You are here

Share
County of Sacramento
Posted by Accellion Team
The County of Sacramento is home to nearly 2 million people as well as the California state capital. The County's administration employs thousands of people in over 30 departments, including Emergency Services, Transportation, Regional Parks, and Sanitation. To do their jobs, these employees...
Employees and Shadow IT
Posted by Andy Feit
A new survey by Dimensional Research finds that 72% of employees are willing to share “sensitive, confidential, or regulated company information.” Regulated information includes information such as customer records in financial services and Patient Health Information (PHI) in healthcare...
EFSS Best Practices
Posted by Andy Feit
Enterprise File Sync and Share, or EFSS, is a technology most enterprises prioritize, especially if those organizations exchange protected health information (PHI) or personally identifiable information (PII) internally or externally with any regularity. And for those businesses operating in highly...
Improving patient care with secure collaboration
Posted by Marianna Prodan
Indiana is known for a lot of things: Notre Dame football, the birthplace of James Dean and David Letterman, five U.S. vice presidents, the Indy 500, the Studebaker, Hoosiers , the first gas pump and machine gun, and lots more. Indiana isn’t however known for an overabundance of pediatric...
ensuring data loss prevention across the enterprise
Posted by Tejaswini Vadrevu
Data Loss or Data Leak Prevention, more commonly known as DLP, has been around a long time and it doesn’t take a computer scientist to understand why. As data breaches continue to occur in increasing frequency and sophistication, interest in DLP technology has exploded. According to Forrester...
cybersecurity in the Trump era
Posted by Accellion Team
Like any large modern organization, the executive branch of the U.S. federal government relies on technology to get its work done. That technology includes mobile devices, Wi-Fi networks, email servers, databases, and other IT solutions that would be familiar to any enterprise CIO or CSO. The...
even fine watch makers need to collaborate securely
Posted by Accellion Team
This Accellion customer (they have asked to remain anonymous) is a leading manufacturer of luxury wrist watches and is one of the world’s most recognizable brands. A lot more goes into producing fine wrist watches than one would think. Sure, engineering, design, technology and craftsmanship...
Protecting EU citizens' data with GDPR
Posted by Accellion Team
We live in a world marked by extreme data generation and accumulation, fueled by our interaction with an increasing number of applications, systems and devices. It's hard to believe but IoT development and adoption is set to drive this increase in data generation exponentially further...
Supporting Abbotsford Police Department’s Investigative Teams
Posted by Accellion Team
Abbotsford Police Department serves the city of Abbotsford, British Columbia. With over 200 police offers, supported by another 200 staff and volunteers, Abbotsford PD is dedicated to providing the highest quality service to its residents with the goal of making Abbotsford the safest city in...
your legal data is at risk
Posted by Accellion Team
When it comes to the security of sensitive legal information, you don’t have to be a Panamanian law firm with star-studded clientele to have a huge target on your back. Recent breaches at some of the country’s most prestigious law firms, including Cravath Swaine & Moore LLP and Weil...
Embracing the Digital Transformation
Posted by Ajay Nigam
Lately when businesses have discussed improving the customer experience, increasing efficiencies, attracting and retaining talent, and generally staying competitive, the term “digital transformation” has come up. Like Web 2.0, cloud computing, and social media, digital transformation...
CJIS and Content Security for Mobile, Cloud-based IT
Posted by Izak Bovee
Criminal Justice Information (CJI) is data used in the practice of criminal justice, including the investigation and prosecution of crimes. Modern mobile and cloud technologies present law enforcement with new opportunities to capture and communicate CJI, potentially speeding investigations,...
Enhanced File Sharing and Collaboration Help Latham & Watkins Stay Productive and Secure
Posted by Accellion Team
Latham & Watkins is the world’s largest law firm by revenue. Headquartered in Los Angeles, the firm employs more than 2,000 attorneys in offices all around the world. With so many attorneys representing clients on a variety of legal matters, the firm generates a lot of content: contracts...
Aragon Research Globe for MCM
Posted by Accellion Team
We’re thrilled to announce Accellion has been named a Leader in Mobile Content Management by Aragon Research for the third consecutive year. 1 Mobile Content Management, or MCM, has evolved considerably in the last three years. Driving the evolution is the increased demand among organizations...
8 Reasons Why Pharmaceuticals Need BYOD and BYOD Security
Posted by Marianna Prodan
The Pharmaceuticals industry depends on three things: data, collaboration and security. Okay, perhaps four things, the fourth being drugs that work but that’s by and large dependent upon the first two things. Data includes bioinformatics, medicinal chemistry data, in vitro testing data,...
Enterprise IT vs. Employee BYOD: Who’s in Control?
Posted by Bob Ertl
An enterprise IT department, regardless of size or industry, has a number of responsibilities. That said, the mandate for any IT department boils down to one critical, albeit complicated, task: manage and secure enterprise content, devices, and connections. Without data security, nothing else...
information security is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple data silos and protected by rigorous security controls. The second...
ransomware is becoming more common, more stealthy, and more costly
Posted by Marianna Prodan
Once a rare form of malware found primarily in Eastern Europe, ransomware is becoming more common, more stealthy, and more costly. In 2015, there were about 1,000 attacks per day, according to Symantec. In 2016, there have been days with 4,000 attacks. Most attacks are against individuals and...
Accellion Joins Forces with Microsoft Azure
Posted by Hormazd Romer
We recently announced that our private cloud content collaboration platform, kiteworks, is now available on the Microsoft Azure Marketplace. For the uninitiated, Microsoft Azure is an enterprise-grade public cloud platform and infrastructure that offers numerous integrated cloud services including...
information accessibility is critical for insurance professionals
Posted by Amy Chu
Insurance companies are facing two big challenges, and both have to do with content. The first challenge is making content available to an increasingly mobile workforce, despite the fact that it is distributed across multiple content silos and protected by rigorous security controls. The second...

Pages