You are here

Share
Improving patient care with secure collaboration
Posted by Marianna Prodan
Indiana is known for a lot of things: Notre Dame football, the birthplace of James Dean and David Letterman, five U.S. vice presidents, the Indy 500, the Studebaker, Hoosiers , the first gas pump and machine gun, and lots more. Indiana isn’t however known for an overabundance of pediatric...
ensuring data loss prevention across the enterprise
Posted by Tejaswini Vadrevu
Data Loss or Data Leak Prevention, more commonly known as DLP, has been around a long time and it doesn’t take a computer scientist to understand why. As data breaches continue to occur in increasing frequency and sophistication, interest in DLP technology has exploded. According to Forrester...
cybersecurity in the Trump era
Posted by Accellion Team
Like any large modern organization, the executive branch of the U.S. federal government relies on technology to get its work done. That technology includes mobile devices, Wi-Fi networks, email servers, databases, and other IT solutions that would be familiar to any enterprise CIO or CSO. The...
even fine watch makers need to collaborate securely
Posted by Accellion Team
This Accellion customer (they have asked to remain anonymous) is a leading manufacturer of luxury wrist watches and is one of the world’s most recognizable brands. A lot more goes into producing fine wrist watches than one would think. Sure, engineering, design, technology and craftsmanship...
Protecting EU citizens' data with GDPR
Posted by Accellion Team
We live in a world marked by extreme data generation and accumulation, fueled by our interaction with an increasing number of applications, systems and devices. It's hard to believe but IoT development and adoption is set to drive this increase in data generation exponentially further...
Supporting Abbotsford Police Department’s Investigative Teams
Posted by Accellion Team
Abbotsford Police Department serves the city of Abbotsford, British Columbia. With over 200 police offers, supported by another 200 staff and volunteers, Abbotsford PD is dedicated to providing the highest quality service to its residents with the goal of making Abbotsford the safest city in...
your legal data is at risk
Posted by Accellion Team
When it comes to the security of sensitive legal information, you don’t have to be a Panamanian law firm with star-studded clientele to have a huge target on your back. Recent breaches at some of the country’s most prestigious law firms, including Cravath Swaine & Moore LLP and Weil...
Embracing the Digital Transformation
Posted by Ajay Nigam
Lately when businesses have discussed improving the customer experience, increasing efficiencies, attracting and retaining talent, and generally staying competitive, the term “digital transformation” has come up. Like Web 2.0, cloud computing, and social media, digital transformation...
CJIS and Content Security for Mobile, Cloud-based IT
Posted by Izak Bovee
Criminal Justice Information (CJI) is data used in the practice of criminal justice, including the investigation and prosecution of crimes. Modern mobile and cloud technologies present law enforcement with new opportunities to capture and communicate CJI, potentially speeding investigations,...
Enhanced File Sharing and Collaboration Help Latham & Watkins Stay Productive and Secure
Posted by Accellion Team
Latham & Watkins is the world’s largest law firm by revenue. Headquartered in Los Angeles, the firm employs more than 2,000 attorneys in offices all around the world. With so many attorneys representing clients on a variety of legal matters, the firm generates a lot of content: contracts...
Aragon Research Globe for MCM
Posted by Accellion Team
We’re thrilled to announce Accellion has been named a Leader in Mobile Content Management by Aragon Research for the third consecutive year. 1 Mobile Content Management, or MCM, has evolved considerably in the last three years. Driving the evolution is the increased demand among organizations...
8 Reasons Why Pharmaceuticals Need BYOD and BYOD Security
Posted by Marianna Prodan
The Pharmaceuticals industry depends on three things: data, collaboration and security. Okay, perhaps four things, the fourth being drugs that work but that’s by and large dependent upon the first two things. Data includes bioinformatics, medicinal chemistry data, in vitro testing data,...
Enterprise IT vs. Employee BYOD: Who’s in Control?
Posted by Bob Ertl
An enterprise IT department, regardless of size or industry, has a number of responsibilities. That said, the mandate for any IT department boils down to one critical, albeit complicated, task: manage and secure enterprise content, devices, and connections. Without data security, nothing else...
information security is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple data silos and protected by rigorous security controls. The second...
ransomware is becoming more common, more stealthy, and more costly
Posted by Marianna Prodan
Once a rare form of malware found primarily in Eastern Europe, ransomware is becoming more common, more stealthy, and more costly. In 2015, there were about 1,000 attacks per day, according to Symantec. In 2016, there have been days with 4,000 attacks. Most attacks are against individuals and...
Accellion Joins Forces with Microsoft Azure
Posted by Hormazd Romer
We recently announced that our private cloud content collaboration platform, kiteworks, is now available on the Microsoft Azure Marketplace. For the uninitiated, Microsoft Azure is an enterprise-grade public cloud platform and infrastructure that offers numerous integrated cloud services including...
information accessibility is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple content silos and protected by rigorous security controls. The second...
SWIFT Security Vulnerabilities Put Billions of Dollars at Risk
Posted by Amy Chu
In this day and age, if you want to rob a bank, you can dispense with the overcoat, the wig, the cheap sunglasses, and the note slid across the counter to a blanching teller. According to numbers from the FBI, the yield from robbing bank branches is relatively low— $7,500 on average , even if...
Healthcare data breaches put patient data at risk
Posted by Marianna Prodan
Healthcare data breaches are increasingly common—that’s one of the stark conclusions from the Ponemon Institute’s sixth annual study on the state of security and privacy in the healthcare industry. Drawing on a detailed survey of healthcare organizations (HCOs) and their business...
Moving beyond TLS to enhance security and compliance
Posted by Izak Bovee
Accellion recently released a security patch, FTA_9_12_110, that allows IT administrators to disable TLS 1.0 and 1.1. (Accellion released a similar patch, kw_2016.02.00, for kiteworks customers in May.) TLS, or Transport Layer Security, is a cryptographic protocol that provides communications...

Pages