department,...

Pages